End-to-End Secure Cloud Services. Pertino Perspective



Similar documents
End-to-end Secure Cloud Services a Pertino whitepaper

The High Availability and Resiliency of the Pertino Cloud Network Engine

What is Pertino? Introduction and Overview. A Pertino Product Perspective

Cloud Computing for SCADA

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

VMware vcloud Networking and Security Overview

How To Support Bring Your Own Device (Byod)

Securing the Service Desk in the Cloud

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

DLT Solutions and Amazon Web Services

Mobile Device Management

THE BLUENOSE SECURITY FRAMEWORK

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

nfrascale BACKUP Total Data Protection Physical, VM & Cloud

How To Protect Your Data From Harm

Advantages of Managed Security Services

White Paper How Noah Mobile uses Microsoft Azure Core Services

Reasons to Choose the Juniper ON Enterprise Network

The Essential Security Checklist. for Enterprise Endpoint Backup

CA Cloud Overview Benefits of the Hyper-V Cloud

Myth #1: Cloud is such a vague concept, it s impossible to know where to start.

An Introduction to Cloud Computing Concepts

NASCIO 2015 State IT Recognition Awards

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

OVERVIEW. Enterprise Security Solutions

Symantec Mobile Management 7.2

ADDING STRONGER AUTHENTICATION for VPN Access Control

BMC s Security Strategy for ITSM in the SaaS Environment

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Injazat s Managed Services Portfolio

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Security Overview Enterprise-Class Secure Mobile File Sharing

How cloud computing can transform your business landscape

Symantec Mobile Management for Configuration Manager 7.2

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

VDI Security for Better Protection and Performance

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

DNS Server Security Survey

SOFTWARE DEFINED NETWORKING

Accenture Cloud Platform Unlocks Agility and Control

Information Technology Strategic Plan /23/2013

Payment Card Industry Data Security Standard

How To Protect A Virtual Desktop From Attack

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Keyword: Cloud computing, service model, deployment model, network layer security.

Contact Center Security: Moving to the Cloud

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.

Safeguarding the cloud with IBM Dynamic Cloud Security

StratusLIVE for Fundraisers Cloud Operations

A HELPING HAND TO PROTECT YOUR REPUTATION

SaaS Security for the Confirmit CustomerSat Software

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Lecture 02b Cloud Computing II

WhitePaper. Private Cloud Computing Essentials

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

N e tw o r k -Enabled Cloud: Key C o n s i d e r a t i o n s

SECURING DATA IN TRANSIT

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

O p t i m i z i n g t h e N e t w o r k t o M e e t T o m o r r o w ' s I C T D e m a n d s

Cloud Roadmap to Success. October, 2014

Complete Cloud Solutions

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cloud Courses Description

Cloud Computing; What is it, How long has it been here, and Where is it going?

Leveraging SDN and NFV in the WAN

Microsoft Azure. White Paper Security, Privacy, and Compliance in

Troux Hosting Options

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Symantec Mobile Management 7.1

CloudCheck Compliance Certification Program

Security Considerations for Public Mobile Cloud Computing

Symantec Mobile Management 7.1

About me & Submission details

McAfee Next Generation Firewall

Moving Beyond User Names & Passwords

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

EXTENSIBLE WIDE AREA NETWORKING

Internet Content Provider Safeguards Customer Networks and Services

Hosted Virtual Desktops (VDI)

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

ediscovery and Search of Enterprise Data in the Cloud

Transcription:

Pertino Perspective

Table of Contents Executive summary...2 Cloud computing: A brief history...2 Latest technology and best practices... 2 Technical expertise... 2 The Pertino solution...3 innovative security... 3 State-of-the-art authentication... 3 Adaptive VPN and private IP addressing... 3 Secure BYOD connectivity... 4 Top-tier cloud hosting platforms... 4 Vulnerability assessments... 4 Additional Pertino benefits... 4 Summary...4 About Pertino...5 1

