SlideShare a Scribd company logo
1 of 34
Download to read offline
Tips for Successful CASB Projects
Eric Andrews
VP Cloud Security, Symantec
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 2
IaaS/PaaSSaaSMobile
Cloud
Control
Enterprise
Mobile/BYOD/PublicWifi
CASB
Data Security
Threat Protection
Visibility
Understand & Monitor RiskExposure Across
PublicCloud Apps & Infrastructure
Govern Access to Critical Data,Extend
Protections Against Breach
Protect Against Threats,Detect,Investigate,
and Remediate Incidents
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Operationalize Cloud App Security
3
Tip #1
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Ongoing Monitoring of Cloud App Usage
4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Consider the Impact of Mobile
5
Tip #2
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Cloud Service: Server-side App
Shadow IT is more than Cloud Apps
Cloud Service: Mobile App
6
No correspondingserver-side app
Track usage & find out how many mobile app
licenses you really need to pay for
Discovery & risk analysis of an otherwise
unmonitored app
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Other Mobile Considerations
• Monitoring and controlling cloud app activity from
mobile devices via APIs or inline gateways
• Support for native apps, like Salesforce or Box on
your mobile device
• Dependency on MDM solutions to provide cloud
app governance
• Conditional access based on security posture of
the device
7
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Leverage Intelligent Access Controls
8
Tip #3
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
SSO
Integration
9
CASB
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Adaptive
Authentication
10
Dynamically step up authentication based
on real time risk conditions in the network
CASB
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Cover your Bases
11
Tip #4
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Inline Gateway (Forward or Reverse
Proxy), real-time enforcement
Control Points for Cloud App Security
API’s for Sanctioned Apps Consider traffic engineering &
breadth of coverage
12
SaaS/PaaS/IaaS
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Web
Security
Service
Tightly coupled SWG and CASB
provides many benefits
DeployingWeb & Cloud App Security
Automated traffic steering,
single agent, automated log
ingestion, common fabric
Don’t just Discover Shadow IT,
control it
13
SaaS/PaaS/IaaS
Wild Web/Internet
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Inline Coverage of Cloud Apps
14
Sanctioned Apps Unsanctioned Apps
Managed Devices
Forward Proxy/
Reverse Proxy
Forward
Proxy
Unmanaged Devices
Reverse Proxy N/A
Addresses unmanaged devices,but . . .
• Requires extensive URL rewriting
• Limited number of apps supported
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Mirror Gateway Executes & Renders App Sessions Remotely
A Third Approach: Mirror Gateway
UserDevice
User gestures
Transparent
Clientless
Rendering
100% safe
visual stream
Isolation Platform
Secure DisposableContainer
Render Execute Download
Any Device
Unmanaged,
BYOD
Secure
No app data
processed or
storedlocally
Any App
All browser
based apps
(no limit)
Robust
No URL rewrites,
impervious to SaaS
app changes
Granular Policy
CASB gateway provides
full threat protection,
DLP & app controls
CASBGateway
5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Dig Deep Into Coverage of Cloud App Suites
16
Tip #5
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Office 365 is more than OneDrive
17
OneDrive
Email
Yammer
Sharepoint
Teams
o O365is morethan
OneDrive;thereare
many apps
o Any oftheseappscan
beconduitsofdata
sharing(e.g.,contentin
an email,ormessaging
someonethrough
Yammer)
o Needextensive
coverageofall
componentsGroups
OfficeOnline Apps
Dynamics
Azure
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
And G Suite is more than Drive
Drive
Sites Google Cloud Platform
Gmail
Calendar
Team Drive
Forms
Groups
Hangouts
Hangouts Meet
Hangouts Chat
Admin
Vault
Cloud Search
Contacts
18
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Don’t Skimp on DLP
19
Tip #6
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Govern Sensitive Data in the Cloud
20
o Identify&remediateriskyexposure
o Automaticallyclassifysensitive
