Vertrauen in Cloud Dienste schaffen



Similar documents
Symantec Endpoint Security Management Solutions Presentation and Demo for:

Better Together: Microsoft Office 365 & Symantec Office 365

Public, Private, Hybrid:

Integrating MSS, SEP and NGFW to catch targeted APTs

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

On and off premises technologies Which is best for you?

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

1518 Best Practices in Virtualization & Cloud Security with Symantec

How RSA has helped EMC to secure its Virtual Infrastructure

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Symantec Consulting Services

IBM Security Strategy

#ITtrends #ITTRENDS SYMANTEC VISION

Mobile Security and Management Opportunities for Telcos and Service Providers

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

Is Your Vendor CJIS-Certified?

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Secure Your Mobile Workplace

Required Software Product List

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Unified Security, ATP and more

Protect Root Abuse privilege on Hypervisor (Cloud Security)

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Confidence in the Cloud Five Ways to Capitalize with Symantec

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

How To Protect Your Cloud From Attack

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

Cisco ASA und FirePOWER Services

End to End Security do Endpoint ao Datacenter

Securing OS Legacy Systems Alexander Rau

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Symantec Protection Suite Add-On for Hosted and Web Security

Cloud Courses Description

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Uncover security risks on your enterprise network

Safeguarding the cloud with IBM Dynamic Cloud Security

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud Courses Description

Security Issues in Cloud Computing

/Endpoint Security and More Rondi Jamison

Injazat s Managed Services Portfolio

Payment Card Industry Data Security Standard

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Logging In: Auditing Cybersecurity in an Unsecure World

Virtualization Journey Stages

Required Software Product List

The Education Fellowship Finance Centralisation IT Security Strategy

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

INFORMATION PROTECTED

anomaly, thus reported to our central servers.

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

INCIDENT RESPONSE CHECKLIST

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Sichere Virtualisierung mit VMware

Visions of Clouds and Cloud Security. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Assessing Risks in the Cloud

Securing the endpoint and your data

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Endpoint protection for physical and virtual desktops

VMware Integrated Partner Solutions for Networking and Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Cloud Data Security. Sol Cates

The Evolution of Application Monitoring

Defending Against Data Beaches: Internal Controls for Cybersecurity

ORGANIZADOR: APOIANTE PRINCIPAL:

Endpoint protection for physical and virtual desktops

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Infrastruktur Sicherheit mit Checkpoint

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

What Cloud computing means in real life

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

SYMANTEC DATA CENTER SECURITY: MONITORING EDITION 6.5

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Industrial Security for Process Automation

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Transcription:

Vertrauen in Cloud Dienste schaffen Symantec Übersicht Thomas Hemker, CISSP Security Strategist

Thomas Hemker 18 Jahre IT Security Security CTO Team CISO Kontakt Beratung CISSP Security Strategist Thomas_hemker@symantec.com @TheSecurityInfo Sprecher, Experte ISF, (ISC)2, ISACA, TeleTrust, Bitkom, OASIS 2

Hintergrund Cloud Nutzung, Betrieb, Bereitstellung Schwachstellenverlagerung, Datenschutz Fehlendes Vertrauen der Kunden Technologie für die Absicherung von Cloudbetrieb und Nutzung Security als Service aus der Cloud Baustein für die IT/Security Strategie/Programm 3

Themen Cloud Security Sicherer Betrieb einer Cloud Sichere Cloud Nutzung Security aus der Cloud 4

Cloud Security 5

Cloud und Security Datenschutz Compliance- Anforderungen AudiTerungen Verträge/SLAs Unsachgemässe Public- Cloud Nutzung Mobile Anwendungen /Backends Gezielte Angriffe Etc. 6

Auch Angreifer nutzen Cloud- Dienste Attackers leverage Cloud Resources DDoS SPAM Command & Control Server Distribution of Malware Password Cracking 7

Sicherheitsbedenken Malicious Insider beim Hoster Fehlende Verschlüsselung Fehlende Backup Lösungen Lock- In Unsichere Schni^stellen und APIs Probleme durch shared Architecture Data Loss oder Leakage Account oder Service Hijacking Unbekanntes Risiko- Profil 8

Cloud Security Alliance SECTION I Domain 1 CLOUD ARCHITECTURE Cloud CompuTng Architectural Framework SECTION II Domain 2 Domain 3 Domain 4 Domain 5 Domain 6 GOVERNING IN THE CLOUD Governance and Enterprise Risk Management Legal and Electronic Discovery Compliance and Audit InformaTon Lifecycle Management Portability and Interoperability 9

