is your managed file transfer (mft) ready for cyber threats?

25
Is Your MFT Ready for Digital?

Upload: axway

Post on 21-Feb-2017

64 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Is Your MFT Ready for Digital?

Page 2: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Every meeting;

35%

Most meetings:

46%

Only after internal or industry incident:

10%

Only after the recent string

of high-profile

breaches or breaches in

our industry:

8% Never: 1%

Cybersecurity in the Boardroom, a 2015 survey NYSE Governance Services

Page 3: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

4

By 2020, 30%Of enterprises believe that security is a major concern while adopting digital technologies

70%

42%of them have not sufficiently invested in the requisite level of security in their IT infrastructure ecosystem

Infrastructure Services – Annual Report 2015: “Digital Businesses: Mind Your Security” - Everest Group Research

of global enterprises will have been directly compromised by an independent group of cyberactivists or cybercriminals.Gartner : "Security and Risk Management Scenario Planning, 2020"

Page 4: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Protecting against Cyberthreats

Managing insider threats

Compliance monitoring

Security incident and event management

Data Loss prevention (+personal file sync & share services elimination)

84%

80%

82%

83%

85%

What are the 5 /7 key (Most Important or Important) priorities for your:- Chief Information Officer (CIO)- Chief Information security Officer (CISO)- Chief Risk Officer (CRO)450 World Wide large IT organization managers - © Ovum 2014

Page 5: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

89%Defining & Enforcing security policies86%

78%Virus/Spyware/Malware77%

77%Data loss /leakage76%

74% 450 WorldWide large IT organization managers © Ovum 2014

With regards to enterprise IT security governance, risk management and compliance strategy, what are your main data security and privacy-related concerns about file transfers?

Page 6: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

7

Page 7: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

8

Ponemon: 2016 Cost of Data Breach Study - Global Analysis

average total cost of data

breach

average cost per lost or

stolen record$158

$4 million

Page 8: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Attack everything

9

Page 9: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Attack everything

between

10

Page 10: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Attack everything

between

11

Page 11: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Attack everything

between the hacker

and the data 12

Page 12: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Data

Is moving

13

Page 13: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Files & more Files

Of Moving Data60+%

Page 14: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Is Your MFT Ready for Cyber Threats?

Page 15: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Is your MFT enforcingthe security sieve?

Page 16: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

External Threats Defense

Confidentiality Integrity

Authenticity Authorization

Audit

Page 17: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Data leakageEspionage• DLP solution?

Unauthorized users• MFT connected to

LDAP? • Are the access

rights to the file reset after the transfer?

Unauthorized applications• Are applications

authorized or not to deal with a file?

Reverse proxyService exposition• Any data stored in

DMZ?• Is there isolation

/mediation between the request and the delivery.

Content Users Applications Network

Page 18: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Contentsecure envelope• Meta data

around files?

Strong identity• How identity is

proven?

Encryption at rest• encryption files

mechanisms?• Encrypted

repository?

Encryption in motion • Still on SHA-1,

on MD5?• TLS even

internally?

Content Users Applications Network

Page 19: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Contentsecure envelope

Signature• How do you

manage certificates lifecycle?

Signature• How do you

manage certificates lifecycle?

Hashing• SHA-256?• TLS?

Content Users Applications Network

Page 20: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Contentsecure envelope

Authentication• Mutual

authentication mechanism?

• Certificates?

Identity• connection to

IAM

Logon Identity• SSO

Content Users Applications Network

Page 21: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Contentsecure envelope

AccessRight• Interface to

IAM• Administration

delegation

AccessControl• Interface to

IAM

Encryption

Content Users Applications Network

Page 22: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Data Access log

Access log Transaction log

Logs

Complete traceability from design to execution

with log and events collection

Content Users Applications Network

Page 23: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Central GovernanceSecurity DevOps Tools

Axway: MFT as a Shared Service

24

appl.appl. CFT

API gw

API SERVER

BUSINESS LEGACYAPPLICATIONS

FIREWALL

DIRECTORY

IAM

PARTNERCOMMUNITIES

ENGINE LAPTOP

WEB SERVICES

CERTIFICATE

ENCRYPTEDFILE

MOBILE PHONE

PARTNER

API SERVER

BUSINESS LEGACYAPPLICATIONS

FIREWALL

DIRECTORY

IAM

PARTNERCOMMUNITIES

ENGINE LAPTOP

WEB SERVICES

CERTIFICATE

ENCRYPTEDFILE

MOBILE PHONE

PARTNER

API SERVER

BUSINESS LEGACYAPPLICATIONS

FIREWALL

DIRECTORY

IAM

PARTNERCOMMUNITIES

ENGINE LAPTOP

WEB SERVICES

CERTIFICATE

ENCRYPTEDFILE

MOBILE PHONE

PARTNER

BPM /ESB

ST

CFT

WS WS

mobileemail web SC

AMQPAMQP

Secure Communications

Rules and Policies management

Identity and Access Management

Secured Data

Page 24: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

8

Scalability

SecurityReliability

Acceleration

Priority

Lifecycle

Leverage existing MFT

Is your mft:ready for cyber Security?

Page 25: Is Your Managed File Transfer (MFT) Ready for Cyber Threats?

Digital Business Enablement

Being Ready for Digital, Explained How to become a customer-focused, omnipresent digital force in the marketplace

Think ‘Consumer Experience’

The road is laid out ahead of you. There’s no denying that the roaring engine of commerce you hear — the one powering the global economy irreversibly into the future — runs on data flow. It’s all over the headlines. It’s on social media. It’s in that TV ad that keeps interrupting your favorite sports broadcast.

How many digital devices or data streams have you availed yourself to today? Chances are you’re reading this white paper on a screen attached to a computer or tablet or smartphone, with an app or program that allowed you to download it at your convenience. Maybe you’re in a plane over Singapore or Canada at the

More information? Download Axway white paperhttps://www.axway.com/en/gate/2454