SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Securing The Cloud When 
Users Are Left To Their Own 
Devices 
November 2014
© 2014 Netskope. All Rights Reserved. 
Today’s Speakers 
2 
› Andras Cser, VP and Principal Analyst 
› Bob Gilbert, Sr. Director Product Marketing
Cloud-based Services Employed Regularly 
“Which of the following cloud-based services have you employed on a regular basis?" 
Compute (e.g., Amazon EC2, Microsoft Azure VM Role) 
Storage 
Relational database (e.g. SQL Azure) 
Development tools/IDE (e.g. Cloud9, Cloud Foundry) 
Social (e.g., Salesforce Chatter) 
Messaging 
Content management 
Message queuing 
Integration (e.g., Dell Boomi, IBM Cast Iron) 
Application-level caching 
Content delivery network 
Mobile back end 
BPM 
Nonrelational database 
Don't know 
Sample Size = 175 software developers from companies with 1,000 or more employees 
Source: Forrsights Developer Survey, Q1 2013 
3% 
2% 
26% 
23% 
23% 
21% 
18% 
16% 
14% 
33% 
33% 
31% 
37% 
42% 
50% 
49% 
Other 
© 2014 Forrester Research, Inc. Reproduction Prohibited 3
“Which of the following initiatives are likely to be your IT organization's top project 
and organizational priorities over the next 12 months?” 
-- Increase our use of software-as-a-service (cloud applications) 
1% 
15% 
35% 
48% 
Critical or High priority 
Low priority 
Not on our agenda 
Don't know 
Base: 1,176 North American and European IT decision-makers at firms with 1,000 or more employees 
Source: Forrester Software Survey, Q4 2012 
© 2014 Forrester Research, Inc. Reproduction Prohibited 4
Cloud Pulls the CISO in Many Directions 
CISO and 
Security 
Organization 
Changes, aka 
Uneven 
Handshake 
2. LOB 
procures 
cloud 
services 
1. Cloud 
Offers 
Irresistible 
Benefits 
5. Security 
Struggles to 
Reduce Cloud 
Security Risks 
4. Data Center 
Is Loosely 
Coupled 
3. CISO 
Can’t Say No 
All the Time 
© 2013 Forrester Research, Inc. Reproduction Prohibited 5
Cloud Security Prepositions
Why Cloud Security is like a two 
component “explosive”, a unique blend: 
A: The Cloud is not just 
a new delivery platform 
B: Cloud Security is 
NOT just continuing 
security and extending it 
to the cloud 
© 2013 Forrester Research, Inc. Reproduction Prohibited 7
We’re moving to a single mobile form factor 
Projector 
Screen 
E-ink 
© 2014 Forrester Research, Inc. Reproduction Prohibited 
Smartboard 
Wearable glasses 
Flexible display Retina projection 
Docking station 
Keyboard 
Mouse 
Touch 
3D finger tracking 
Body motion 
Voice commands 
Gesture tracking
Customers cross devices to accomplish 
a single goal 
Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2014 
© 2014 Forrester Research, Inc. Reproduction Prohibited
Access to Apps Runs the Gamut 
› You don’t control your users’ devices 
› You don’t control your users’ devices 
› You don’t control your users’ devices 
› But you have to take inventory of apps they use 
› And you have to control the apps they use 
› And you have to protect the data they use 
© 2013 Forrester Research, Inc. Reproduction Prohibited 10
Cloud Security Top Threats Move to Data 
© 2013 Forrester Research, Inc. Reproduction Prohibited 11
Cloud Does NOT Shift the Responsibility 
of Data Protection 
› “When data is transferred to a 
cloud, the responsibility for 
protecting and securing the data 
typically remains with the collector 
or custodian of that data.” 
Cloud Security Alliance, Guidance v3.0 
© 2013 Forrester Research, Inc. Reproduction Prohibited 12
13 
General Challenges with Cloud Security 
› Ease of Use for End Users (you can’t control end users) 
• Cloud security should not require users to change behaviors or 
tools 
› Inconsistent Control (you don’t own everything) 
• The only thing you can count on is guest VM ownership 
› Elasticity (not all servers are steady-state) 
• Cloudbursting, stale servers, dynamic provisioning 
› Scalability (highly variable server counts) 
• May have one dev server or 1,000 production web servers 
› Portability (same controls work anywhere) 
• Nobody wants multiple tools or IaaS provider lock-in
Technology Challenges with Cloud Security 
› Data protection 
› Workload separation and multi tenancy 
› Information Rights Management 
› SaaS providers don’t help much with security related 
concerns 
› Network Security 
› Identity and Access Management (IAM) and Privileged 
Identity Management (PIM) 
› Business Continuity and Disaster Recovery (BCDR) 
› Log Management (SIEM) 
© 2013 Forrester Research, Inc. Reproduction Prohibited 14
Network perimeter is gone 
© 2013 Forrester Research, Inc. Reproduction Prohibited 15
Consciously Building the Cloud Data Protection Onion 
Encryption at Cloud Vendor 
Behavioral Patterns 
DLP on premise and in the cloud 
Identity Context 
Encryption on Premise 
Risk Assessment 
Discovery and Tagging 
© 2013 Forrester Research, Inc. Reproduction Prohibited 16
Thank you 
Andras Cser 
+1 617.613.6365 
acser@forrester.com
© 2013 Forrester Research, Inc. Reproduction Prohibited 18

Weitere ähnliche Inhalte

Was ist angesagt?

Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
Elastica Inc.
 

Was ist angesagt? (20)

Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
Ciso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data ExposedCiso Platform Webcast: Shadow Data Exposed
Ciso Platform Webcast: Shadow Data Exposed
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
How to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within BoxHow to Extend Security and Compliance Within Box
How to Extend Security and Compliance Within Box
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 

Ähnlich wie Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
mccormicknadine86
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Ähnlich wie Forrester Research: Securing the Cloud When Users are Left to Their Own Devices (20)

Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Why You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow CloudsWhy You (& Your Enterprise) Should Care About Shadow Clouds
Why You (& Your Enterprise) Should Care About Shadow Clouds
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 

Mehr von Netskope

Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
Netskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
Netskope
 

Mehr von Netskope (16)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 
Summer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud ReportSummer 2015 Worldwide Netskope Cloud Report
Summer 2015 Worldwide Netskope Cloud Report
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014Netskope Cloud Report - April 2014
Netskope Cloud Report - April 2014
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

  • 1. Securing The Cloud When Users Are Left To Their Own Devices November 2014
  • 2. © 2014 Netskope. All Rights Reserved. Today’s Speakers 2 › Andras Cser, VP and Principal Analyst › Bob Gilbert, Sr. Director Product Marketing
  • 3. Cloud-based Services Employed Regularly “Which of the following cloud-based services have you employed on a regular basis?" Compute (e.g., Amazon EC2, Microsoft Azure VM Role) Storage Relational database (e.g. SQL Azure) Development tools/IDE (e.g. Cloud9, Cloud Foundry) Social (e.g., Salesforce Chatter) Messaging Content management Message queuing Integration (e.g., Dell Boomi, IBM Cast Iron) Application-level caching Content delivery network Mobile back end BPM Nonrelational database Don't know Sample Size = 175 software developers from companies with 1,000 or more employees Source: Forrsights Developer Survey, Q1 2013 3% 2% 26% 23% 23% 21% 18% 16% 14% 33% 33% 31% 37% 42% 50% 49% Other © 2014 Forrester Research, Inc. Reproduction Prohibited 3
  • 4. “Which of the following initiatives are likely to be your IT organization's top project and organizational priorities over the next 12 months?” -- Increase our use of software-as-a-service (cloud applications) 1% 15% 35% 48% Critical or High priority Low priority Not on our agenda Don't know Base: 1,176 North American and European IT decision-makers at firms with 1,000 or more employees Source: Forrester Software Survey, Q4 2012 © 2014 Forrester Research, Inc. Reproduction Prohibited 4
  • 5. Cloud Pulls the CISO in Many Directions CISO and Security Organization Changes, aka Uneven Handshake 2. LOB procures cloud services 1. Cloud Offers Irresistible Benefits 5. Security Struggles to Reduce Cloud Security Risks 4. Data Center Is Loosely Coupled 3. CISO Can’t Say No All the Time © 2013 Forrester Research, Inc. Reproduction Prohibited 5
  • 7. Why Cloud Security is like a two component “explosive”, a unique blend: A: The Cloud is not just a new delivery platform B: Cloud Security is NOT just continuing security and extending it to the cloud © 2013 Forrester Research, Inc. Reproduction Prohibited 7
  • 8. We’re moving to a single mobile form factor Projector Screen E-ink © 2014 Forrester Research, Inc. Reproduction Prohibited Smartboard Wearable glasses Flexible display Retina projection Docking station Keyboard Mouse Touch 3D finger tracking Body motion Voice commands Gesture tracking
  • 9. Customers cross devices to accomplish a single goal Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2014 © 2014 Forrester Research, Inc. Reproduction Prohibited
  • 10. Access to Apps Runs the Gamut › You don’t control your users’ devices › You don’t control your users’ devices › You don’t control your users’ devices › But you have to take inventory of apps they use › And you have to control the apps they use › And you have to protect the data they use © 2013 Forrester Research, Inc. Reproduction Prohibited 10
  • 11. Cloud Security Top Threats Move to Data © 2013 Forrester Research, Inc. Reproduction Prohibited 11
  • 12. Cloud Does NOT Shift the Responsibility of Data Protection › “When data is transferred to a cloud, the responsibility for protecting and securing the data typically remains with the collector or custodian of that data.” Cloud Security Alliance, Guidance v3.0 © 2013 Forrester Research, Inc. Reproduction Prohibited 12
  • 13. 13 General Challenges with Cloud Security › Ease of Use for End Users (you can’t control end users) • Cloud security should not require users to change behaviors or tools › Inconsistent Control (you don’t own everything) • The only thing you can count on is guest VM ownership › Elasticity (not all servers are steady-state) • Cloudbursting, stale servers, dynamic provisioning › Scalability (highly variable server counts) • May have one dev server or 1,000 production web servers › Portability (same controls work anywhere) • Nobody wants multiple tools or IaaS provider lock-in
  • 14. Technology Challenges with Cloud Security › Data protection › Workload separation and multi tenancy › Information Rights Management › SaaS providers don’t help much with security related concerns › Network Security › Identity and Access Management (IAM) and Privileged Identity Management (PIM) › Business Continuity and Disaster Recovery (BCDR) › Log Management (SIEM) © 2013 Forrester Research, Inc. Reproduction Prohibited 14
  • 15. Network perimeter is gone © 2013 Forrester Research, Inc. Reproduction Prohibited 15
  • 16. Consciously Building the Cloud Data Protection Onion Encryption at Cloud Vendor Behavioral Patterns DLP on premise and in the cloud Identity Context Encryption on Premise Risk Assessment Discovery and Tagging © 2013 Forrester Research, Inc. Reproduction Prohibited 16
  • 17. Thank you Andras Cser +1 617.613.6365 acser@forrester.com
  • 18. © 2013 Forrester Research, Inc. Reproduction Prohibited 18