Executive summary Whether companies use the cloud as a conduit to connect remote locations and mobile users or simply use cloudbased applications, corporations have found they can reduce costs, complexity and management by leveraging cloud resources. Cloud security, however, remains a big concern. This paper examines how cloud-based services ensure their systems are secure and how any size business can confidently use the cloud for a variety of services from compute to storage and even networking when they add innovative, non-disruptive security measures from Pertino. Cloud computing: a brief history In 2002, shortly following the launch of Salesforce.com in 1999, Amazon became the first company to rent computing and storage resources to corporations on its existing cloud data centers through Amazon Web Services (AWS). Amazon then followed up with the Elastic Compute Cloud (EC2) in 2006, making cloud computing available to the masses with inexpensive and highly flexible computing, storage and application development tools. Rackspace, Microsoft and others followed, and Google launched its Cloud Platform services in 2012. Today, numerous vendors offer a multitude products and services that rely on cloud technologies. The birth, growth and market maturity of cloud computing depended on three technology breakthroughs: High-speed Internet access Virtualization of computing resources and storage Secure isolation of multiple cloud users (tenants) within one data center Of these, security was the final key to making cloud computing a success. Latest technology and best practices Cloud providers are continually upgrading and improving security technology on an aggressive schedule. This ensures the security of customer data and offers competitive advantages to both consumers and vendors. Continual upgrades: The most trusted cloud providers make certain that all management software, virtualization software, operating systems and application tools are upgraded as soon as possible. Security patches and upgrades always receive the highest priority. Best-of-breed hardware: As new and more secure hardware becomes available such as firewalls, switches and load balancers the best cloud providers rip-and-replace the old with the newest and best solutions available. Thoroughly vetted and tested upgrades: Before any upgrades are made to their networks, vendors perform rigorous testing on all new software and hardware prior to being put into production. This ensures that the upgrades perform as promised and pose no threat to customer computing requirements. Technical expertise Well-established, global cloud computing providers expend significant time, money, and research to ensure their systems are as secure as possible. Among their chief assets are experienced network professionals who are continually trained to maintain system security and reliability. These professionals bring a wealth of skills and expertise to cloud security, including: Security research: High-level professionals in cloud organizations continually research evolving threats, mitigation strategies and new technologies to provide the latest in security measures. Specialization: Cloud providers employ specialized teams that focus on specific security and reliability issues, providing a depth of knowledge not possible in many organizations. 2

Continual training: IT professionals at top-tier cloud providers undergo continual training to ensure they are proficient in the latest security mitigation and intrusion prevention technologies and practices. Security audits and best practice evaluations: Security professionals at top cloud organizations are regularly assessed and evaluated based on their performance and adherence to strict and ever-evolving leading practices in security technology. Pertino provides cloud-based networking services that add multiple, embedded security features to traditional enterprise-class networks. Customers do not sacrifice visibility or control and, in fact, simplify management while increasing security with Pertino services. Founded by experts in network security, Pertino s Cloud Networking platform is architected to exceed the security found in traditional networks. Innovative security Pertino adds innovative and cost-effective yet easy-to-manage security features to each customer s existing computing infrastructure. It works with security solutions that companies already have in place such as standard access controls and permissions. Most importantly, the Pertino Cloud Networking platform integrates the following technologies into a customer s existing network in one easy-to-deploy package: X.509 3-tier PKI Certificate Authority 256-bit AES encryption Cloaked IP addressing BYOD secure connectivity Dynamic, on-demand infrastructure Hosted on state-of-the-art cloud platforms In addition, Pertino has recruited and employs top experts in network security who perform the following critical tasks for securing corporate computing from the desktop to the cloud and back: Continually monitoring network traffic and security measures Ongoing education of evolving leading security practices Vulnerability assessments of the Pertino platform Pertino s experts work 24x7 to improve performance, reliability and security so that customers are relieved of the costs and management complexities of advanced, multi-layered cloud security. State-of-the-art authentication Pertino delivers industry-standard encrypted HTTPS authentication in tandem with the customer s existing access controls. In addition, Pertino s client-server communication leverages X.509 3-tier Certificate Authorities with trust chains administered in PKCS#12 format. Moreover, PKI certificates are signed using Elliptic Curve algorithms, and asymmetric keys are used for encryption/decryption using Diffie-Hellman key exchanges. This is the highest level of protection and ensures that only authorized devices are allowed access to the network. Adaptive VPN and private IP addressing Unlike traditional VPN appliances, Pertino VPNs reside on an overlay network infrastructure that is allocated and migrated on-demand, appearing as a moving target to any would-be attackers. If a node within the network experiences unacceptable performance, such as from a DDoS attack, Pertino s monitoring system detects the outage and reallocates resources while maintaining the integrity of the customer s network. Each network instance is private not shared with its own virtual data-plane and address space, and since the majority of network attacks 3

