1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Sample three prong diagram
• AWS division jumped 47% to $3.5...
2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Inaugural Edition
FullDayFaeder on Fridays
My cyber communit...
3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
I thought it pertinent to touch on the hot off the pres
s fi...
4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
This week Symantec provided FullDayFaeder exclusive access t...
5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
The great news is Symantec has partnered with Amazon Web Ser...
6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
According to the Forrester report, “Blue
Coat/Symantec integ...
Cloud Access Security Broker
(CASB)
PRODUCTS
8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
New Challenges
26% of Cloud
Docs are
Broadly
Shared1
1 1H 20...
9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Proxy
Cloud Proxy
Events
Outside
Perimeter
Risk Assessment
I...
10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Management
Center
Agen
t
Single Pane of Glass
for Cloud Sec...
Cloud Secure Web Gateway
PRODUCTS
12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Shadow Cloud
IT
Consumer
Internet
Proxy
“We supply employee...
13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Web Security Service
Consumer
Internet
Shadow Clou...
14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
PRODUCTS
Dubai
https://www.bluecoat.com/cloud-data-center-l...
15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Secure Web Access in the Cloud
Proxy Enabled Web Security S...
16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Web Security Service with Malware Analysis
Service Add-On
W...
17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Malware Analysis Service: Standard vs
Advanced
Key Capabili...
18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Email
Web
Access
Cloud
Apps
User Security
Information
Prote...
Cloud Data Protection
PRODUCTS
20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
IN TRANSIT AT REST IN USE
ZZ
Cloud Data Flow
“귏企専吁企倁ᐋ가귉”
“企...
21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec CDP Data Protection Process
Symantec
Cloud Data Pr...
22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data Protection Steps
Data Governance
Determines Info...
23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Cloud Data ProtectionInfo Stored & Processed in the Cloud
U...
VIP and VIP Access Manager
PRODUCTS
25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Symantec Identity Access Management
• Two-Factor
Authentica...
26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Every Organization Needs Strong Authentication
63% of Confi...
27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
Identity & Access Control
Secure Access for the Entire User...
28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved.
VIP Deployment and Integration
Cloud-based and zero capital...
Data Loss Prevention Next Week
PRODUCTS
Upcoming SlideShare
Loading in …5
×

FullDay Faeder on Friday

129 views

Published on

Inaugural Edition of Weekly Symantec Cyber Security topics and events. This weeks is primarily focused on Cloud Security and 3 Organizations transforming the world as we know it

Published in: Social Media
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
129
On SlideShare
0
From Embeds
0
Number of Embeds
25
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • I’m Eric Andrews . . . .
    And on stage with me is Leeron . . .. (over 1 year)
  • Organizations are seeing a greater amount of content migrating to cloud apps and services
    And this content is being access be a variety of devices, laptops, mobile, etc.. This communication is often direct-to-net, not hairpinning back to HQ through the traditional security stack, creating a blind spot.
    Even when you’ve adopted a sanctioned app, it is hard to track how your users are using this app and what type of content they are sharing. We call this problem Shadow Data
    Finally, with thousands of credentials floating around in your organization, an increasing concern is how a compromise of any one of these accounts may lead to a costly data breach.


  • Describe solution
    Describe differentiation, best in class, data science, UI
  • We provide a range of solutions to address these challenges, including visibility of Shadow IT, Granular controls, and monitoring of user accounts to prevent compromised credentials.

    All of these solutions come bundled in an elegant platform, often referred to as the best UI in the industry, even by our competitors.

    ====
    Most important point is not that Skyhigh said this, but that it is coming directly from customers. We here, but they are hearing it too. Note Skyhigh had nasty things to say too.
    Not just pretty looking, but functional. Well thought out. Designed to accommodate workflows that real users want.
    Netskope has lots of information, but clunky UI, no workflows, not thought through. Skyhigh challenging to navigate.


    Video
  • Block web threats & ATP C/C
    Feed documents to sandbox
    Enforce security policy
  • Block web threats & ATP C/C
    Feed documents to sandbox
    Enforce security policy
  • Blue Coat has a fully meshed and redundant infrastructure spanning 6 continents with over 40 data centers.
    With many years and strong investment, Blue Coat offers Core sites shown here with an asterisk.
    These sites have 10GB throughput capacity already in place and infrastructure in place to allow 4x expansion.
    All Blue Coat data centers are accessible by all Blue Coat Cloud customers – we don’t advertise (or have) any data centers that are not available to all customers unlike other vendors
    Another critical requirement for a enterprise grade service and supporting infrastructure are the ISO 27001 and SSAE16 certifications, which Blue Coat holds for all of its data centers, infrastructure, controls and processes. We also require that all of our tier 1 hosting partners carry the same certifications.
    Other vendors will advertise global presence and data centers, but these can typically be racks sitting in an SE’s basement.
    Blue Coat stands behind its secure and scalable global infrastructure


    If you get a question around data privacy.
    Arch: store data within region. separation.
    Config: dc primary/ backup
    Access control: ssae16/ iso27001
  • Architecture for Content Inspection, Tool Integration & Policy Control
  • 20
  • This slide gives a quick overview of the process.


    Assume this is an HR app where First Name and Last Name fields have been designated to be tokenized via the policies the enterprise has defined.
    When a user enters a record for Brian Shaw, the record transaction gets intercepted by the CDP gateway and a replacement token is generated for both fields
    The replacement values are:
    What gets sent to the cloud application for storage and processing
    Stored locally in a CDP database to be used to bring information back into the clear when authorized users access the ServiceNow instance via the gateway
    End users can still use the data as if it was actually stored in the cloud. For example, they can search and sort on data that has been encrypted or tokenized.

