Protecting Your Sensitive       Data in the Cloud                                     Ed Bottini  Global Cloud Computing E...
Agenda• IBM Smart Cloud Offering• The State of the Cloud• Cloud Security Best Practices• BeyondTrust Cloud Security• Next ...
Enterprises intend for cloud to improve their business capabilitiesHow Important are the Following Objectives for Adopting...
Adoption patterns are emerging for successfully beginning andprogressing cloud initiatives    Cut IT expense    Accelerate...
IBM offers clients choice of cloud delivery models…      FOUNDATION                  SERVICES                  SOLUTIONS  ...
SERVICES     Client       Industry     Data and      Workplace    Security    Resilience Enterprise      Partner    define...
Transforming Application Lifecycle Management leveraging Cloud &    ecosystem partner services         Project        Requ...
IBM has built and ecosystem to enhance our capabilities and deliverclient value                           Cloud Applicatio...
#1 Concern When Moving to the CloudSecurity is the #1 concern when moving deployments to the Cloud                        ...
Top threats to Cloud ComputingPer Cloud Security Alliance’s “Top Threats to  Cloud Computing (March 2010)  – Abuse & Nefar...
The Evolving Threat LandscapeBoldness and inventiveness of hackers is outrunningcompanies’ ability to deal with them. Thef...
The Problem is Broad and Deep        • The threat from attacks is a statistical          certainty and businesses of every...
Demystifying Cloud Security                               You can’t secure ‘The Cloud.’                               Ther...
Impact of Cloud ComputingCloud Computing Reality – Public, Hybrid or Private• Increasing scale – from thousands to tens of...
Rethink Existing Controls for CloudsWhat’s the same   – Many technical controls are the sameWhat’s different   – Massively...
Best Practice For Cloud SecurityFull Life-Cycle Control of Privileged Users        Requirements:            Account for A...
Requirements For Enterprise Grade Cloud Security • Scalable, enterprise grade fabric • Seamless integrations with on-premi...
Cloud Security with BeyondTrustBeyondTrust allows companies to extend existingsecurity infrastructure, policies and compli...
The BeyondTrust Vision         Security in Context                                                                    Publ...
Context-Aware Security IntelligenceComplete Risk Management for bothInternal and External Threats    Discovery of all int...
Context-Aware Security IntelligenceBenefitsComprehensive preventative intelligence       BeyondTrust allows you to discov...
BeyondTrust Solutions For Cloud Computing                 Unix, Linux and Windows Servers                                 ...
Comprehensive Hybrid Cloud ModelSystems      Servers Virtualization             IdentityManagement                        ...
Next: Learn More About Secure Cloud                         Deployments          BeyondTrust Resources                    ...
Thank YouJoin the Conversation!    800-234-9072    818-575-4000     www.beyondtrust.com     © 1985-2012 BeyondTrust Softwa...
Upcoming SlideShare
Loading in...5
×

Protecting Your Sensitive Data in the Cloud

307

Published on

Presented by IBM and BeyondTrust.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
307
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Protecting Your Sensitive Data in the Cloud

