SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Akamai Security Summit World Tour | Stockholm1
Moving Beyond The Perimeter
Richard Meeus
EMEA Director of Security Technical & Strategy @ Akamai
© 2019 Akamai2
We no longer need to debate
the need for change
© 2019 Akamai3
Users & Apps Have Left The Building
CORP NET
Office
No VPN =
No Security
Cafe
IaaS
SaaS
The Web
App #1 App #2
App #3 App #n
● Complex
● Slow
● High RiskDC
DC
© 2019 Akamai4
“As businesses monetize information and insights
across a complex business ecosystem, the idea of a
corporate perimeter becomes quaint - even
dangerous.”
Excerpt from Forrester’s Future-Proof your Digital Business
with Zero Trust Securityodd, peculiar, or
inappropriate
© 2019 Akamai5
Internet
External
User External
Firewall
Active
Directory
Front
End
443
53 and 443
Internal
User
SQL
Server
Index, Query, Application,
Central Administration
Servers
Web
Servers
HWLB
FirewallFirewall
LDSLDS
(Domain Bound Servers)
Outer DMZ Inner DMZ Intranet
Internal Network
Perimeter
Network
Traditional Trust Model Trusted
Not
Trusted
Trust In The Corporate Network Is Not Inherent
© 2019 Akamai6
Trust In The Corporate Network Is Not Inherent
Internet
External
User External
Firewall
Active
Directory
Front
End
443
53 and 443
Internal
User
SQL
Server
Index, Query, Application,
Central Administration
Servers
Web
Servers
HWLB
FirewallFirewall
LDSLDS
(Domain Bound Servers)
Outer DMZ Inner DMZ Intranet
Internal Network
Perimeter
Network
Zero Trust Model Not
Trusted
Not
Trusted
© 2019 Akamai7
To What Extent Do You Agree/Disagree?
“The network perimeter is indefensible in
today’s technology ecosystem of distributed
cloud networks and mobile/remote users.”
“Digital transformation necessitates
adjustments to traditional (perimeter-
based) security strategies.”
58% 84%
■ Strongly Agree
■Agree
Base: 164 IT Security Decision Makers | Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys (July 2018) | ©2018
Forester
© 2019 Akamai8
That Idea & Zero Trust Are Catching On
https://www.usenix.org/conference/enigma2018/presentatio
n/hildebrandt
© 2019 Akamai9
Zero Trust Security & Google BeyondCorp
aka Operation
Aurora
© 2019 Akamai10
It’s time to move
security controls
to the Edge
© 2019 Akamai11
Adaptive Access & Threat Protection
One edge platform to secure all
enterprise apps & users
Identity Aware Proxy
• Identity, single sign-on & multi-factor
authentication
• Inline app access, app performance & app
security
Secure Internet Gateway
• Malware, phishing & DNS-based data
exfiltration protection with inline payload
analysisOffice Cafe
The Web
DC
IaaS
SaaS
App #1 App #2
App #3 App #n
App #1
App #2
© 2019 Akamai12
Where can this take us?
• Internet is the corporate network
• Every office is a hotspot
• All apps feel like SaaS apps
© 2019 Akamai13
Akamai on Akamai:
Acceleration and Secured Delivery Of Akamai Applications With Zero Trust
ION+KSD Secure Edge EAA POP
NO DMZ
INFRASTRUCTURE
CONNECTORS,
INTERNAL ORIGINS
Improved user
experience over VPN
• Simple
• Faster
Enhanced Security
Reduced
Infrastructure
© 2019 Akamai15
Security Demo Setup
– VPN
Other Apps
Corporate Directory (AD)
VPN Client
……
Intranet
(Sharepoint)
Jenkins
(Dev Ops)
Oracle EBS
(Expense)
Account Payable
Mail (Exchange)
Contacts
Internet
Corporate Perimeter
Desktop with VPN
(left)
VPN Connector
VPN Tunnel
© 2019 Akamai16
Security Demo Setup
– Akamai Zero Trust
Corporate Directory (AD)
Intranet
(Sharepoint)
Jenkins
(Dev Ops)
Oracle EBS
(Expense)
Account Payable
Mail (Exchange)
Contacts
Corporate Perimeter
EAA Connector
Firewall
Akamai Intelligent
Platform
Desktop with ZT
(right)
Enterprise
Threat
Protector
© 2019 Akamai17 © 2019 Akamai17

Weitere ähnliche Inhalte

Was ist angesagt?

What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals2nd Watch
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best PracticesAmazon Web Services
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Scaling up to Your First 10 Million Users
Scaling up to Your First 10 Million UsersScaling up to Your First 10 Million Users
Scaling up to Your First 10 Million UsersAmazon Web Services
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Email_Security Gateway.pptx
Email_Security Gateway.pptxEmail_Security Gateway.pptx
Email_Security Gateway.pptxssuser651fd4
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAMKnoldus Inc.
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 

Was ist angesagt? (20)

Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best Practices
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Scaling up to Your First 10 Million Users
Scaling up to Your First 10 Million UsersScaling up to Your First 10 Million Users
Scaling up to Your First 10 Million Users
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Email_Security Gateway.pptx
Email_Security Gateway.pptxEmail_Security Gateway.pptx
Email_Security Gateway.pptx
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 

Ähnlich wie Trust No One - Zero Trust on the Akamai Platform

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Amazon Web Services
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Akamai Technologies
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...Michael Elder
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsSonia Baratas Alves
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsManuel Daza
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computingTyrone Systems
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityFlexera
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 

Ähnlich wie Trust No One - Zero Trust on the Akamai Platform (20)

Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPs
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 

