SlideShare ist ein Scribd-Unternehmen logo
1 von 29
© 2016 Forrester Research, Inc. Reproduction Prohibited1
Total Data Protection
Outside the Firewall
webinar
closing the
cloud
security
gap with a
CASB
© 2016 Forrester Research, Inc. Reproduction Prohibited2
Rich Campagna
VP of Products
Andras Cser
VP, Principal
Analyst
guest speaker:
© 2016 Forrester Research, Inc. Reproduction Prohibited3
3
Cloud Pulls the CISO in Many Directions
CISO and
Security
Organization
Changes, aka
Uneven
Handshake
2. LOB
procures
cloud
services
1. Cloud
Offers
Irresistible
Benefits
5. Security
Struggles to
Reduce Cloud
Security Risks
4. Data Center
Is Loosely
Coupled
3. CISO
Can’t Say
‘No’ All the
Time
© 2016 Forrester Research, Inc. Reproduction Prohibited4
4
Cloud Security Means a Lot of Things to a
Lot of People
› Security To the Cloud - how can employees securely
interface with our Cloud Providers?
› Security In the Cloud - how can a Cloud Provider (MSFT,
Salesforce) prove that they are secure?
› Security From the Cloud - how can we secure data
accessed from the cloud?
› Organizational Implications - how cloud changes our IT
security organization?
© 2016 Forrester Research, Inc. Reproduction Prohibited5
5
Why Cloud Security is like a
two component glue, a
unique blend:
A: The Cloud is not just a
new delivery platform
B: Cloud Security is NOT
just extending existing
security to the cloud
The dual nature of cloud security
© 2016 Forrester Research, Inc. Reproduction Prohibited6
6
General Challenges with SaaS Security
› Ease of Use
› Cloud security should not inhibit usage
› Inconsistent Control
› You don’t own the app or infrastructure; data moves beyond the
firewall
› Controlling Access
› Any user, any device can connect to cloud over public networks
› The “share” button!
› Cloud Proliferation
› Whack-a-mole use of built-in app security controls is a losing
proposition.
© 2016 Forrester Research, Inc. Reproduction Prohibited7
7
Technology challenges with SaaS Security
› Access controls
› Limited and inconsistent native security
› Information Rights Management
› Identity and Access Management (IAM) and Privileged
Identity Management (PIM)
› Log and event management
© 2016 Forrester Research, Inc. Reproduction Prohibited8
How do we
avoid this?
When it comes to
responsibilities…
© 2016 Forrester Research, Inc. Reproduction Prohibited9
9
Cloud Does NOT Shift the Responsibility of
Data Protection
“When data is transferred to a cloud, the
responsibility for protecting and securing
the data typically remains with the collector
or custodian of that data.”
Cloud Security Alliance, Guidance v3.0
© 2016 Forrester Research, Inc. Reproduction Prohibited10
Who’s Responsible for SaaS Security?
© 2016 Forrester Research, Inc. Reproduction Prohibited11
11
Consciously Building the Cloud Data
Protection Onion
Discovery and Tagging
Risk Assessment
Encryption on Premise
Data Leakage Prevention
Encryption in transit
Identity Context
Encryption at Cloud Vendor
© 2016 Forrester Research, Inc. Reproduction Prohibited12
› Why do it?
› We are moving our entire IT portfolio to the
cloud, can data protection follow and how?
› How much should we pay for it?
› Does CSG support our application portfolio?
› How does it do provisioning?
Common questions Forrester gets about CSG
© 2016 Forrester Research, Inc. Reproduction Prohibited13