contentflowingin/outofcloudapps
o Definegranularcontent-basedand
context-basedpolicies
o HarnessBest-in-classDLP
technology:machinelearning
trainingprofiles,contextualanalysis,
extensivebuilt-inlibraries,
fingerprinting,sensitiveimage
recognition
Govern Access to Critical Data, Extend Protections Against Breach
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Other Workflow
Integrations
DLP Enforce
Management
Console
Policies /
Incidents
DLP Console
CASB
Policies /
Incidents
WebIaaS
Separate Islands of DLP
21
(on-premise)
Response
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
(on-premises)
Other Workflow
Integrations
DLP Enforce
Management
Console
Policies /
Incidents
DLP Console
CASB
Policies /
Incidents
WebIaaS
ICAP
Limited Remediation. How do you unshare a link?
Wasted Bandwidth
and Increased Latency
Rerouting all cloud traffic
to on-premises DLP engine
What about ICAP?
22
Response
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
On-premises
DLP Detection
DLP Management
Extend fine-tuned policies
and workflows to cloud
Other
Integrations
Native cloud solution
Enhance DLP solution
with CASB insights
Seamless DLP
Across All Channels
23
CASB
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Vendors
Clients
Partners
Co-workers
o Dynamically encrypt based on
contentclassification
o Contentstaysencrypted,
regardlessof where it travels
o Granularcontrolof who can
access content
o Contentis beaconized and may
be revoked at any time
Access
Granted
Access
Denied
Revoke
File
ICE
VIP
Digital Rights Management
24
CASB
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Automate, Automate, Automate
25
Tip #7
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Automated Protection
26
o Session Hijacking
malwareor bots, screen scraping
o Account Takeover
phishingor socialengineering
leadsto stolen credentials
o MaliciousInsider
legitimateend user
doing badthings
o Data Exfiltration
Trackcomplexpatternsof data
exfiltration
UEBA& Threat Detection
o Dynamic Threat
Scorebased on
UEBA
o Not justthreshold
based, but
behavioral based
o Built-in and
Custom Sequence
Detectors
o Automatedbots to
triage security
incidents
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Practice Good Cloud Hygiene
27
Tip #8
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Advanced Threat Protection
• Scanall contentuploaded
and storedin cloud apps
• Avoid sync & share
distributionof malware
• Extend best-of-breed
advanced malware
protectionto cloud content
Malware
Protection
28
CASB
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Protect IaaS (It’s Not Just for SaaS)
29
Tip #9
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
IaaS/PaaS Security
30
IaaS/PaaS+ SaaS IaaS/PaaS
InfoSec DevSecOps
WithinIaaSEnvironment
API&Gateway OS Hardening
Anti-Malware
App Isolation
Malware Protection
DLP Scanning
AdminMonitoring and Control
UEBA Account Protection
Discover Shadow IaaS Accounts
ComputeStorage
ConfigurationMonitoring
Compliance Assurance
Malware Protection
DLP Scanning
StoragePosture
Custom App Monitoring
AdminApp
User Activity,PolicyEnforcement
Real Time File Integrity Mgmt
App Control
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Consider the Ecosystem
31
Tip #10
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
CASB 1.0
Empower your SWG
with automated
controls for 35K+ apps
Extend enterpriseDLP
policies to the cloud
with high performance
Encrypt sensitive data as it leaves the cloud,
and track where it goes
Apply best-in-class anti-
malware, reputation,
and sandboxingto
protect the cloud
Dynamically trigger 2FA
based on risky activity,
not just at login
Track roaming users
for Shadow IT analysis
& endpoint integration
Protect inbound and
outbound email and
messaging
ProxySG/WSS
DLP
ATP
ICE
SEP, SEP Mobile
Email Security.Cloud
VIP
32IntegratedCyberDefense
The Power of
Integrations
Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY
Top 10 Tips for Successful CASB Deployments
33
1. Operationalize Cloud App Security
2. Consider the Impact of Mobile
3. Leverage IntelligentAccess Controls
4. Cover your Bases
5. Dig Deep Into Coverage of Cloud App
Suites
6. Don’t Skimp on DLP
7. Automate, Automate, Automate
8. Practice Good Cloud Hygiene
9. Protect IaaS (It’s Not Just for SaaS)
10. Consider the Ecosystem
Thank You!