Hinweis der Redaktion

  1. Bob sets up the topic and hands it to Andras
  2. Bob will kick things off my welcoming the audience and introducing Andras.
  3. Bob’s comment after Andras talks to this slide: What is interesting is how many of these services were once delivered as on-premise and are now delivered via the cloud?
  4. No comments from Bob
  5. http://4.bp.blogspot.com/_tPFK1WgNdGA/Slng_ryi07I/AAAAAAAAAbc/mEvf4xmzBbI/s400/1.jpg Bob’s comment after Andras talks to this slide: At Netskope, we like call this the catch-22 between agility and security. Line of business procuring cloud services surely creates pressure for the CISO. When there is the additional pressure that comes along with the end user bringing in their own cloud apps. Bob may expand this dialog a bit depending on how Andras would like to respond. Perhaps a good opportunity to talk about the results of the most recent Netskope Cloud Report where we collected data from more than 5,000 companies and found that an average 576 cloud apps are in use. Only 50 or so are sanctioned by IT.
  6. No comments from Bob
  7. http://img.dxcdn.com/productimages/sku_6404_1.jpg No comments from Bob
  8. Image source: Flickr (http://www.flickr.com/) | CC BY 2.0 | https://www.flickr.com/photos/dnamichaud/554406521/
  9. Bob’s comment after Andras talks to this slide: This does not surprise me especially considering the recent string of vulnerabilities with Heartbleed, Shellshock and Poodle. The concern over data loss obviously presents an opportunity for cloud-centric DLP technologies.
  10. http://pad3.whstatic.com/images/thumb/6/68/Act-Bossy-Step-4.jpg/550px-Act-Bossy-Step-4.jpg Bob’s comment after Andras talks to this slide: This reminds me of the quote from Hitchiker’s Guide To The Galaxy: “someone else’s problem”. In this case, there is no one to blame except for the man in the mirror.
  11. Bob’s comment after Andras talks to this slide: On your first point, not requiring users to change behaviors makes sense, but what if the user is using a non-sanctioned IT app and the app is seen as posing a potential security risk? If the app is blocked the user’s behavior is obviously changed and perhaps for the worse. Maybe a better approach is to allow, but with some controls in place. Make the user happy and at the same time limit risk exposure.
  12. Bob’s comment after Andras talks to this slide:
  13. http://www.vision-training.com/Images/Working%20eyes%20drawing.jpg http://sheplusplus.stanford.edu/images/salesforce.jpg http://images.clipartpanda.com/magnifying-glass-clipart-magnifying_glass_black.png Bob’s comment after Andras talks to this slide: Andras, this is a great opportunity for a shameless plug. Looking at this image, my company Netskope positions itself where the magnifying glass is and provides deep visibility, analytics, and fine grained control for all cloud apps. This includes sanctioned apps such as Salesforce, Office 365, Google Apps, and Box as well as the potentially thousands of unsanctioned apps that users have deployed and IT does not know about. Essentially, we enable companies to move to the cloud with confidence.
  14. http://lisagawlas.files.wordpress.com/2013/01/onion.jpg Bob’s comment after Andras talks to this slide: Andras, this slide brings tears to my eye. Note: (added “and in the cloud” to DLP on premise.