This document discusses network security implications of increased cloud usage and adoption of cloud applications. It identifies key challenges such as rogue cloud app use creating security and compliance issues, backhauling all traffic being costly and slowing performance, and encrypted traffic blinding traditional defenses. It proposes using a cloud-based proxy that can securely decrypt, inspect, and accelerate traffic to address these challenges by providing threat prevention, DLP enforcement, browser isolation, and other advanced security techniques on direct connections to the cloud.
The world has moved to HTTPS – the language of web is now the language of cloud, mobile, video, social media
And so HTTP is also the language of malware delivery, hackers, cybercriminals. Separating the good from the bad is very complex, but it is what will determine if your customers win or loose as they combat cyber-threats
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this presentation we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
We start out with a critical one – encrypted traffic. Latest stats are something like 80% of inbound traffic is encrypted and as much as 25% or outbound is as well. If your tools are blind to encrypted traffic you are in trouble
We are then going to talk about today’s world of increasingly sophisticated threats on the web. Some attack you through content downloads, others get you through the simple act of visiting a malicious site. Both equally crippling.
We have all heard about Shadow IT. But it’s more than just an annoyance of employees going around processes to get the cloud apps they want to use – it’s a real security and compliance issue. Controlling cloud app access and use is a top need in the network world.
Finally, maintaining the right toolset to combat sophisticated threats and manage strict compliance Regs can be complicated and costly. Part of the cost is the tools, but part of it is moving traffic around your dispersed network with remote offices and mobile users in order to secure it. Your customers need a way to simplify the use and deployment of best-in-class security, and a way to boost their user’s cloud app performance while they are at it.
Symantec’s Network Security portfolio is uniquely capable of solving these key challenge areas your customer’s are facing
Encrypted Traffic – inspecting it at scale with an “A” rated secure approach
Modern Threats – we have both covered
Content downloads with Proxy feeding Content Analysis - architecture allows for highly accurate detection and blocking of threat before it gets through
Web browsing threats with Proxy enforcing Web Isolation policies – any malicious code executing on the website gets isolated and cannot get to endpoint
Cloud Security with CASB identifying Shadow IT and Proxy policies then controlling it. And the Proxy working together with DLP and CASB to enforce data security policies or web and cloud traffic
Lastly – this is all available in the Symantec Global Cloud…the Industry’s most advanced cloud-delivered network security stack. Gets rid of the backhaul issue that is a pain to a lot of your customers, but also makes it simple to deploy best-in-class security