IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud
Upcoming SlideShare
Loading in...5
×
 

IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud

on

  • 475 views

Presented by IBM and BeyondTrust

Presented by IBM and BeyondTrust

Statistics

Views

Total Views
475
Slideshare-icon Views on SlideShare
475
Embed Views
0

Actions

Likes
0
Downloads
11
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud Presentation Transcript

    • Protecting Your Sensitive Data in the Cloud Ed Bottini Global Cloud Computing Ecosystem Manager IBM Jim Zierick EVP Strategy and Corporate Development BeyondTrust June 26, 2012 © 1985-2012 BeyondTrust Software, Inc. All rights reserved
    • Agenda• IBM Smart Cloud Offering• The State of the Cloud• Cloud Security Best Practices• BeyondTrust Cloud Security• Next Steps• Q&A 2 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Enterprises intend for cloud to improve their business capabilitiesHow Important are the Following Objectives for Adopting Cloud? % of Respondents Increased collaboration with external partners 62% Competitive/cost advantages thru vertical integration 57% New delivery channels/markets 56% New/enhanced revenue streams 54% Competitive differentiation thru specialization 51% Rebalanced mix of products/services 46% Flexible pricing models 43% Business Capabilities Internal Efficiencies Important or Very Important Source: 2011 IBM/EIU Cloud Survey Results, Q5: How Important are the Following Objectives for Adopting Cloud?, n= 572 3 Close to half (42%) of organizations surveyed plan to harness3 © 2012 IBM Corporation cloud for radical business model innovation within three years
    • Adoption patterns are emerging for successfully beginning andprogressing cloud initiatives Cut IT expense Accelerate time Gain immediate Innovate & complexity to market with access with business through a cloud cloud platform business solutions models by enabled data services on cloud becoming a center cloud service provider4 © 2012 IBM Corporation
    • IBM offers clients choice of cloud delivery models… FOUNDATION SERVICES SOLUTIONS Private & Hybrid Managed Services Business Solutions Cloud Enablement Infrastructure & Platform Software & Business Technologies as a Service Process as a Service Commitment to open standards and a broad ecosystem5 © 2012 IBM Corporation
    • SERVICES Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Infrastructure Management Security Payment and Availability and Platform and Support Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private cloud Shared cloud services6 © 2012 IBM Corporation
    • Transforming Application Lifecycle Management leveraging Cloud & ecosystem partner services Project Requirement Design Development Test Deployment Production Initiation Analysis Defects loaded in Rational Quality Manager and tracked Maintain through application life cycle Application Virtualization Defect Analysis Code Analysis & Reporting Mobile Device Testing Performance Testing Services Workload Portability Testing Solutions Community of Partners Application Virtualization Testing on Devices7 © 2012 IBM Corporation
    • IBM has built and ecosystem to enhance our capabilities and deliverclient value Cloud Application Providers Cloud Services Solution Providers Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Cloud Technology providers Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Cloud Infrastructure Providers Infrastructure Management Security Payment Availability and Platform and Support and Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private Shared cloud services cloud Cloud Builders8 © 2012 IBM Corporation
    • #1 Concern When Moving to the CloudSecurity is the #1 concern when moving deployments to the Cloud Poneman’s Surveys concluded that: • 79% of respondents believe that being able to efficiently manage security in the cloud is critical. • 42% of respondents indicated they would not know if their organizations cloud applications or data was compromised by a security breach or data exploit IDC Enterprise Panel Survey on Cloud challenges 9 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Top threats to Cloud ComputingPer Cloud Security Alliance’s “Top Threats to Cloud Computing (March 2010) – Abuse & Nefarious Use of Cloud Computing – Insecure Interfaces and APIs – Malicious Insiders – Shared Technology Vulnerabilities – Data Loss/Leakage – Account or Service Hijacking 10 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • The Evolving Threat LandscapeBoldness and inventiveness of hackers is outrunningcompanies’ ability to deal with them. Theft of intellectualproperty from U.S. companies is occurring at a rate of$200B a year.“Organizations continue to struggle with excessive userprivilege as it remains the primary attack point for databreaches and unauthorized transactions.”~ Mark Diodati, Burton/Gartner Group• Cost of security operations outstripping IT budget growth• Threat surface increases with every new user and every new technology – Acceleration of APT activities – BYOD/’Consumerization’ of IT a fact of life now – Virtualization and the Private Cloud blur create gaps for attack• Challenges in distinguishing between ‘potential’ and ‘real’ threats 11 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • The Problem is Broad and Deep • The threat from attacks is a statistical certainty and businesses of every type and size are vulnerable. • Organizations are experiencing multiple breaches: 59 percent had two or more breaches in the past 12 months. • Only 11 percent of companies know the source of all network security breaches. 