› Moving to the cloud is not optional
› Compliance mandates: SOX, GLBA, HIPAA, HITECH,
FERC/NERC
› Cloud cannot increase overall organizational risk
› Privacy and data protection concerns mounting
› Insider threats
› Companies must discover, control and secure shadow IT
› BYOD and “mobile first” is key
Why CSG is important to Forrester customers
© 2016 Forrester Research, Inc. Reproduction Prohibited14
Drivers for CSG Implementation
Information
Risk
Efficiency
Compliance
Flexibility
© 2016 Forrester Research, Inc. Reproduction Prohibited15
› S&R pros must control data dissemination
› Scan and protect data at upload and download
› Allow employees to work anywhere/any device
› YOU are responsible for security of your data in the
cloud
› Don’t blindly trust cloud app vendors’ built-in security
› Discover risky unsanctioned cloud apps
Requirements for CSG
© 2016 Forrester Research, Inc. Reproduction Prohibited16
Source: Forrester Research World Cloud Security Solutions Forecast, 2015 To 2020 (Global)
© 2016 Forrester Research, Inc. Reproduction Prohibited17
Source: Forrester Research World
Cloud Security Solutions
Forecast, 2015 To 2020 (Global)
© 2016 Forrester Research, Inc. Reproduction Prohibited18
© 2016 Forrester Research, Inc. Reproduction Prohibited19
19
© 2016 Forrester Research, Inc. Reproduction Prohibited20
20
© 2016 Forrester Research, Inc. Reproduction Prohibited21
21
© 2016 Forrester Research, Inc. Reproduction Prohibited22
› Increased investment in Cloud Security
› Support for multi-cloud deployments
› (CASB) CSG = CDP + CASI + Cloud Data Governance
› Hybrid Proxy + API + Log management preferred
› Machine Learning/UBA to play a prominent role
› IAM integration is a must
› SIEM integration broadens
› Cloud Data Governance: reviews, campaigns, roles, SoD
checks
Forrester’s Cloud Security Predictions
© 2016 Forrester Research, Inc. Reproduction Prohibited23
© 2016 Forrester Research, Inc. Reproduction Prohibited24
about
bitglass
total
data
protection est. jan
2013
CA, NY,
MN, MA,
IL, NC
tier 1
VCs
© 2016 Forrester Research, Inc. Reproduction Prohibited25
our
solutions
cloud mobile breach
25
© 2016 Forrester Research, Inc. Reproduction Prohibited26
secure
office 365
+ byod
client:
■ 35,000 employees globally
challenge:
■ Inadequate native O365 security
■ Controlled access from any device
■ Limit external sharing
■ Interoperable with existing
infrastructure, e.g. Bluecoat, ADFS
solution:
■ Real-time data visibility and control
■ DLP policy enforcement at upload or
download
■ Quarantine externally-shared sensitive
files in cloud
■ Controlled unmanaged device access
fortune 50
healthcare
firm
© 2016 Forrester Research, Inc. Reproduction Prohibited27
client:
■ 15,000 employees in 190+ locations
globally
challenge:
■ Mitigate risks of Google Apps
adoption
■ Prevent sensitive data from being
stored in the cloud
■ Limit data access based on device
risk level
■ Govern external sharing
solution:
■ Inline data protection for unmanaged
devices/BYOD
■ Bidirectional DLP
■ Real-time sharing control
secure
google
apps +
byod
business
data giant
© 2016 Forrester Research, Inc. Reproduction Prohibited28
28
Thank You!
Andras Cser
+1 617.613.6365
acser@forrester.com
Rich Campagna
+1 408.203.7090
rich@bitglass.com
@bitglass
© 2016 Forrester Research, Inc. Reproduction Prohibited29