are address-borne, this design effectively cloaks Pertino networks and their users. Secure BYOD connectivity The same 256-bit encryption, device authorization, adaptive VPN and IP address cloaking is deployed on mobile devices as well. This elevates mobile device security to the same enterprise level as any other Pertino-protected network device. Pertino currently supports laptops, smartphones and tablets with simple software-based agents that are unobtrusive and do not interfere with the functionality and flexibility that these devices are designed to offer. Top-tier cloud hosting platforms The Pertino Cloud Network Engine lies deep within the security infrastructure of top-tier hosting providers and offers complete tenant isolation through process-level segregation, integrated encryption libraries and certificate authentication. The Pertino Networking platform delivers state-of-the-art protection from data snooping, distributed denial of service (DDoS) attacks, replay attacks and other persistent attacks or threats. Vulnerability assessments Pertino has undergone extensive vulnerability assessments of its service by independent, industry-recognized security analysts. In all cases, Pertino has met or surpassed analysts rigorous testing. Pertino is committed to continuing this practice to assure its customers that it is delivering the most comprehensive and secure solution on the market today and in the future. Additional Pertino benefits By building on the robust security and reliability of top-tier cloud facilities, the Pertino Cloud Network Engine delivers clear advantages, including the following: A global, redundant network of cloud hosted infrastructure for anytime/anywhere connectivity Lower maintenance costs and more flexibility than other networking solutions Zero modification to existing network infrastructure No need for continual hardware/software upgrades as new threats arise The ability to decommission any device such as a lost or stolen laptop with one click An easy way to add or remove end-users and their devices Because Pertino is a service, it reduces any capital or operating expenses and is constantly upgrading its security posture and expanding its global reach. Therefore, customers get best-of-breed security that most could never afford to implement on their own. Summary Cloud services are highly secure, even for general network services. Best-of-breed cloud platforms offer an economy of scale that allows customers to implement the most robust network solutions available. Pertino leverages these best-of-breed cloud vendor infrastructures and adds security capabilities that go far beyond what most companies have the expertise or budget to implement on their own. In this way, Pertino augments company security with the latest technology that is non-disruptive, works with security measures already in place and, best of all, is easy to manage. With Pertino, customers get the best of both worlds the cost-savings of cloud services and the best security possible. 4

About Pertino Pertino is a modern way to network designed for the mobile and cloud era simple, secure and delivered as a service. Mobile and cloud technologies are transforming IT, resulting in a hybrid IT model where mobile workforces and cloud applications and workloads are reliant on public Internet connectivity. Our Cloud Network Engine enables any size business to build and manage a private cloud network that overlays the public Internet, securely connecting people, devices and resources anywhere. With AppScape, our network services app store, Pertino cloud networks can be extended with enterprise-level visibility, security and control services. This modern approach to networking combines the power and pervasiveness of the cloud with SDN and virtualization technologies, eliminating the cost and complexity of traditional hardware-based networks. Finally, a wide-area network that is cloud-agile and works the way businesses work today, without hardware, hassles, or high costs. Founded in 2011, Pertino is venture funded by premier firms and headquartered in Los Gatos, Calif. For more information or to try Pertino free, please visit pertino.com. Pertino VPN to the power of the cloud Pertino cloud networking lets IT pros create secure, optimized cloud networks in minutes, add people and devices instantly and deploy network services on demand. No hardware, no configuration and no hassle. Go to Pertino.com to get started it s free. Contact Us Pertino.com 973 University Ave. Los Gatos, CA 95032 +1.408.502.5401 info@pertino.com 5 Try Pertino Free > Copyright @ 2015, @ 2015, Pertino, Pertino, Inc. Inc.