12 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Demystifying Cloud Security You can’t secure ‘The Cloud.’ There is no ‘The Cloud.’ If you don’t have a robust security program, cloud computing will make it worse.” Christopher Hoff – Founding member and technical advisor to the Cloud Security Alliance 13 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Impact of Cloud ComputingCloud Computing Reality – Public, Hybrid or Private• Increasing scale – from thousands to tens of thousands servers• Increasing complexity makes configuration and change management challenging – Complex directory structures are a major pain point• Reliability is critical to realizing operational improvement 14 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Rethink Existing Controls for CloudsWhat’s the same – Many technical controls are the sameWhat’s different – Massively automated, virtualized, multi-tenant environment – Complex supply chain, multiple-domain security concernsNecessitates some shifts in security strategy – New controls (hypervisor integrity monitoring) – Process-related controls (application and data governance) 15 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Best Practice For Cloud SecurityFull Life-Cycle Control of Privileged Users Requirements:  Account for All Privileged Users  Manage Provisioning/De-Provisioning Privileged Credentials  Implement a “Least Privilege” based Control System  Monitor and Reconcile Privileged Activity  Maintain a High Quality Audit Repository  Automate Compliance Reporting 16 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Requirements For Enterprise Grade Cloud Security • Scalable, enterprise grade fabric • Seamless integrations with on-premise and cloud directories • Allow admins to manage policies not infrastructure • Dynamically react to changes in virtual environment • Quantifiable performance metrics of how it’s performing 17 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Cloud Security with BeyondTrustBeyondTrust allows companies to extend existingsecurity infrastructure, policies and compliancereporting to their private, public and hybrid cloudssuch that it is • Scalable • Elastic • Easily installed • Easily managed 18 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • The BeyondTrust Vision Security in Context Public, Private and HybridOur threat management and policy Cloud Computing Securityenablement solutions provide zero-gapvisibility and actionable intelligence to reduce Server & Desktop, Physical & Virtualization Windows, Linux,risks and close security gaps by integrating Unixproviding Security in Context acrossvulnerabilities, privilege and data. Network• Solutions for infrastructure, endpoints, Device Security data and applications• Support for physical, virtual, public, Data Security private and hybrid cloud environments & Leak Prevention• Allows IT governance to strengthen security, improve productivity, drive Governance, Risk compliance and reduce expense & Compliance 19 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Context-Aware Security IntelligenceComplete Risk Management for bothInternal and External Threats  Discovery of all internal and external vulnerabilities and threats  Prioritization of risk according to threats, resources, privileges, etc.  Threat-aware mitigations and preventative measures including Patch Management, Least Privilege, DLP and Endpoint protection.  Continuous monitoring and measurement of threat posture  Automated compliance reporting 20 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Context-Aware Security IntelligenceBenefitsComprehensive preventative intelligence  BeyondTrust allows you to discover all your security weaknesses across vulnerabilities, privilege and data and provides you with the security intelligence you need to protect business assets from cyber attacks.Fully automated and integrated; less resourceintensive  BeyondTrust automates the full spectrum of ongoing assets discovery, assessments, policy and compliance enforcement for your entire IT infrastructure across Desktop, Servers, Mobile, Virtual, Database and Cloud.Flexible and Scalable  Our solutions support distributed deployment across the largest organizations around the globe. 21 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • BeyondTrust Solutions For Cloud Computing Unix, Linux and Windows Servers Policy Based Security Virtualized and cloud environments Flexible Network Configuration Highly Scalable Monitor critical databases Activity Directory Bridge Dynamic Deployment RETINA CSPurpose built threat assessment and management Mixed Networks 22 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Comprehensive Hybrid Cloud ModelSystems Servers Virtualization IdentityManagement Services PowerBroker Enterprise Fabric Flexible Deployment Across Virtual and Physical Infrastructure • Programmable • Policy driven • Dynamically Deployed Application • Context aware and adaptive Database Operating System Hypervisor Easily Configured into Separate Security Zones to allow Context Aware Cloud Security Policies PCI Financial Systems HR Systems 24 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Next: Learn More About Secure Cloud Deployments BeyondTrust Resources IBM Resources Free product evaluation Learn more aboutFree whitepaper: IBM SmartCloud Elevating Cloud Enterprise and Sign Security Up for an Account with Privilege Delegation Find both here: Visit: www.beyondtrust.com/SmartCloud www.ibm.com/buycloud 25 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
    • Thank YouJoin the Conversation! 800-234-9072 818-575-4000 www.beyondtrust.com © 1985-2012 BeyondTrust Software, Inc. All rights reserved