2. Agenda
• Key Findings: Cloud Security Report, Spring 2014
- Alert Logic Customer Data
- Honeypot Research
• Common Azure Security & Compliance Issues
• Alert Logic for Azure
- Log Manager
- Threat Manager
- Web Security Manager
3. Cloud Adoption is Gaining Momentum
• Major Public cloud vendors predicted to eclipse $10B in revenue by
2015
• Oracle Cloud bookings increased by 35% in 2013
• Gartner predicts 60% of banking institutions to migrate to the cloud
• Healthcare is expected to adopt cloud computing at a 21% year over
year rate through 2017
• VDI (Desktop as a Service) market reached $13.4 billion in 2013
4. Over 2,800 Organizations Worldwide Trust Alert Logic
Millions
of devices secured
3.7 Petabytes
of log data under
management
8.5 Million
security events
correlated per day
40,000
incidents identified
and reviewed
per month
5. Threats in the Cloud are Increasing With Adoption
• Increase in attack frequency
• Traditional on-premises threats are now moving to the
cloud
• Majority of cloud incidents were related to web
application attacks, brute force attacks, and
vulnerability scans
• Brute force attacks and vulnerability scans are now
occurring at near-equivalent rates
in both cloud and on-premises
environments
• Malware/Botnet is increasing year
over year
6. Global Honeypot Network
Why Honeypots?
•Honeypots give us a unique data set
•Simulates vulnerable systems without
the risk of real data loss
•Gives the ability to collect intelligence
from malicious attackers
•Allows for collection of various
different attacks based on
system
•Helps identify what industry
specific targets are out there
18. Security and Compliance is Challenging
Skilled security resources
are in high demand and
hard to find
Moving to cloud and hybrid
IT environments brings
different threats and
complexities
Maintaining continuous
security and compliance
is expensive
19. Applications
Systems
Networks
Building a Security and Compliance Solution
IDS
Vulnerability Scanning
Web Application
Firewall
Log Management
Threat
Intelligence
Feeds
SIEM
Staff capable of:
•Provisioning
•Monitoring
•Configuration and tuning
•Researching incidents,
emerging threats, and
defining remediation
steps
Big Data
Analytics
Products
Automated Correlation
and Analytics
People &
Process
20. Alert Logic Solutions
Alert Logic
Threat Manager™
Alert Logic
Web Security Manager™
Alert Logic
Log Manager™
Alert Logic Unified Web User Interface
Intrusion Detection &
Vulnerability Scanning
Log Management &
Compliance Reporting
Active Protection for
Web Applications
Highest volume of attacks occurred in Europe
Attacks against Microsoft DS accounted for over 51% of the overall attack vectors
Database services have been a consistent target
Underscores the importance of a defense in depth strategy for the need to secure your cloud infrastructure