More Related Content

What's hot

The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensBitglass
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud securityVladimir Jirasek
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2Priyanka Aash
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...Iftikhar Ali Iqbal
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Comprehensive Information on CASB
Comprehensive Information on CASBComprehensive Information on CASB
Comprehensive Information on CASBHTS Hosting
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 

What's hot (20)

The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Netskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good ThingNetskope — Shadow IT Is A Good Thing
Netskope — Shadow IT Is A Good Thing
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Workshop on CASB Part 2
Workshop on CASB Part 2Workshop on CASB Part 2
Workshop on CASB Part 2
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Docu...
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Comprehensive Information on CASB
Comprehensive Information on CASBComprehensive Information on CASB
Comprehensive Information on CASB
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 

Similar to Top 10 tips for successful CASB projects

Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itIBM Security
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
ng-casb-sales-enablement-webinar.pptx
ng-casb-sales-enablement-webinar.pptxng-casb-sales-enablement-webinar.pptx
ng-casb-sales-enablement-webinar.pptxMCCAgaistRagging
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Amazon Web Services
 
Managing Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseManaging Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseDevOps.com
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitAmazon Web Services
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the CloudSteven_Jackson
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Amazon Web Services
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIBM Security
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsSonia Baratas Alves
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Amazon Web Services
 

Similar to Top 10 tips for successful CASB projects (20)

Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow itCloud security enforcer - Quick steps to avoid the blind spots of shadow it
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
ng-casb-sales-enablement-webinar.pptx
ng-casb-sales-enablement-webinar.pptxng-casb-sales-enablement-webinar.pptx
ng-casb-sales-enablement-webinar.pptx
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Managing Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered EnterpriseManaging Change in a Modern DevOps-Powered Enterprise
Managing Change in a Modern DevOps-Powered Enterprise
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Application Secuirty in the Cloud
Application Secuirty in the CloudApplication Secuirty in the Cloud
Application Secuirty in the Cloud
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Top 10 tips for successful CASB projects

