SlideShare a Scribd company logo
1 of 32
Security “in-the-Cloud”
Getting Past the fluff and into the Cloud
Presented by: Babak Pasdar
President & CEO
Bat Blue Corporation
Cloud/Sec
Board Member:
* Security Goals:
Maintain the integrity, privacy and
availability of organizational systems
and data.
* Perimeter Security Challenges
The current approach to Perimeter security is...
...Expensive
...Resource intensive
…Ultimately ineffective
Cloud/Sec
* Perimeter Security Challenges - Expensive
The Current Approach to Perimeter Security
Demands...
...Dozens of Disparate Technologies
Firewalls, IPS, Proxy, URL-Filter, Anti-Virus, Anti-
Spyware, VPN (SSL/IPSec), Web App Firewalls, Load
Balancers, SIMs, etc...
...Multitude (24+) of Devices
Cloud/Sec
This translates to initial capital costs of...
...$75K - $100K+ for a small site
...$250K - $500K for a medium site or dot com
...$750k - $Millions for a large site
* Security Challenges - Resource Intensive
Dozens of Technologies & 24+ Devices...
...Require extremely complex & expensive
implementations
...Drive hundreds of direct and indirect
integration points forcing complicated
troubleshooting
...Requires managing dozens of disparate
policy sets quite often by disparate
resources
...Operate as “Islands of Security” without
an integrated operational mode
...Managing many vendor relationships
Cloud/Sec
ISP-1 ISP-2
In-DMZ Out-DMZ
P
r
o
x
y
A
V
U
R
L
I
P
S
e
c
S
S
L
S
p
a
m
* Security Challenges - Ineffective Security
Ineffective Security Model...
...Expensive equipment force organizations to
manage risk
...Complex security leads to a focus on
functionality and performance and not
security
...”Islands of Security” lead to protection gaps
and inconsistent security operations
...It takes hours, days or weeks to get a view on
what happened hours, days or weeks ago
Cloud/Sec
* Security Challenges - Ineffective Security
Ineffective Security Tools...
...Firewall is NOT security | Firewall is “Noise
Management”
...VPN is NOT security | VPN is privacy
...HTTPS is NOT security | HTTPS is privacy
...SSL is NOT security | SSL is privacy
...Security REQUIRES application level insight:
.... Proxy
.... IDS / IPS
.... Other Miscellaneous (WAN XL &
Network Visibility)
Cloud/Sec
* Security Challenges - Ineffective Security
Proxy as a security tool...
...is only application protocol aware (ie: http)
...limited to a handful of protocols and not all
...functions no better than a firewall, but at a
higher level
...is extremely slow
Cloud/Sec
* Security Challenges - Ineffective Security
IPS as a security tool...
...IPS is only 20-50% effective
after tuning
...That means it is 50+% un-credible
forcing alerting on rather than
blocking threats
...Forensics is extremely resource
intensive and can only leads to one
of two results:
Cloud/Sec
IPS overlays Thousands of
Signatures over data streams
Bit-pattern matching generates
significant false positives
This forces organizations
to do Forensics
Your Tools
Are Inaccurate!
You're
Breached!
Both of which are after the fact and at great cost!!!!
* Security Challenges - so what's the answer?
Cloud/Sec
A completely new security paradigm that delivers...
Economy – eliminating all capital expenses
Effectiveness – Application layer security for all
traffic regardless of port and
protocol
Efficiency – Reduce the burden on the IT staff
and make security operations
repeatable
Introducing:
Cloud/Sec
Cloud/Sec is a completely in-the-cloud perimeter security
solution that...
...Delivers superior application visibility & security
...Offers a single unified interface for managing Security
...Runs on BlueNET – a Cloud enabler that is extremely fast
...Diversely available data centers nationwide
...Requires no hardware investments & simple to activate
...Supports all organizational locations
....Headquarters
....Branch offices
....Home users
....Hotel / traveling users
....Mobile phone users (coming soon)
Cloud/Sec
Cloud/Sec Delivers superior visibility & security...
…Consolidate Perimeter Security functions
…Application identity & visibility
...User-based access control
(by application or port/protocol)
...Accurate Threat Management
(Malware, Spyware & Vulnerabilities)
...SSL decryption and re-encryption!!!
...Comprehensive integrated application & threat research
...URL filtering and site classification
...File by type transfer control
...Data Leakage Prevention (Credit Card, Social Security, etc..)
Consolidated Perimeter Security - Application Identity & Visibility
Cloud/Sec
Consolidated Security Perimeter - Access Control
Cloud/Sec
A single Policy can
support...
...Access Control
...Threat Management
...Malware Protection
...URL Filtering
...File Control
...Leakage Prevention
Consolidated Security Perimeter - Threat Management
Cloud/Sec
Consolidated Security Perimeter - SSL Decryption and Re-encryption
…Internet Internal SSL Decryption & Re-encryption→
...Internal Internet SSL Decryption & Re-encryption→
Cloud/Sec
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Step 1. Identify Applications
Step 2. Get Detailed Assessment on the Application
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Step 3. Get Source and Destination Information including IP, User &
Country
Step 4. Get Site
Categorization Information
Step 5. Get Threat Information
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Consolidated Security Perimeter - URL Filtering & Site Classification
Cloud/Sec
Consolidated Security Perimeter - File Transfer Control
Cloud/Sec
Consolidated Security Perimeter - Data Leakage Prevention
Cloud/Sec
BlueNET
BlueNETBlueNET – The Cloud Enabler
BlueNETBlueNET eliminates the performance penalty of operating in-the-cloud
…Designed from the ground up to support Cloud Apps
...Uses “Hot Potato Extreme” Routing
...Guaranteed “One Hop Out” Routing
...No single point of failure for even the smallest sites
...Incorporates terabit-grade infrastructure
...Operates with extremely low latency
...Available in data centers nationwide
Cloud/Sec
BlueNETBlueNET & Cloud/SecCloud/Sec data centers...
…New York, NY ...Atlanta, GA ...Los Angeles, CA
111 8th
Ave. ...Sanfrancisco, CA
60 Hudson St. ...Chicago, IL ...Ashburn, VA
...Clifton, NJ ...Seattle, WA* ...Las Vegas, NV*
* Coming Soon
Cloud/SecCloud/Sec – Use Cases
…Multi-Site Organization
...Headquarters
...Branch Office
...Home
...Hotel
...Complete in-the-cloud Computing
...In-the-cloud Site Redundancy
...Dot Com Perimeter in-the-cloud
...Internet Anonymization
Cloud/SecCloud/Sec – Use Cases
…Multi-Site Organization
...Headquarters
...Branch Office
...Home
...Hotel
Cloud/SecCloud/Sec – Use Cases
...Complete in-the-cloud Computing
Cloud/SecCloud/Sec – Use Cases
...Dot Com Perimeter in-the-cloud
Cloud/SecCloud/Sec – Use Cases
...In-the-cloud Site Redundancy
Cloud/SecCloud/Sec – Use Cases
...Internet Anonymization
Cloud/SecCloud/Sec – Use Cases
...Internet Anonymization
Cloud/SecCloud/Sec – Performance Specs
Cloud/SecCloud/Sec
Thank YouThank You
Any Questions? Want to see a demo?
Please see us at booth 713.