  1. 1. Protecting Your Sensitive Data in the Cloud Ed Bottini Global Cloud Computing Ecosystem Manager IBM Jim Zierick EVP Strategy and Corporate Development BeyondTrust June 26, 2012 © 1985-2012 BeyondTrust Software, Inc. All rights reserved
  2. 2. Agenda• IBM Smart Cloud Offering• The State of the Cloud• Cloud Security Best Practices• BeyondTrust Cloud Security• Next Steps• Q&A 2 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  3. 3. Enterprises intend for cloud to improve their business capabilitiesHow Important are the Following Objectives for Adopting Cloud? % of Respondents Increased collaboration with external partners 62% Competitive/cost advantages thru vertical integration 57% New delivery channels/markets 56% New/enhanced revenue streams 54% Competitive differentiation thru specialization 51% Rebalanced mix of products/services 46% Flexible pricing models 43% Business Capabilities Internal Efficiencies Important or Very Important Source: 2011 IBM/EIU Cloud Survey Results, Q5: How Important are the Following Objectives for Adopting Cloud?, n= 572 3 Close to half (42%) of organizations surveyed plan to harness3 © 2012 IBM Corporation cloud for radical business model innovation within three years
  4. 4. Adoption patterns are emerging for successfully beginning andprogressing cloud initiatives Cut IT expense Accelerate time Gain immediate Innovate & complexity to market with access with business through a cloud cloud platform business solutions models by enabled data services on cloud becoming a center cloud service provider4 © 2012 IBM Corporation
  5. 5. IBM offers clients choice of cloud delivery models… FOUNDATION SERVICES SOLUTIONS Private & Hybrid Managed Services Business Solutions Cloud Enablement Infrastructure & Platform Software & Business Technologies as a Service Process as a Service Commitment to open standards and a broad ecosystem5 © 2012 IBM Corporation
  6. 6. SERVICES Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Infrastructure Management Security Payment and Availability and Platform and Support Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private cloud Shared cloud services6 © 2012 IBM Corporation
  7. 7. Transforming Application Lifecycle Management leveraging Cloud & ecosystem partner services Project Requirement Design Development Test Deployment Production Initiation Analysis Defects loaded in Rational Quality Manager and tracked Maintain through application life cycle Application Virtualization Defect Analysis Code Analysis & Reporting Mobile Device Testing Performance Testing Services Workload Portability Testing Solutions Community of Partners Application Virtualization Testing on Devices7 © 2012 IBM Corporation
  8. 8. IBM has built and ecosystem to enhance our capabilities and deliverclient value Cloud Application Providers Cloud Services Solution Providers Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Cloud Technology providers Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Cloud Infrastructure Providers Infrastructure Management Security Payment Availability and Platform and Support and Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private Shared cloud services cloud Cloud Builders8 © 2012 IBM Corporation
  9. 9. #1 Concern When Moving to the CloudSecurity is the #1 concern when moving deployments to the Cloud Poneman’s Surveys concluded that: • 79% of respondents believe that being able to efficiently manage security in the cloud is critical. • 42% of respondents indicated they would not know if their organizations cloud applications or data was compromised by a security breach or data exploit IDC Enterprise Panel Survey on Cloud challenges 9 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  10. 10. Top threats to Cloud ComputingPer Cloud Security Alliance’s “Top Threats to Cloud Computing (March 2010) – Abuse & Nefarious Use of Cloud Computing – Insecure Interfaces and APIs – Malicious Insiders – Shared Technology Vulnerabilities – Data Loss/Leakage – Account or Service Hijacking 10 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  11. 11. The Evolving Threat LandscapeBoldness and inventiveness of hackers is outrunningcompanies’ ability to deal with them. Theft of intellectualproperty from U.S. companies is occurring at a rate of$200B a year.“Organizations continue to struggle with excessive userprivilege as it remains the primary attack point for databreaches and unauthorized transactions.”~ Mark Diodati, Burton/Gartner Group• Cost of security operations outstripping IT budget growth• Threat surface increases with every new user and every new technology – Acceleration of APT activities – BYOD/’Consumerization’ of IT a fact of life now – Virtualization and the Private Cloud blur create gaps for attack• Challenges in distinguishing between ‘potential’ and ‘real’ threats 11 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  12. 12. The Problem is Broad and Deep • The threat from attacks is a statistical certainty and businesses of every type and size are vulnerable. • Organizations are experiencing multiple breaches: 59 percent had two or more breaches in the past 12 months. • Only 11 percent of companies know the source of all network security breaches. 12 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  13. 13. Demystifying Cloud Security You can’t secure ‘The Cloud.’ There is no ‘The Cloud.’ If you don’t have a robust security program, cloud computing will make it worse.” Christopher Hoff – Founding member and technical advisor to the Cloud Security Alliance 13 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  14. 