  • 1. Tips for Successful CASB Projects Eric Andrews VP Cloud Security, Symantec
  • 2. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY 2 IaaS/PaaSSaaSMobile Cloud Control Enterprise Mobile/BYOD/PublicWifi CASB Data Security Threat Protection Visibility Understand & Monitor RiskExposure Across PublicCloud Apps & Infrastructure Govern Access to Critical Data,Extend Protections Against Breach Protect Against Threats,Detect,Investigate, and Remediate Incidents
  • 3. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Operationalize Cloud App Security 3 Tip #1
  • 4. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Ongoing Monitoring of Cloud App Usage 4
  • 5. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Consider the Impact of Mobile 5 Tip #2
  • 6. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Cloud Service: Server-side App Shadow IT is more than Cloud Apps Cloud Service: Mobile App 6 No correspondingserver-side app Track usage & find out how many mobile app licenses you really need to pay for Discovery & risk analysis of an otherwise unmonitored app
  • 7. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Other Mobile Considerations • Monitoring and controlling cloud app activity from mobile devices via APIs or inline gateways • Support for native apps, like Salesforce or Box on your mobile device • Dependency on MDM solutions to provide cloud app governance • Conditional access based on security posture of the device 7
  • 8. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Leverage Intelligent Access Controls 8 Tip #3
  • 9. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY SSO Integration 9 CASB
  • 10. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Adaptive Authentication 10 Dynamically step up authentication based on real time risk conditions in the network CASB
  • 11. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Cover your Bases 11 Tip #4
  • 12. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Inline Gateway (Forward or Reverse Proxy), real-time enforcement Control Points for Cloud App Security API’s for Sanctioned Apps Consider traffic engineering & breadth of coverage 12 SaaS/PaaS/IaaS
  • 13. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Web Security Service Tightly coupled SWG and CASB provides many benefits DeployingWeb & Cloud App Security Automated traffic steering, single agent, automated log ingestion, common fabric Don’t just Discover Shadow IT, control it 13 SaaS/PaaS/IaaS Wild Web/Internet
  • 14. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Inline Coverage of Cloud Apps 14 Sanctioned Apps Unsanctioned Apps Managed Devices Forward Proxy/ Reverse Proxy Forward Proxy Unmanaged Devices Reverse Proxy N/A Addresses unmanaged devices,but . . . • Requires extensive URL rewriting • Limited number of apps supported
  • 15. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Mirror Gateway Executes & Renders App Sessions Remotely A Third Approach: Mirror Gateway UserDevice User gestures Transparent Clientless Rendering 100% safe visual stream Isolation Platform Secure DisposableContainer Render Execute Download Any Device Unmanaged, BYOD Secure No app data processed or storedlocally Any App All browser based apps (no limit) Robust No URL rewrites, impervious to SaaS app changes Granular Policy CASB gateway provides full threat protection, DLP & app controls CASBGateway 5
  • 16. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Dig Deep Into Coverage of Cloud App Suites 16 Tip #5
  • 17. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Office 365 is more than OneDrive 17 OneDrive Email Yammer Sharepoint Teams o O365is morethan OneDrive;thereare many apps o Any oftheseappscan beconduitsofdata sharing(e.g.,contentin an email,ormessaging someonethrough Yammer) o Needextensive coverageofall componentsGroups OfficeOnline Apps Dynamics Azure
  • 18. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY And G Suite is more than Drive Drive Sites Google Cloud Platform Gmail Calendar Team Drive Forms Groups Hangouts Hangouts Meet Hangouts Chat Admin Vault Cloud Search Contacts 18
  • 19. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Don’t Skimp on DLP 19 Tip #6
  • 20. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Govern Sensitive Data in the Cloud 20 o Identify&remediateriskyexposure o Automaticallyclassifysensitive contentflowingin/outofcloudapps o Definegranularcontent-basedand context-basedpolicies o HarnessBest-in-classDLP technology:machinelearning trainingprofiles,contextualanalysis, extensivebuilt-inlibraries, fingerprinting,sensitiveimage recognition Govern Access to Critical Data, Extend Protections Against Breach
  • 21. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Other Workflow Integrations DLP Enforce Management Console Policies / Incidents DLP Console CASB Policies / Incidents WebIaaS Separate Islands of DLP 21 (on-premise) Response
  • 22. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY (on-premises) Other Workflow Integrations DLP Enforce Management Console Policies / Incidents DLP Console CASB Policies / Incidents WebIaaS ICAP Limited Remediation. How do you unshare a link? Wasted Bandwidth and Increased Latency Rerouting all cloud traffic to on-premises DLP engine What about ICAP? 22 Response
  • 23. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY On-premises DLP Detection DLP Management Extend fine-tuned policies and workflows to cloud Other Integrations Native cloud solution Enhance DLP solution with CASB insights Seamless DLP Across All Channels 23 CASB
  • 24. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Vendors Clients Partners Co-workers o Dynamically encrypt based on contentclassification o Contentstaysencrypted, regardlessof where it travels o Granularcontrolof who can access content o Contentis beaconized and may be revoked at any time Access Granted Access Denied Revoke File ICE VIP Digital Rights Management 24 CASB
  • 25. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Automate, Automate, Automate 25 Tip #7
  • 26. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Automated Protection 26 o Session Hijacking malwareor bots, screen scraping o Account Takeover phishingor socialengineering leadsto stolen credentials o MaliciousInsider legitimateend user doing badthings o Data Exfiltration Trackcomplexpatternsof data exfiltration UEBA& Threat Detection o Dynamic Threat Scorebased on UEBA o Not justthreshold based, but behavioral based o Built-in and Custom Sequence Detectors o Automatedbots to triage security incidents
  • 27. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Practice Good Cloud Hygiene 27 Tip #8
  • 28. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Advanced Threat Protection • Scanall contentuploaded and storedin cloud apps • Avoid sync & share distributionof malware • Extend best-of-breed advanced malware protectionto cloud content Malware Protection 28 CASB
  • 29. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Protect IaaS (It’s Not Just for SaaS) 29 Tip #9
  • 30. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY IaaS/PaaS Security 30 IaaS/PaaS+ SaaS IaaS/PaaS InfoSec DevSecOps WithinIaaSEnvironment API&Gateway OS Hardening Anti-Malware App Isolation Malware Protection DLP Scanning AdminMonitoring and Control UEBA Account Protection Discover Shadow IaaS Accounts ComputeStorage ConfigurationMonitoring Compliance Assurance Malware Protection DLP Scanning StoragePosture Custom App Monitoring AdminApp User Activity,PolicyEnforcement Real Time File Integrity Mgmt App Control
  • 31. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Consider the Ecosystem 31 Tip #10
  • 32. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY CASB 1.0 Empower your SWG with automated controls for 35K+ apps Extend enterpriseDLP policies to the cloud with high performance Encrypt sensitive data as it leaves the cloud, and track where it goes Apply best-in-class anti- malware, reputation, and sandboxingto protect the cloud Dynamically trigger 2FA based on risky activity, not just at login Track roaming users for Shadow IT analysis & endpoint integration Protect inbound and outbound email and messaging ProxySG/WSS DLP ATP ICE SEP, SEP Mobile Email Security.Cloud VIP 32IntegratedCyberDefense The Power of Integrations
  • 33. Copyright © 2019 Symantec Corporation SYMANTEC PROPRIETARY- LIMITED USE ONLY Top 10 Tips for Successful CASB Deployments 33 1. Operationalize Cloud App Security 2. Consider the Impact of Mobile 3. Leverage IntelligentAccess Controls 4. Cover your Bases 5. Dig Deep Into Coverage of Cloud App Suites 6. Don’t Skimp on DLP 7. Automate, Automate, Automate 8. Practice Good Cloud Hygiene 9. Protect IaaS (It’s Not Just for SaaS) 10. Consider the Ecosystem