Cloud-based S(ecurity)aaS enables business strategy Jason Georgi Director, Value Management Office
Speaker Bio Jason Georgi Director of Zscaler s Value Management Office Accomplished technology innovation strategy expert, led GE s Global Network Council and Infrastructure-as-a-Service programs. 20+ years diverse IT infrastructure experience.
Calling all thought leaders How many of you have been the voice of No for IT decisions? How many of you would like to be the hero by saying Yes! securely Tomorrow s IT needs bold, disruptive direction
Applying strategy means answering 3 key questions 1 What are top priorities for today s CEOs? 2 How do business priorities translate to IT strategy? 3 How does IT strategy impact the network & security
Today s business outcomes CEO priorities CIO priorities 1 Business agility 1 Simplification 2 Innovation 2 Cost Reduction 3 Competitive Advantage 3 User Experience
Common themes
Where is today s C-suite looking to enable strategy? 1 Cloud Computing 2 Internet of Things (IoT) 3 Growth Markets CIOs need a cloud strategy or risk looking less progressive Enable the business for cloud & mobility Future-proof investments with rapidly-evolving landscape Data Center consolidation Provide secure access from any device, any time, anywhere All present new challenges
Oh, and by the way IT and info sec now have board-level visibility The fear of exfiltration of intellectual property and reputation damage due to breach and advanced persistent threats grows with every story
Security needs and coverage have evolved
In the past, security wasn t such a big deal DATA CENTER Secure THE INTERNET Small and simple... no problem THREATS relatively few... Viruses, worms... CORPORATE NETWORK Secure Desktop HQ Regional offices...proxies were employee policing tools
Cloud adoption is shifting workloads
Cloud adoption is shifting workloads Internet gateway Internet Put users as close to workloads as possible Eliminate coverage gaps for mobile devices Mitigate circumventing security Reduce WAN-backhaul of Internet traffic Mobile HQ Remote Offices Perimeter around the Data Center
Today the world is distributed, the cloud is dominant and threats are vastly more advanced DATA CENTER Secure THE INTERNET At risk THREATS scary, advanced Malware APT CORPORATE NETWORK At risk Desktop Laptop PEOPLE & ASSETS EVERYWHERE At risk Laptop Mobile IoT Botnets Exploits HQ Regional offices Branches/ stores Factories On-the-go Home offices...proxies require advanced security and must be ubiquitous
What is the answer for Internet security?
Not appliances: they force you into tough choices Backhauling traffic through the data center is slow and costly Installing boxes at many locations is expensive and complex HQ HQ Regional offices Regional offices Branches / stores Branches / stores Factories Data center Internet Factories Internet On-the-go On-the-go Mobile Mobile mobile users often go unprotected
It's too expensive, complex and slow to deploy all of this security hardware everywhere Here s a real-world example Source: Global 50 company, Actual Internet Gateway diagram
Cloud-based Internet security puts a perimeter around the Internet Branches / stores Home offices Exploits Botnets APT Malware HQ On-the-go Regional offices Factories this is a strategy, not a spot solution
Why cloud for internet security?
Why not? Other business-critical applications are moving (or have already moved!) to the cloud Email & Collaboration Evolution in workload placement is destroying the status quo and the traditional perimeter CRM, B-I, ERP File Storage App Workloads
Cloud-based internet security solves today s challenges Cloud-enabled global networks Added layer of security Hardware obsolescence and consolidation Makes organizations more adaptable and agile Mobile & BYOD Guest WiFi protection
Where is cloud for internet security an ideal fit? Any organization! Adds most strategic value Cloud-first organizations Distributed enterprises Global footprint Heavy road warrior & mobile population Need security without UX compromise
The TCO for Security as a Service is up to 80% lower than onpremise appliances 10% purchase costs 90% operating costs 21
Applying the concept
Protecting the distributed enterprise Remote VPN User Corporate Data Center Centralized visibility and control Limited deployment of security appliances Gateway stack provides effective protection for those on net HQ
Protecting the distributed enterprise Expansion puts additional strain on gateways Road Warrior Remote VPN User Corporate Data Center Challenging providing same level of security for road warriors User experience suffers in large and/or long-haul offices HQ Long-haul
Protecting the distributed enterprise Cloud-enabled networks = local internet breakouts Road Warrior You re only as strong as your weakest point Remote VPN User Corporate Data Center Expensive and complicated to deliver the appliance stack where needed HQ Long-haul
Protecting the distributed enterprise It doesn t have to be this expensive or complicated Road Warrior Remote VPN User Corporate Data Center HQ
Protecting the distributed enterprise Local breakouts wherever you need them Uncompromised, Ubiquitous protection Road Warrior Remote VPN User Corporate Data Center Reduce MPLS WAN cost and footprint DMZ & Gateway Simplification/Con solidation HQ
In summary
Strategy enabled Network & Security Outcome CIO Priorities CEO & Business Priorities Secure, local Internet breakouts Cloud-based Internet Security as a Service Data Center and DMZ Consolidation Improved User Experience leads to more productive workforce, anywhere, anytime. Simplification of IT infrastructure equates to less overhead, reduced cost and complexity Cost Reduction and Avoidance means the business can increase R&D funding Agility achieved through a more dynamic workforce and ability to penetrate markets quickly Competitive Advantage faster market penetration via nimble workforce and reduced IT cost puts money back into business Innovation through enabling IoT and improved R&D from IT cost reduction
It s time to be BOLD Navigating business strategy requires thought leaders Today s threats put IT & Information Security on the front lines C-suite knows what s possible, so the find a way, or we'll find someone who will ultimatums exist Don't let it scare you, let it inspire you to: Challenge the status quo (it's dead anyway) Be disruptive Keep your seat at the table!
Questions?
Thank you!