More Related Content

What's hot

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...Edureka!
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPTMOHAMMEDELALAM1
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...Priyanka Aash
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesDr. Rajesh P Barnwal
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical AllianceCisco DevNet
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoNetwork Performance Channel GmbH
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the CloudSymantec
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 

What's hot (20)

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPT
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical Alliance
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 

Similar to Bat Blue Cloud Sec Presentation 4

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...Andris Soroka
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesJacopo Nardiello
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 

Similar to Bat Blue Cloud Sec Presentation 4 (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
Cloud security
Cloud security Cloud security
Cloud security
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on Kubernetes
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Bat Blue Cloud Sec Presentation 4

  • 1. Security “in-the-Cloud” Getting Past the fluff and into the Cloud Presented by: Babak Pasdar President & CEO Bat Blue Corporation Cloud/Sec Board Member:
  • 2. * Security Goals: Maintain the integrity, privacy and availability of organizational systems and data. * Perimeter Security Challenges The current approach to Perimeter security is... ...Expensive ...Resource intensive …Ultimately ineffective Cloud/Sec
  • 3. * Perimeter Security Challenges - Expensive The Current Approach to Perimeter Security Demands... ...Dozens of Disparate Technologies Firewalls, IPS, Proxy, URL-Filter, Anti-Virus, Anti- Spyware, VPN (SSL/IPSec), Web App Firewalls, Load Balancers, SIMs, etc... ...Multitude (24+) of Devices Cloud/Sec This translates to initial capital costs of... ...$75K - $100K+ for a small site ...$250K - $500K for a medium site or dot com ...$750k - $Millions for a large site
  • 4. * Security Challenges - Resource Intensive Dozens of Technologies & 24+ Devices... ...Require extremely complex & expensive implementations ...Drive hundreds of direct and indirect integration points forcing complicated troubleshooting ...Requires managing dozens of disparate policy sets quite often by disparate resources ...Operate as “Islands of Security” without an integrated operational mode ...Managing many vendor relationships Cloud/Sec
  • 6. * Security Challenges - Ineffective Security Ineffective Security Model... ...Expensive equipment force organizations to manage risk ...Complex security leads to a focus on functionality and performance and not security ...”Islands of Security” lead to protection gaps and inconsistent security operations ...It takes hours, days or weeks to get a view on what happened hours, days or weeks ago Cloud/Sec
  • 7. * Security Challenges - Ineffective Security Ineffective Security Tools... ...Firewall is NOT security | Firewall is “Noise Management” ...VPN is NOT security | VPN is privacy ...HTTPS is NOT security | HTTPS is privacy ...SSL is NOT security | SSL is privacy ...Security REQUIRES application level insight: .... Proxy .... IDS / IPS .... Other Miscellaneous (WAN XL & Network Visibility) Cloud/Sec
  • 8. * Security Challenges - Ineffective Security Proxy as a security tool... ...is only application protocol aware (ie: http) ...limited to a handful of protocols and not all ...functions no better than a firewall, but at a higher level ...is extremely slow Cloud/Sec
  • 9. * Security Challenges - Ineffective Security IPS as a security tool... ...IPS is only 20-50% effective after tuning ...That means it is 50+% un-credible forcing alerting on rather than blocking threats ...Forensics is extremely resource intensive and can only leads to one of two results: Cloud/Sec IPS overlays Thousands of Signatures over data streams Bit-pattern matching generates significant false positives This forces organizations to do Forensics Your Tools Are Inaccurate! You're Breached! Both of which are after the fact and at great cost!!!!