Cloud Security Alliance SECTION III Domain 7 Domain 8 Domain 9 Domain 10 Domain 11 Domain 12 Domain 13 OPERATING IN THE CLOUD TradiTonal Security, Business ConTnuity, and Disaster Recovery Data Center OperaTons Incident Response, NoTficaTon, and RemediaTon ApplicaTon Security EncrypTon and Key Management IdenTty and Access Management VirtualizaTon 10

Security Strategie / Programm 11

Well- meaning & Malicious Users Vulnerable PracTces/ Systems Information Cyber Threats Targeted A^acks 12

Sicherer Betrieb einer Cloud 13

Symantec Data Center Security Server protection Asset discovery and management Configuration assessment Intrusion detection and prevention Virus and malware protection Threat protection Vulnerability management Policy based security Correlation and analytics Security intelligence CCS Standards Manager and transactonal security for specific applicatons NIPS on SEP, DLP, Cisco OEM + Sym NIPS VMWare OEM + Sym NIPS SEP on server, CSP, CCS Standards Manager, DLP, EncrypTon Data Center Management & AnalyXcs Compliance Risk management Security incident management Security alerts Gap analysis and remediation Groupware, ProtecTon Engine, DLP, Data Insight, enttlements 14

Data Center: ProakXver Schutz (Physical/Virtual) Harden & Protect VMware Infrastructure Protect Domain Controllers Address PCI Compliance Requirements Stop Zero Day A^acks Shield Embedded Systems 15

Beispiel: VMWare vsphere VMware Management Virtual Infrastructure VMware ESX Linux O.S. CCS VSM VMware ESXi CSP Agent CSP Secures virtual environment operating system Additionally provides monitoring for virtual ESXi environment CCS Virtual Guest Compliance Virtual Infrastructure Compliance VM ESX(i), vsphere, Guest VM Monitor configuration compliance VSM Minimize cost of Audit - PCI, Privacy Physical location segregation Trust level segregation Granular Access Control Advanced Audit Logging Detailed logging of denied actions Additional fields for context CCS VSM/CSP and CCS ProtecTng Your Virtual World 16

Beispiel: Compliance Report 17

Sichere Cloud- Nutzung 18

Symantec Security Gateway DLP Web Gateway EncrypXon Email Gateway Web Security.cloud O3 Gateway VIP Email Security. cloud MPKI 19

Beispiel: Sichere Nutzung von Cloud Services Cloud IdenTty & Access Control Control Cloud InformaTon Security Security Private Cloud Cloud InformaTon Management Compliance 20

Symantec Endpoint Security On Premises Cloud- based DLP Security Mgmt. Device Mgmt. EncrypXon ApplicaXon Mgmt. 21

Beispiel: Sichere Dropboxnutzung aus ios 22

Security aus der Cloud 23

Security as a Service Intelligence 24

Symantec IS Security Intelligence 7 Billion File, URL & IP ClassificaXons 1 Billion+ Devices Protected 2.5 Trillion Rows of Security Telemetry 550 Threat Researchers 240 Million+ ContribuXng Users & Sensors 14 OperaXons & Response Centers 25

Beispiel: Sichere AuthenXfizierung Benutzer Unternehmen VIP Service Consumer Portal, Business Partner Extranet Corporate Network OTP PKI Token-less RBA 26

Protect Control Secure Recover Email Web Skeptic TM AnT- Virus AnT- Spam AnT- Virus AnT- Spyware Content Control Image Control URL Filtering Boundary EncrypTon Policy Based EncrypTon Archiving ConTnuity IM AnT- Virus AnT- Spam Content Control Endpoint Hosted Endpoint ProtecTon

Symantec und Service Provider SaaS & IT Outsourcing Enablement New Outsourcing Services Neuer IT Managed Service / Outsourcing Umsatz Consumer Markets SMB & Enterprise Services Powered By Symantec Clean Pipe Service Managed End Point Backup- as- a- Service Archiving- as a- Service Security- as- a- Service Data Loss PrevenTon Disaster Recovery Services Storage- as- a- Service Compliance AutomaTon 28

Symantec Lösungen - Übersicht New Higher-Value Offerings User ProducXvity & ProtecXon Mobile Workforce Productivity Norton Protection Norton Cloud InformaXon Security Information Security Service Identity/Content-aware Security Gateway Data Center Security InformaXon Management: Availability & Scalability Business Continuity Integrated Backup Object Storage Platform 29 29

Zusammenfassung Steigende Anforderungen (Richtlinien, Regulierung) AudiTerbarkeit Fehlendes Vertrauen Transparenz Hybride Lösungen Neue Security Technologie Compliance Ansatz kann gut funktonieren 30