cloud security for dummies webinar — the identity edition

25

Upload: netskope

Post on 21-Jan-2018

1.611 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cloud Security for Dummies Webinar — The Identity Edition
Page 2: Cloud Security for Dummies Webinar — The Identity Edition

Meet the Presenters

Ravi IthalChief Architect,

Netskope

Krishna NarayanaswamyChief Scientist,

Netskope

Patrick HardingChief Technology Officer,

Ping Identity

Page 3: Cloud Security for Dummies Webinar — The Identity Edition

What We’ll Discuss

• Short commercial break: Introducing Ping and Netskope

• Cloud Security for Dummies – the 10 “must haves”

• Three “must have” examples

• Secure access to apps

• Audit activities and data

• Enforce granular policies

• What makes a great cloud security policy?

• Q&A

Page 4: Cloud Security for Dummies Webinar — The Identity Edition

Confidential — do not distributeCopyright © 2015 Ping Identity Corp. All rights reserved.

4

ENABLING ENTERPRISE ACCESS,

SECURELY AND SEAMLESSLY

MARKET LEADERSHIP

Over 50% of the Fortune 100

4 of the 6 largest US banks

8 of the 10 largest biopharmas

3 of the 5 largest healthcare plans

SI, TECH AND SAAS PARTNERS

1,500 GLOBAL ENTERPRISES GLOBAL CUSTOMER SUCCESS

98%customer

satisfaction

96%customerretention

Denver, San Francisco, Boston,

Vancouver, London, Tel Aviv, Tokyo,

SingaporeSTANDARDS BODY PARTICIPATION

Page 5: Cloud Security for Dummies Webinar — The Identity Edition

GLOBAL LEADERS UNDERSTAND

TRADITIONAL SECURITY IS

INEFFECTIVE

“…a new approach to enterprise

security…flipping common corporate

security practice on its head…accessed

from anywhere with the right device and

user credentials.”

“…The old notion of a network

perimeter that can be defended by

firewalls that are often hardware-

based and security appliances is long

out of date…”

Page 6: Cloud Security for Dummies Webinar — The Identity Edition

‣ Strong technology integration and services

partnerships

© 2015 Netskope. All Rights Reserved.

6

‣ Discover cloud apps and assess risk

‣ Govern all apps and data

‣ Safely enable sanctioned cloud apps

‣ $131.4M from top Silicon Valley VCs

‣ Early investors in Atlassian, Box, Cloudera,

Nimble Storage, Yammer

What we do

Partners Investors

‣ 200+ employees globally, including North

America, throughout Europe, and Asia-Pacific

‣ Early architects/executives from Palo Alto

Networks, NetScreen, Cisco, McAfee, VMware

‣ 40+ patent claims across four categories

Team

Page 7: Cloud Security for Dummies Webinar — The Identity Edition

© 2015 Netskope. All Rights Reserved.

Organizations of all types need cloud security

7

High Tech Financial Healthcare

Oil & Gas/Utility Retail/Hospitality Manufacturing/Other

FROM MID-SIZE… TO LARGE… …TO GLOBAL

Page 8: Cloud Security for Dummies Webinar — The Identity Edition

© 2015 Netskope. All Rights Reserved.

v

8

IT estimate:

40-50

App Redundancy:

‣ 64 Marketing

‣ 47 Collaboration

‣ 40 HR

‣ 40 Finance

‣ 37 Productivity

‣ 34 Cloud Storage

Actual:

715

Page 9: Cloud Security for Dummies Webinar — The Identity Edition
Page 10: Cloud Security for Dummies Webinar — The Identity Edition

Traditional Perimeter Based Security

Confidential — do not distributeCopyright © 2014 Ping Identity Corp. All rights reserved.

10

Users Apps

IaaS

SaaS

Employees/BYOD

Customers/Partners

The perimeter approach works

great when all your assets are

inside of it.

But now they aren’t.

Now what?