Mehr von Elisabeth Bitsch-Christensen

How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneElisabeth Bitsch-Christensen
 
Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyElisabeth Bitsch-Christensen
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenElisabeth Bitsch-Christensen
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaElisabeth Bitsch-Christensen
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalElisabeth Bitsch-Christensen
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsElisabeth Bitsch-Christensen
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...Elisabeth Bitsch-Christensen
 

Mehr von Elisabeth Bitsch-Christensen (16)

Designing for API Doomsday
Designing for API DoomsdayDesigning for API Doomsday
Designing for API Doomsday
 
What is a Bot and why you should care
What is a Bot and why you should careWhat is a Bot and why you should care
What is a Bot and why you should care
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
 
Keynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City TourKeynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City Tour
 
Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journey
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in Sweden
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social Media
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digital
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
 
Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)
 
Digital Strategy in Presidential Elections
Digital Strategy in Presidential ElectionsDigital Strategy in Presidential Elections
Digital Strategy in Presidential Elections
 
Engagement marketing: Influence the Influencer
Engagement marketing: Influence the InfluencerEngagement marketing: Influence the Influencer
Engagement marketing: Influence the Influencer
 
CCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 GalleryCCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 Gallery
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
 
Web forumsocialairlines
Web forumsocialairlinesWeb forumsocialairlines
Web forumsocialairlines
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 

Kürzlich hochgeladen

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 

Kürzlich hochgeladen (20)

UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 

Trust No One - Zero Trust on the Akamai Platform

  • 1. Akamai Security Summit World Tour | Stockholm1 Moving Beyond The Perimeter Richard Meeus EMEA Director of Security Technical & Strategy @ Akamai
  • 2. © 2019 Akamai2 We no longer need to debate the need for change
  • 3. © 2019 Akamai3 Users & Apps Have Left The Building CORP NET Office No VPN = No Security Cafe IaaS SaaS The Web App #1 App #2 App #3 App #n ● Complex ● Slow ● High RiskDC DC
  • 4. © 2019 Akamai4 “As businesses monetize information and insights across a complex business ecosystem, the idea of a corporate perimeter becomes quaint - even dangerous.” Excerpt from Forrester’s Future-Proof your Digital Business with Zero Trust Securityodd, peculiar, or inappropriate
  • 5. © 2019 Akamai5 Internet External User External Firewall Active Directory Front End 443 53 and 443 Internal User SQL Server Index, Query, Application, Central Administration Servers Web Servers HWLB FirewallFirewall LDSLDS (Domain Bound Servers) Outer DMZ Inner DMZ Intranet Internal Network Perimeter Network Traditional Trust Model Trusted Not Trusted Trust In The Corporate Network Is Not Inherent
  • 6. © 2019 Akamai6 Trust In The Corporate Network Is Not Inherent Internet External User External Firewall Active Directory Front End 443 53 and 443 Internal User SQL Server Index, Query, Application, Central Administration Servers Web Servers HWLB FirewallFirewall LDSLDS (Domain Bound Servers) Outer DMZ Inner DMZ Intranet Internal Network Perimeter Network Zero Trust Model Not Trusted Not Trusted
  • 7. © 2019 Akamai7 To What Extent Do You Agree/Disagree? “The network perimeter is indefensible in today’s technology ecosystem of distributed cloud networks and mobile/remote users.” “Digital transformation necessitates adjustments to traditional (perimeter- based) security strategies.” 58% 84% ■ Strongly Agree ■Agree Base: 164 IT Security Decision Makers | Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys (July 2018) | ©2018 Forester
  • 8. © 2019 Akamai8 That Idea & Zero Trust Are Catching On https://www.usenix.org/conference/enigma2018/presentatio n/hildebrandt
  • 9. © 2019 Akamai9 Zero Trust Security & Google BeyondCorp aka Operation Aurora
  • 10. © 2019 Akamai10 It’s time to move security controls to the Edge
  • 11. © 2019 Akamai11 Adaptive Access & Threat Protection One edge platform to secure all enterprise apps & users Identity Aware Proxy • Identity, single sign-on & multi-factor authentication • Inline app access, app performance & app security Secure Internet Gateway • Malware, phishing & DNS-based data exfiltration protection with inline payload analysisOffice Cafe The Web DC IaaS SaaS App #1 App #2 App #3 App #n App #1 App #2
  • 12. © 2019 Akamai12 Where can this take us? • Internet is the corporate network • Every office is a hotspot • All apps feel like SaaS apps
  • 13. © 2019 Akamai13 Akamai on Akamai: Acceleration and Secured Delivery Of Akamai Applications With Zero Trust ION+KSD Secure Edge EAA POP NO DMZ INFRASTRUCTURE CONNECTORS, INTERNAL ORIGINS Improved user experience over VPN • Simple • Faster Enhanced Security Reduced Infrastructure
  • 14. © 2019 Akamai15 Security Demo Setup – VPN Other Apps Corporate Directory (AD) VPN Client …… Intranet (Sharepoint) Jenkins (Dev Ops) Oracle EBS (Expense) Account Payable Mail (Exchange) Contacts Internet Corporate Perimeter Desktop with VPN (left) VPN Connector VPN Tunnel
  • 15. © 2019 Akamai16 Security Demo Setup – Akamai Zero Trust Corporate Directory (AD) Intranet (Sharepoint) Jenkins (Dev Ops) Oracle EBS (Expense) Account Payable Mail (Exchange) Contacts Corporate Perimeter EAA Connector Firewall Akamai Intelligent Platform Desktop with ZT (right) Enterprise Threat Protector
  • 16. © 2019 Akamai17 © 2019 Akamai17