Weitere ähnliche Inhalte

Was ist angesagt?

63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 

Was ist angesagt? (20)

Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security4 Essential Components of Office 365 Security
4 Essential Components of Office 365 Security
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 

Ähnlich wie Closing the Cloud Security Gap with a CASB (in partnership with Forrester)

Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
Cisco
 

Ähnlich wie Closing the Cloud Security Gap with a CASB (in partnership with Forrester) (20)

Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Security: Enabling the Journey to the Cloud
Security: Enabling the Journey to the CloudSecurity: Enabling the Journey to the Cloud
Security: Enabling the Journey to the Cloud
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
FullDay Faeder on Friday
FullDay Faeder on Friday FullDay Faeder on Friday
FullDay Faeder on Friday
 
FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017FullDay on Fridays Feb. 3, 2017
FullDay on Fridays Feb. 3, 2017
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
Csa summit argentina-reavis
Csa summit   argentina-reavisCsa summit   argentina-reavis
Csa summit argentina-reavis
 
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
SplunkLive! Zurich 2017 - Build a Security Portfolio That Strengthens Your Se...
 

Mehr von Bitglass

Mehr von Bitglass (13)

Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
CSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud ThreatsCSA Research: Mitigating Cloud Threats
CSA Research: Mitigating Cloud Threats
 
The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365The Security Gap: Protecting Healthcare Data in Office 365
The Security Gap: Protecting Healthcare Data in Office 365
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Closing the Cloud Security Gap with a CASB (in partnership with Forrester)