Page 11: Cloud Security for Dummies Webinar — The Identity Edition

Identity Defined Security

Page 12: Cloud Security for Dummies Webinar — The Identity Edition

12

Data breaches continue

to wreak havoc in 2015

786,098,214 records exposed

18% of files in cloud apps

constitute a policy violation.

22% of those files are shared publicly

Use of cloud can increase

the probability of a major

data breach by 3x

Risk factors span

cloud apps, users,

activities, and data

Source: http://www.idtheftcenter.org/id-theft/data-breaches.html

Source: https://www.netskope.com/reports/ponemon-2014-data-breach-cloud-multiplier-effect

Source: Q2 2015 Netskope cloud report

Page 13: Cloud Security for Dummies Webinar — The Identity Edition

13and human error

Page 14: Cloud Security for Dummies Webinar — The Identity Edition

Ten “Must Haves” for Safe Cloud Enablement

14

Discover apps

and assess risk

Segment apps

sanctioned/unsanctioned

Secure access to apps

with SSO and strong authentication

Audit activities

user/admin/data

Understand content

to, from, and in apps

Detect anomalies

risky behavior, security threats

Enforce granular policies

in real-time, across any app

Protect data in context

who, what, where, activity, data

Ensure compliance

audit trails, remediation, reporting

Coach users

via conversations and automated

Page 15: Cloud Security for Dummies Webinar — The Identity Edition

1. AUTHENTICATE

2. ACCESS

CLOUD ACCESS

SECURITY BROKER

SAAS

PUBLIC / PRIVATE CLOUD

APPS & APIs

ON-PREM

APPS & APIs

ENTERPRISE MOBILITY

MANAGEMENT

THREAT / FRAUD

DETECTION SERVICES

AUTHENTICATION &

DIRECTORY SERVICES

ACCESS SECURITY

AUTHORITY

CLIENTS & USERS

AUTHENTICATION & FEDERATION AUTHORITY

Secure Enterprise Cloud & Mobile Architecture

Page 16: Cloud Security for Dummies Webinar — The Identity Edition

Seamless Integration – Netskope and Ping Identity

Page 17: Cloud Security for Dummies Webinar — The Identity Edition

What Makes a Great

Policy?

Page 18: Cloud Security for Dummies Webinar — The Identity Edition

Confidential — do not distribute

Multi-Factor

Access ControlContextual AuthN

Provisioning

INTERNET

SCALE

FEDERATED

ARCHITECTURE

ALL

IDENTITI

ES

WEB, MOBILE

& API

FLEXIBLE

DEPLOYMENT

SIX DESIGN PRINCIPLES

BUILT ON

STANDARDS

Best Practices – Next Generation IAM

+

Page 19: Cloud Security for Dummies Webinar — The Identity Edition

Confidential — do not distribute

Workforce – Best of Both

INTERNAL APPS

SAML

Many more

SAMLFEDERATED SINGLE SIGN-ON

BASIC SINGLE SIGN-ON

EMPLOYEES

CORPORATE

PORTAL

Page 20: Cloud Security for Dummies Webinar — The Identity Edition

20

SANCTIONED UNSANCTIONED

Page 21: Cloud Security for Dummies Webinar — The Identity Edition

© 2015 Netskope. All Rights Reserved.

21

App“Introspection”

“Inspection”

Secure content in the app,

no matter when uploaded

Secure content en route

to or from the app

Page 22: Cloud Security for Dummies Webinar — The Identity Edition

22

User Location Device

Time

Activity

Context

Content

Risk

w/Whom

Page 23: Cloud Security for Dummies Webinar — The Identity Edition

Allow is the new block (allow is new block green light slide)

23

Page 24: Cloud Security for Dummies Webinar — The Identity Edition

Tomorrow's secure enterprise starts today™

Page 25: Cloud Security for Dummies Webinar — The Identity Edition

© 2015 Netskope. All Rights Reserved.

Thanks for Attending. Questions?

25

[email protected], @patrickharding

[email protected], @ravi_ithal

[email protected], @Krishna_Nswamy

[email protected], @pingidentity

[email protected], @netskope