cloud security for dummies webinar — the identity edition

Click here to load reader

Post on 21-Jan-2018

1.603 views

Category:

Technology

0 download

Embed Size (px)

TRANSCRIPT

  1. 1. Meet the Presenters Ravi Ithal Chief Architect, Netskope Krishna Narayanaswamy Chief Scientist, Netskope Patrick Harding Chief Technology Officer, Ping Identity
  2. 2. What Well Discuss Short commercial break: Introducing Ping and Netskope Cloud Security for Dummies the 10 must haves Three must have examples Secure access to apps Audit activities and data Enforce granular policies What makes a great cloud security policy? Q&A
  3. 3. Confidential do not distribute Copyright 2015 Ping Identity Corp. All rights reserved. 4 ENABLING ENTERPRISEACCESS, SECURELYAND SEAMLESSLY MARKET LEADERSHIP Over 50% of the Fortune 100 4 of the 6 largest US banks 8 of the 10 largest biopharmas 3 of the 5 largest healthcare plans SI, TECH AND SAAS PARTNERS 1,500 GLOBAL ENTERPRISES GLOBAL CUSTOMER SUCCESS 98%customer satisfaction 96%customer retention Denver, San Francisco, Boston, Vancouver, London, Tel Aviv, Tokyo, Singapore STANDARDS BODY PARTICIPATION
  4. 4. GLOBAL LEADERS UNDERSTAND TRADITIONAL SECURITY IS INEFFECTIVE a new approach to enterprise securityflipping common corporate security practice on its headaccessed from anywhere with the right device and user credentials. The old notion of a network perimeter that can be defended by firewalls that are often hardware- based and security appliances is long out of date
  5. 5. Strong technology integration and services partnerships 2015 Netskope. All Rights Reserved. 6 Discover cloud apps and assess risk Govern all apps and data Safely enable sanctioned cloud apps $131.4M from top Silicon Valley VCs Early investors in Atlassian, Box, Cloudera, Nimble Storage, Yammer What we do Partners Investors 200+ employees globally, including North America, throughout Europe, and Asia-Pacific Early architects/executives from Palo Alto Networks, NetScreen, Cisco, McAfee, VMware 40+ patent claims across four categories Team
  6. 6. 2015 Netskope. All Rights Reserved. Organizations of all types need cloud security 7 High Tech Financial Healthcare Oil & Gas/Utility Retail/Hospitality Manufacturing/Other FROM MID-SIZE TO LARGE TO GLOBAL
  7. 7. 2015 Netskope. All Rights Reserved. v 8 IT estimate: 40-50 App Redundancy: 64 Marketing 47 Collaboration 40 HR 40 Finance 37 Productivity 34 Cloud Storage Actual: 715
  8. 8. Traditional Perimeter Based Security Confidential do not distribute Copyright 2014 Ping Identity Corp. All rights reserved. 10 Users Apps IaaS SaaS Employees/BYOD Customers/Partners The perimeter approach works great when all your assets are inside of it. But now they arent. Now what?
  9. 9. Identity Defined Security
  10. 10. 12 Data breaches continue to wreak havoc in 2015 786,098,214 records exposed 18% of files in cloud apps constitute a policy violation. 22% of those files are shared publicly Use of cloud can increase the probability of a major data breach by 3x Risk factors span cloud apps, users, activities, and data Source: http://www.idtheftcenter.org/id-theft/data-breaches.html Source: https://www.netskope.com/reports/ponemon-2014-data-breach-cloud-multiplier-effect Source: Q2 2015 Netskope cloud report
  11. 11. 13 and human error
  12. 12. Ten Must Haves for Safe Cloud Enablement 14 Discover apps and assess risk Segment apps sanctioned/unsanctioned Secure access to apps with SSO and strong authentication Audit activities user/admin/data Understand content to, from, and in apps Detect anomalies risky behavior, security threats Enforce granular policies in real-time, across any app Protect data in context who, what, where, activity, data Ensure compliance audit trails, remediation, reporting Coach users via conversations and automated
  13. 13. 1. AUTHENTICATE 2. ACCESS CLOUD ACCESS SECURITY BROKER SAAS PUBLIC / PRIVATE CLOUD APPS & APIs ON-PREM APPS & APIs ENTERPRISE MOBILITY MANAGEMENT THREAT / FRAUD DETECTION SERVICES AUTHENTICATION & DIRECTORY SERVICES ACCESS SECURITY AUTHORITY CLIENTS & USERS AUTHENTICATION & FEDERATION AUTHORITY Secure Enterprise Cloud & Mobile Architecture
  14. 14. Seamless Integration Netskope and Ping Identity
  15. 15. What Makes a Great Policy?
  16. 16. Confidential do not distribute Multi-Factor Access ControlContextual AuthN Provisioning INTERNET SCALE FEDERATED ARCHITECTURE ALL IDENTITI ES WEB, MOBILE & API FLEXIBLE DEPLOYMENT SIX DESIGN PRINCIPLES BUILT ON STANDARDS Best Practices Next Generation IAM +
  17. 17. Confidential do not distribute Workforce Best of Both INTERNAL APPS SAML Many more SAML FEDERATED SINGLE SIGN-ON BASIC SINGLE SIGN-ON EMPLOYEES CORPORATE PORTAL
  18. 18. 20 SANCTIONED UNSANCTIONED
  19. 19. 2015 Netskope. All Rights Reserved. 21 App Introspection Inspection Secure content in the app, no matter when uploaded Secure content en route to or from the app
  20. 20. 22 User Location Device Time Activity Context Content Risk w/Whom
  21. 21. Allow is the new block (allow is new block green light slide) 23
  22. 22. Tomorrow's secure enterprise starts today
  23. 23. 2015 Netskope. All Rights Reserved. Thanks for Attending. Questions? 25 [email protected], @patrickharding [email protected], @ravi_ithal [email protected], @Krishna_Nswamy [email protected], @pingidentity [email protected], @netskope