  • 10. * Security Challenges - so what's the answer? Cloud/Sec A completely new security paradigm that delivers... Economy – eliminating all capital expenses Effectiveness – Application layer security for all traffic regardless of port and protocol Efficiency – Reduce the burden on the IT staff and make security operations repeatable
  • 11. Introducing: Cloud/Sec Cloud/Sec is a completely in-the-cloud perimeter security solution that... ...Delivers superior application visibility & security ...Offers a single unified interface for managing Security ...Runs on BlueNET – a Cloud enabler that is extremely fast ...Diversely available data centers nationwide ...Requires no hardware investments & simple to activate ...Supports all organizational locations ....Headquarters ....Branch offices ....Home users ....Hotel / traveling users ....Mobile phone users (coming soon)
  • 12. Cloud/Sec Cloud/Sec Delivers superior visibility & security... …Consolidate Perimeter Security functions …Application identity & visibility ...User-based access control (by application or port/protocol) ...Accurate Threat Management (Malware, Spyware & Vulnerabilities) ...SSL decryption and re-encryption!!! ...Comprehensive integrated application & threat research ...URL filtering and site classification ...File by type transfer control ...Data Leakage Prevention (Credit Card, Social Security, etc..)
  • 13. Consolidated Perimeter Security - Application Identity & Visibility Cloud/Sec
  • 14. Consolidated Security Perimeter - Access Control Cloud/Sec A single Policy can support... ...Access Control ...Threat Management ...Malware Protection ...URL Filtering ...File Control ...Leakage Prevention
  • 15. Consolidated Security Perimeter - Threat Management Cloud/Sec
  • 16. Consolidated Security Perimeter - SSL Decryption and Re-encryption …Internet Internal SSL Decryption & Re-encryption→ ...Internal Internet SSL Decryption & Re-encryption→ Cloud/Sec
  • 17. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec Step 1. Identify Applications Step 2. Get Detailed Assessment on the Application
  • 18. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec Step 3. Get Source and Destination Information including IP, User & Country Step 4. Get Site Categorization Information Step 5. Get Threat Information
  • 19. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec
  • 20. Consolidated Security Perimeter - URL Filtering & Site Classification Cloud/Sec
  • 21. Consolidated Security Perimeter - File Transfer Control Cloud/Sec
  • 22. Consolidated Security Perimeter - Data Leakage Prevention Cloud/Sec
  • 23. BlueNET BlueNETBlueNET – The Cloud Enabler BlueNETBlueNET eliminates the performance penalty of operating in-the-cloud …Designed from the ground up to support Cloud Apps ...Uses “Hot Potato Extreme” Routing ...Guaranteed “One Hop Out” Routing ...No single point of failure for even the smallest sites ...Incorporates terabit-grade infrastructure ...Operates with extremely low latency ...Available in data centers nationwide
  • 24. Cloud/Sec BlueNETBlueNET & Cloud/SecCloud/Sec data centers... …New York, NY ...Atlanta, GA ...Los Angeles, CA 111 8th Ave. ...Sanfrancisco, CA 60 Hudson St. ...Chicago, IL ...Ashburn, VA ...Clifton, NJ ...Seattle, WA* ...Las Vegas, NV* * Coming Soon
  • 25. Cloud/SecCloud/Sec – Use Cases …Multi-Site Organization ...Headquarters ...Branch Office ...Home ...Hotel ...Complete in-the-cloud Computing ...In-the-cloud Site Redundancy ...Dot Com Perimeter in-the-cloud ...Internet Anonymization
  • 26. Cloud/SecCloud/Sec – Use Cases …Multi-Site Organization ...Headquarters ...Branch Office ...Home ...Hotel
  • 27. Cloud/SecCloud/Sec – Use Cases ...Complete in-the-cloud Computing
  • 28. Cloud/SecCloud/Sec – Use Cases ...Dot Com Perimeter in-the-cloud
  • 29. Cloud/SecCloud/Sec – Use Cases ...In-the-cloud Site Redundancy
  • 30. Cloud/SecCloud/Sec – Use Cases ...Internet Anonymization Cloud/SecCloud/Sec – Use Cases ...Internet Anonymization
  • 32. Cloud/SecCloud/Sec Thank YouThank You Any Questions? Want to see a demo? Please see us at booth 713.