no more silos: connected security - mike desai and ryan rowcliffe

15
NO MORE SILOS CONNECTED SECURITY

Upload: core-security

Post on 29-Jan-2018

21 views

Category:

Software


1 download

TRANSCRIPT

NO  MORE  SILOSCONNECTED  SECURITY

L E A R N M O R E

MIKE  DESAISenior  Vice  President

L E A R N M O R E

RYAN  ROWCLIFFESr.  Manager  Solution  Architecture  &  

Enablement  

AGENDA

• The  Problem:  Security  Silos• The  Solution:  Connected  Security• Reference  Architecture

• 4100+  data  breaches

• Millions  in  financial  harm

• $80B  spent  on  Security

• Breaches  still  prevalent

63% 81%2015 2016

Percentage  of  hacking  related  breaches  that  leveraged  either  stolen  and/or  weak  passwords.*

*  2017  Verizon  Data  Breach  Investigations  Report  

Impact  of  a  Data  Breach

• Triggering  Cyber  Liability  Insurance  Policy

• Corporate  Brand  Damage• Loss  of  Revenue• Customer  Churn

Anatomy  of  a  Data  BreachMajority  of  the  breaches  in  the  

enterprises  start  with  social  engineering  and  

phishing

Intruders  gained  access  through  a Citrix  remote  access portal set  up  for  use  by  employees.  {Home  Depot  Breach}

"The  hackers  acquired  elevated  rights  that  allowed  them  to  navigate  portions  of  Home  Depot's  network  and  to  deploy  unique,  custom  built  malware  on  its  self  check  out  systems  in  the  U.S.  and  Canada.”  – eWeek

Our  Approach

Focus  on  addressing  the  data  breach  problemEliminate  the  white  noise  between  security  solutionsVendors  work  together  to  ensure  interoperabilityAll  solutions  will  have  product  level  integrationCreate  a  reference  architecture  Overall  Goal:  Protect.  Detect.  Remediate.

Network  Security

Endpoint  Security  

Endpoint  Security

Identity  Security  

Endpoint  Security

Identity  Security  

Network  Security

Identity  Security  

Endpoint  Security

Identity  Security  

Security  Information  &  Event  Management

The  Connected  Security  Alliance

A  holistic  approach  to  the  data  breach  problem

The  Connected  Security  Alliance

Network  Security

Endpoint  Security  

Endpoint  Security

Identity  Security  

Endpoint  Security

Identity  Security  

Network  Security

Identity  Security  

Endpoint  Security

Identity  Security  

Security  Information  &  Event  Management

Connected  Security  Reference  Architecture  

Pre  Authentication  Risk  Analysis

• Over  3,000x  more  secure  than  2FA  alone

• Runs  in  the  background,  and  doesn’t  disrupt  day-­‐to-­‐day  usage

• Keeps  checking  after  the  log-­‐in  process  for  truly  continuous  authentication

2

Corporate  Apps  Launch  Pad

1

Enter  Corporate  UID/PWD

3

Access  to  Cloud  App

Required  based  on  workflow

Transparent  to  user

Strong  Security.  Amazing  User  Experience

Adaptive  Layers

T R U LY  I N T E G R AT E D

All  solutions  pass  rigorous  interoperability  testing  to  ensure  they  are  compatible.  The  result  is  a  reference  architecture  and  documentation  that  can  help  

customers  implement  quickly  and  painlessly

A C T I O N A B L E  I N T E L L I G E N C E

By  providing  multiple  datasets  to  determine  risk  or  evidence  of  the  attack,  Alliance  products  can  

increase  the  chance  of  detecting  a  breach  before  it  happens

F O UNDAT I O N  O F  I D E N T I T Y

Traditional  perimeter  security  is  failing  due  to  the  user  of  valid,  yet  compromised  user  credentials.  Alliance  members  will  leverage  identity-­‐context  to  detect  and  protect  against  bad  actors  

Benefits  of  a  Holistic  Approach

BE T T E R  TO G E T H E R

By  providing  multiple  datasets  to  determine  risk  or  evidence  of  the  attack,  Alliance  products  can  

increase  the  chance  of  detecting  a  breach  before  it  happens

THANK  YOU