14. Impact of Cloud ComputingCloud Computing Reality – Public, Hybrid or Private• Increasing scale – from thousands to tens of thousands servers• Increasing complexity makes configuration and change management challenging – Complex directory structures are a major pain point• Reliability is critical to realizing operational improvement 14 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  15. 15. Rethink Existing Controls for CloudsWhat’s the same – Many technical controls are the sameWhat’s different – Massively automated, virtualized, multi-tenant environment – Complex supply chain, multiple-domain security concernsNecessitates some shifts in security strategy – New controls (hypervisor integrity monitoring) – Process-related controls (application and data governance) 15 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  16. 16. Best Practice For Cloud SecurityFull Life-Cycle Control of Privileged Users Requirements:  Account for All Privileged Users  Manage Provisioning/De-Provisioning Privileged Credentials  Implement a “Least Privilege” based Control System  Monitor and Reconcile Privileged Activity  Maintain a High Quality Audit Repository  Automate Compliance Reporting 16 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  17. 17. Requirements For Enterprise Grade Cloud Security • Scalable, enterprise grade fabric • Seamless integrations with on-premise and cloud directories • Allow admins to manage policies not infrastructure • Dynamically react to changes in virtual environment • Quantifiable performance metrics of how it’s performing 17 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  18. 18. Cloud Security with BeyondTrustBeyondTrust allows companies to extend existingsecurity infrastructure, policies and compliancereporting to their private, public and hybrid cloudssuch that it is • Scalable • Elastic • Easily installed • Easily managed 18 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  19. 19. The BeyondTrust Vision Security in Context Public, Private and HybridOur threat management and policy Cloud Computing Securityenablement solutions provide zero-gapvisibility and actionable intelligence to reduce Server & Desktop, Physical & Virtualization Windows, Linux,risks and close security gaps by integrating Unixproviding Security in Context acrossvulnerabilities, privilege and data. Network• Solutions for infrastructure, endpoints, Device Security data and applications• Support for physical, virtual, public, Data Security private and hybrid cloud environments & Leak Prevention• Allows IT governance to strengthen security, improve productivity, drive Governance, Risk compliance and reduce expense & Compliance 19 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  20. 20. Context-Aware Security IntelligenceComplete Risk Management for bothInternal and External Threats  Discovery of all internal and external vulnerabilities and threats  Prioritization of risk according to threats, resources, privileges, etc.  Threat-aware mitigations and preventative measures including Patch Management, Least Privilege, DLP and Endpoint protection.  Continuous monitoring and measurement of threat posture  Automated compliance reporting 20 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  21. 21. Context-Aware Security IntelligenceBenefitsComprehensive preventative intelligence  BeyondTrust allows you to discover all your security weaknesses across vulnerabilities, privilege and data and provides you with the security intelligence you need to protect business assets from cyber attacks.Fully automated and integrated; less resourceintensive  BeyondTrust automates the full spectrum of ongoing assets discovery, assessments, policy and compliance enforcement for your entire IT infrastructure across Desktop, Servers, Mobile, Virtual, Database and Cloud.Flexible and Scalable  Our solutions support distributed deployment across the largest organizations around the globe. 21 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  22. 22. BeyondTrust Solutions For Cloud Computing Unix, Linux and Windows Servers Policy Based Security Virtualized and cloud environments Flexible Network Configuration Highly Scalable Monitor critical databases Activity Directory Bridge Dynamic Deployment RETINA CSPurpose built threat assessment and management Mixed Networks 22 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  23. 23. Comprehensive Hybrid Cloud ModelSystems Servers Virtualization IdentityManagement Services PowerBroker Enterprise Fabric Flexible Deployment Across Virtual and Physical Infrastructure • Programmable • Policy driven • Dynamically Deployed Application • Context aware and adaptive Database Operating System Hypervisor Easily Configured into Separate Security Zones to allow Context Aware Cloud Security Policies PCI Financial Systems HR Systems 24 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  24. 24. Next: Learn More About Secure Cloud Deployments BeyondTrust Resources IBM Resources Free product evaluation Learn more aboutFree whitepaper: IBM SmartCloud Elevating Cloud Enterprise and Sign Security Up for an Account with Privilege Delegation Find both here: Visit: www.beyondtrust.com/SmartCloud www.ibm.com/buycloud 25 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  25. 25. Thank YouJoin the Conversation! 800-234-9072 818-575-4000 www.beyondtrust.com © 1985-2012 BeyondTrust Software, Inc. All rights reserved
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×