Looking Ahead The Path to Moving Security into the Cloud



Similar documents
Security Issues in Cloud Computing

V1.4. Spambrella Continuity SaaS. August 2

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

IBM Internet Security Systems

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Cisco Cloud Security Interoperability with Microsoft Office 365

Analyzing HTTP/HTTPS Traffic Logs

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Symantec Endpoint Protection

Putting Web Threat Protection and Content Filtering in the Cloud

Unified Threat Management, Managed Security, and the Cloud Services Model

How to Grow and Transform your Security Program into the Cloud

INTRODUCING isheriff CLOUD SECURITY

IBM EXAM QUESTIONS & ANSWERS

Symantec Protection Suite Add-On for Hosted and Web Security

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Symantec Protection Suite Small Business Edition

How To Manage Security On A Networked Computer System

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Websense Web Security Solutions

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Cloud App Security. Tiberio Molino Sales Engineer

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

How To Protect Your Data From Being Hacked On Security Cloud

Cisco Advanced Malware Protection

Public, Private, Hybrid:

INFORMATION PROTECTED

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Intelligent, Scalable Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

F-Secure Internet Security 2014 Data Transfer Declaration

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Mailwall Remote Features Tour Datasheet

Cloud Security Introduction and Overview

Security as a Service: Business Decision Factors

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

End to End Security do Endpoint ao Datacenter

Symantec Protection Suite Small Business Edition

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Injazat s Managed Services Portfolio

Next-Generation Firewalls: Critical to SMB Network Security

The Advantages of Security as a Service versus On-Premise Security

WildFire. Preparing for Modern Network Attacks

IBM Security IBM Corporation IBM Corporation

Cisco Advanced Malware Protection for Endpoints

The Netskope Active Platform

isheriff CLOUD SECURITY

Symantec Protection Suite Small Business Edition

Superior protection from Internet threats and control over unsafe web usage

Zscaler Internet Security Frequently Asked Questions

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Cisco Advanced Malware Protection for Endpoints

Unified Security, ATP and more

For additional information and evaluation copies of Trend Micro products and services, visit our website at

Firewall and UTM Solutions Guide

Secure Cloud Computing

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Time to Value: Successful Cloud Software Implementation

Endpoint protection for physical and virtual desktops

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

Concierge SIEM Reporting Overview

Meeting the Challenges of Virtualization Security

Top 10 Reasons Enterprises are Moving Security to the Cloud

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

SERVER CAL SUITES COMPONENT PRODUCT SPECIFIC DETAIL. Product

Symantec Endpoint Protection

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Cloud Security - Risiken und Chancen

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

DUBEX CUSTOMER MEETING

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

The Hillstone and Trend Micro Joint Solution

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite


GETTING THE MOST FROM THE CLOUD. A White Paper presented by

Cisco Small Business ISA500 Series Integrated Security Appliances

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Managing Cloud Computing Risk

5 Steps to Advanced Threat Protection

SourceFireNext-Generation IPS

Attacks from the Inside

Journey to the Private Cloud. Key Enabling Technologies

Symantec Endpoint Protection

Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER

End-to-End Application Security from the Cloud

IBM Endpoint Manager Product Introduction and Overview

SaaS & Cloud Application Development & Delivery

Delivering Managed Services Using Next Generation Branch Architectures

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Secure , Calendar, Contacts, Tasks, File sharing and Notes across devices

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

GoodData Corporation Security White Paper

Database Security, Virtualization and Cloud Computing

Transcription:

Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate

Agenda The Changing Threat Landscape Evolution of Application Delivery Delivering Real World Security Applications via SaaS

The Changing Threat Landscape Financially motivated, computer generated malware Number of variants is growing sharply From Destructive to Stealth Vulnerabilities in well known and broadly used software are common attack vectors Leveraging technology to increase effectiveness and avoid detection Encryption, Rootkits, Code Injection, Polymorphic, ADS, Social Networking sites are increasingly used as a distribution mechanism Shortened URLs, User contributed content Malware research and protection more challenging

The Need for Change Explosion of malware variants is challenging traditional security approaches Short lifetime (hours to days) but fast mutation More bad files than good files Long tail issue Blacklisting vs. whitelisting Relevance, Prevalence, Reputation are key to successful protection Multiple Entry Points into Networks Mobile Users and De-Perimeterization

Expand your Infrastructure! Buy new servers, increase your software costs, provision more datacenter capacity!!

Look to the cloud! Pay for the bandwidth and server resources that you need. When your job is done then turn the whole thing off!