  • 1. © 2016 Forrester Research, Inc. Reproduction Prohibited1 Total Data Protection Outside the Firewall webinar closing the cloud security gap with a CASB
  • 2. © 2016 Forrester Research, Inc. Reproduction Prohibited2 Rich Campagna VP of Products Andras Cser VP, Principal Analyst guest speaker:
  • 3. © 2016 Forrester Research, Inc. Reproduction Prohibited3 3 Cloud Pulls the CISO in Many Directions CISO and Security Organization Changes, aka Uneven Handshake 2. LOB procures cloud services 1. Cloud Offers Irresistible Benefits 5. Security Struggles to Reduce Cloud Security Risks 4. Data Center Is Loosely Coupled 3. CISO Can’t Say ‘No’ All the Time
  • 4. © 2016 Forrester Research, Inc. Reproduction Prohibited4 4 Cloud Security Means a Lot of Things to a Lot of People › Security To the Cloud - how can employees securely interface with our Cloud Providers? › Security In the Cloud - how can a Cloud Provider (MSFT, Salesforce) prove that they are secure? › Security From the Cloud - how can we secure data accessed from the cloud? › Organizational Implications - how cloud changes our IT security organization?
  • 5. © 2016 Forrester Research, Inc. Reproduction Prohibited5 5 Why Cloud Security is like a two component glue, a unique blend: A: The Cloud is not just a new delivery platform B: Cloud Security is NOT just extending existing security to the cloud The dual nature of cloud security
  • 6. © 2016 Forrester Research, Inc. Reproduction Prohibited6 6 General Challenges with SaaS Security › Ease of Use › Cloud security should not inhibit usage › Inconsistent Control › You don’t own the app or infrastructure; data moves beyond the firewall › Controlling Access › Any user, any device can connect to cloud over public networks › The “share” button! › Cloud Proliferation › Whack-a-mole use of built-in app security controls is a losing proposition.
  • 7. © 2016 Forrester Research, Inc. Reproduction Prohibited7 7 Technology challenges with SaaS Security › Access controls › Limited and inconsistent native security › Information Rights Management › Identity and Access Management (IAM) and Privileged Identity Management (PIM) › Log and event management
  • 8. © 2016 Forrester Research, Inc. Reproduction Prohibited8 How do we avoid this? When it comes to responsibilities…
  • 9. © 2016 Forrester Research, Inc. Reproduction Prohibited9 9 Cloud Does NOT Shift the Responsibility of Data Protection “When data is transferred to a cloud, the responsibility for protecting and securing the data typically remains with the collector or custodian of that data.” Cloud Security Alliance, Guidance v3.0
  • 10. © 2016 Forrester Research, Inc. Reproduction Prohibited10 Who’s Responsible for SaaS Security?
  • 11. © 2016 Forrester Research, Inc. Reproduction Prohibited11 11 Consciously Building the Cloud Data Protection Onion Discovery and Tagging Risk Assessment Encryption on Premise Data Leakage Prevention Encryption in transit Identity Context Encryption at Cloud Vendor
  • 12. © 2016 Forrester Research, Inc. Reproduction Prohibited12 › Why do it? › We are moving our entire IT portfolio to the cloud, can data protection follow and how? › How much should we pay for it? › Does CSG support our application portfolio? › How does it do provisioning? Common questions Forrester gets about CSG
  • 13. © 2016 Forrester Research, Inc. Reproduction Prohibited13 › Moving to the cloud is not optional › Compliance mandates: SOX, GLBA, HIPAA, HITECH, FERC/NERC › Cloud cannot increase overall organizational risk › Privacy and data protection concerns mounting › Insider threats › Companies must discover, control and secure shadow IT › BYOD and “mobile first” is key Why CSG is important to Forrester customers
  • 14. © 2016 Forrester Research, Inc. Reproduction Prohibited14 Drivers for CSG Implementation Information Risk Efficiency Compliance Flexibility
  • 15. © 2016 Forrester Research, Inc. Reproduction Prohibited15 › S&R pros must control data dissemination › Scan and protect data at upload and download › Allow employees to work anywhere/any device › YOU are responsible for security of your data in the cloud › Don’t blindly trust cloud app vendors’ built-in security › Discover risky unsanctioned cloud apps Requirements for CSG
  • 16. © 2016 Forrester Research, Inc. Reproduction Prohibited16 Source: Forrester Research World Cloud Security Solutions Forecast, 2015 To 2020 (Global)
  • 17. © 2016 Forrester Research, Inc. Reproduction Prohibited17 Source: Forrester Research World Cloud Security Solutions Forecast, 2015 To 2020 (Global)
  • 18. © 2016 Forrester Research, Inc. Reproduction Prohibited18
  • 19. © 2016 Forrester Research, Inc. Reproduction Prohibited19 19
  • 20. © 2016 Forrester Research, Inc. Reproduction Prohibited20 20
  • 21. © 2016 Forrester Research, Inc. Reproduction Prohibited21 21
  • 22. © 2016 Forrester Research, Inc. Reproduction Prohibited22 › Increased investment in Cloud Security › Support for multi-cloud deployments › (CASB) CSG = CDP + CASI + Cloud Data Governance › Hybrid Proxy + API + Log management preferred › Machine Learning/UBA to play a prominent role › IAM integration is a must › SIEM integration broadens › Cloud Data Governance: reviews, campaigns, roles, SoD checks Forrester’s Cloud Security Predictions
  • 23. © 2016 Forrester Research, Inc. Reproduction Prohibited23
  • 24. © 2016 Forrester Research, Inc. Reproduction Prohibited24 about bitglass total data protection est. jan 2013 CA, NY, MN, MA, IL, NC tier 1 VCs
  • 25. © 2016 Forrester Research, Inc. Reproduction Prohibited25 our solutions cloud mobile breach 25
  • 26. © 2016 Forrester Research, Inc. Reproduction Prohibited26 secure office 365 + byod client: ■ 35,000 employees globally challenge: ■ Inadequate native O365 security ■ Controlled access from any device ■ Limit external sharing ■ Interoperable with existing infrastructure, e.g. Bluecoat, ADFS solution: ■ Real-time data visibility and control ■ DLP policy enforcement at upload or download ■ Quarantine externally-shared sensitive files in cloud ■ Controlled unmanaged device access fortune 50 healthcare firm
  • 27. © 2016 Forrester Research, Inc. Reproduction Prohibited27 client: ■ 15,000 employees in 190+ locations globally challenge: ■ Mitigate risks of Google Apps adoption ■ Prevent sensitive data from being stored in the cloud ■ Limit data access based on device risk level ■ Govern external sharing solution: ■ Inline data protection for unmanaged devices/BYOD ■ Bidirectional DLP ■ Real-time sharing control secure google apps + byod business data giant
  • 28. © 2016 Forrester Research, Inc. Reproduction Prohibited28 28 Thank You! Andras Cser +1 617.613.6365 acser@forrester.com Rich Campagna +1 408.203.7090 rich@bitglass.com @bitglass
  • 29. © 2016 Forrester Research, Inc. Reproduction Prohibited29