What is the Cloud Anyway? Infrastructure as a service The infrastructure (hardware, networking, virtualization) in the cloud as the foundation for cloud applications Platform as a service Software development platforms in the cloud to develop cloud applications Software as a service Pay-as-you-Go solutions/application delivered in the cloud via the Browser. Application Platform Infrastructure

The Evolution of Application Delivery Traditional On Premise Installed Application On premise hardware, server, network, database, backup provisioning at customer Ongoing maintenance and management performed by customer Customer is responsible for providing logical and physical security Typically lengthy rollout/update cycles Managed Service Application Applications installed, managed and maintained by a third party High involvement of human resources for application management Installation on customer premise or also centralized model Most applicable for highly specialized applications Typically single tenant (dedicated systems) off-the-shelf applications Software as a Service (SaaS) Typically no (or very limited) on-premise hw, server, database, backup SaaS provider is responsible for all maintenance, management, infrastructure Application usage via browser Economy of scale due to full automation from the provider Fast rollout and innovation/update cycles Multi tenant architecture (multiple customers share some or all layers of the stack)

SaaS Deployment Models Pure SaaS application Web browser is single interface point with customer All intelligence is centralised at SaaS provider Limited integration between customer and SaaS provider Examples: CRM, Email filtering, Payroll, Customer support applications SaaS with customer side software agent Web browser is interface point with customer Additional small client-side software agent (permanent or transient) Enables stronger integration of customer systems and SaaS service Examples: Application sharing, Web-filtering, Online-Backup SaaS with customer side appliance Web browser is interface point with customer Additional hardware appliances (remotely managed) on customer premise Enables deep integration of customer systems with SaaS providers Examples: Intrusion Detection, Security Management, Vulnerability Assessment

SaaS Deployment Architecture Customer Customer Customer Global Load Balancing and Security Presentation/Web Layer API Interfaces Application Logic / Data Segregation Persistent & Redundant Storage Layer High Speed Data Processing Engines

Why Security SaaS makes Sense Subscription model (pay as you go, per user, per time) Reduced risk (performance, uptime, reliability, scalability) Lower rollout cost No additional IT overhead Rapid deployment and implementation Compliance requirements (audit trails, archiving, logging) Allows to focus on core business

Security as a Service Delivering Real World Security Applications via the SaaS Model

SaaS based Web Security and Content Filtering Web is primary delivery vehicle for malware with explosion of malware variants Multi-engine approach is required Global and aggregate traffic and threat view allows better decision making Moving protection layer closer to the source of the malware Analyze inbound and outbound HTTP content in the cloud Transparently filter and remove malware and categorize/block unwanted websites

SaaS based Email Filtering and Management Increasing spam and email-born malware (high network bandwidth utilization) Routing inbound and outbound emails for analysis through cloud based filter Multi-level engine approach to catch spam, zeroday exploits, virus, Spyware Moving protection layer closer to the source of spam/malware Tracking content leaks

SaaS based Vulnerability and Compliance Mgmt Audit, security assessment, and compliance management Discovery, assessment, and prioritization Internal and external view Validation against security policies Remediation tracking

SaaS based Endpoint and Mobile Threat Security First Generation (heavy client) All scanning and detection local - definitions downloaded regularly Second Generation Submit metadata from unknown executable to the cloud for classification Real-time query the cloud (i.e. URLs, Hashes) Third Generation (thin client) Fully cloud based filtering and blocking Leverage reputation data from the cloud

Why the Cloud matters for Security Applications Increased computing power Elasticity and Instant Scalability Multiple engines in parallel Compression/Decompression Offloading heavy processing from the client Unlimited memory and disk storage Storage for white and blacklists Know what is relevant Visibility into traffic patterns Reputation (user votes vs. automated reputation scoring) Life attack data from clients Malware spidering Utility Model / Pay per use Turn fixed cost into variable cost Reliability and Geo Redundancy Service Orientation and APIs Economies of Scale

Critical Success Factors with Cloud Approach Latency Communication overhead Protocol choices, Bandwidth availability Local caching Security, Privacy What needs upload (amount, content) Encryption of data in transit and at rest Availability Load balancing, Redundancy

Questions to Ask your Cloud / SaaS Provider SaaS provider profile and financial strength Quality and presence of provider s customer support Existing customers and Service renewal rates Technology Innovation and Update Cycle Service Level Commitments (SLA s)

Service Levels and Availability Service availability and reliability Latency and performance Effectiveness Accuracy Security Availability % Downtime per Month 99% 7.20 hours 99.9% 43.2 minutes 99.99% 4.32 minutes 99.999% 25.9 seconds SLAs should be objectively defined and regularly measured and reported by the provider SLAs should be enforced through clear consequences

Security Considerations Data storage model and architecture (encryption) User account management (provisioning, roles, permissions) Identity management (single-sign-on) Security process and certifications (SAS 70, SSAE 16, ISO) Backup, recovery, physical hosting facilities Business continuity

The Inside View from a SaaS Provider Known platform provides better application quality Global deployment and distribution Simple application/revision management Load management and scale driven by business growth Global and Instant update for all customers Ability to scale quickly - unlimited scalability Integrate and deliver best-of-breed technologies Strong customer commitment and support is critical

How to Apply What You Have Learned Today In the first three months following this presentation you should: Review your security applications for management overhead Evaluate the feasibility of a Cloud/SaaS based approach for such applications Assess the pros and cons of a Cloud/SaaS approach in your environment Define requirements and identify the risks and success factors of a Cloud based architecture Within six months you should: Identify service level requirements according to your organization s needs Launch a pilot program for SaaS 23

Summary Cloud infrastructure and SaaS are significantly improving effectiveness and manageability of Security technology SaaS empowers the user/customer - delivers a high level of customer commitment and service, as switching is relatively easy Security and Privacy are major factors in the adoption of SaaS/Cloud A lot of people think they will make a lot of money so there is lots of hype, but the cloud is something fundamental.

Thank You Q&A Gerhard Eschelbeck ge@sophos.com