  • There are three high-level steps an enterprise takes when using CDP

    The 1st step is determining what data elements need the additional protection. For example, a healthcare provider may choose to encrypt the handful of fields in their customer service cloud application that are governed by HIPAA.
    Once the data protection requirements are defines, a security analyst uses the applications admin console to write the policies that need to be enforced. It’s a point and click exercise, tokenize this field, encrypt al attachments, etc..
    From there the policies are deployed into a run-time environment in the CDP gateway server, where the data protection polices ae enforced real-time.

    One final point – the end users of the cloud application maintain application functionality. For instance, they can perform searches and send e-mails on data that has been tokenized.
  • Here is an interesting way to illustrate the concept.

    Imagine that data has been put up in your Servicenow instance and you have some policies in place with CDP that protects various fields and attachments.
    If any unauthorized users got a look at that data directly in the cloud, all they would see is meaningless replacement values
    But now look at that same screen when viewed by authorized users accessing the cloud org via the Symantec Cloud Data Protection gateway. They see everything in the clear and have full usability of the cloud app.


    This critical capability opens up a whole host of new powerful cloud application use cases for the enterprise, since it ensures that regulated data uniquely remains in the hands of the enterprise at all times (at-rest and in-use in the cloud). And the enterprise maintains full physical control over encryption keys and token vaults.

    Note: Cloud provider-based solutions have two critical flaws: (1) they only encrypt data while at-rest. It is fully exposed during processing in the cloud app (2) the encryption/decryption occurs in the cloud app…so the keys, at some point, need to be in the app providers infrastructure.

  • Traditionally, 2FA addresses something know, have and are..

    With VIP and added features, you can eliminate the dependency on something you know (UN/PW), and simple rely on something you have (phone) and something you are (fingerprint)
  • The foundation of authentication platform is the access control – to make sure only the right person can access your network. And it creates a central control point to manage your users, set up your policies, and monitor your apps.

    Symantec VIP Access Manager is an Enterprise Grade cloud security access control platform, which leverages existing user directories and allows internal/external users to single sign-on to preconfigured web applications based on policy settings

    On the one-hand, it helps reduce IT burden since IT can use single console to monitor and control all the access points. On the other hand, it helps improve user experience – with just one password, you can access all your applications.
  • End with why VIP is the clear choice? Use this slide as more than just 3 reason to use VIP, but help quantify the reason

    Refer to the appendix and slide on “IS RSA WORTH THE COST?” where we quantify a 33% savings using VIP which ties back to EASY TO DEPLOY
    Mobile APP is not only free but easy and convenient for user which ties back to EASY TO USE. You may be able to quantify ease of use be reducing PW reset which about $70/call or cost of hardware
    Integration to a variety of use cases so investment in VIP can give you return with integration with consumer app (CDK), cloud apps (SSO) and network VPN (Radius), so rather than having separate solutions and vendors for each of the use cases, you have one to deliver all these!


    ---------------------------------------

    Easy to deploy with zero backend infrastructure or hardware cost (given solution is cloud based and credentials options can be mobile which is free)

    Easy to use whereby users can simple leverage their mobile device as a credential and simple use your fingerprint or accepting a push notification for authentication

    Easy to integrate where your investment can extend to different use cases such as SSO, VPN, B2C applications, etc.


    ------
    Provide strong authentication and easy access for employees, partners and customers to corporate networks and applications from any device or location while complying with regulations, reducing risks to corporate assets, and keeping infrastructure costs low.

    Get the latest software without updates and upgrades – always relevant to protect you against attacks and provide the latest and greatest.
  • FullDay Faeder on Friday

    1. 1. 1Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Sample three prong diagram • AWS division jumped 47% to $3.5B • $926M Operating Income • 71% Amazon’s $1.3B Operating Income • Symantec Cited as The Clear Leader for Cloud Secure Gateways • Top 7 AWS Security Issues • Security and Compliance for Your AWS Environment . • Server products and Cloud Services revenue grew $577M or 12% • Azure's revenue surged 93% SUPPORTING ITEM • Symantec Secures Office365 • Optimizing O365 with Symantec PacketShaper
    2. 2. 2Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Inaugural Edition FullDayFaeder on Fridays My cyber community has been asking for me to put something together to help sort through the “fake news” and noise these thousands of small start-ups or even niche best of breed so called players that simply don’t improve their security posture. Respected cybersecurity leaders value my transparent insight and therefore I have acquiesced to their demands.
    3. 3. 3Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. I thought it pertinent to touch on the hot off the pres s financial figures of the worlds 3 most impactful cloud companies in my humble opinion. Symantec, Amazon Web Services, and Microsoft Azure all had outstanding quarters. It is becoming evident winners have been chosen. Now only one of these companies is focused solely on security. AWS division jumped 47% to $3.5B Azure's revenue surged 93%
    4. 4. 4Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. This week Symantec provided FullDayFaeder exclusive access to our World Wide Solutions Architect, Mohammad Kaouk, who is a genuine genius and dedicated to cloud security. I personally witnessed some RSA sneak peaks as well current general availability SKUs of the new: Integrated Cyber Defense Platform *Web Security Services, *Symantec CloudSOC, *Symantec DLP, *On-Premise to Cloud DLP, *Malware Analysis Advanced Service (Full Detonation Cloud Sandboxing), *SSL/TLS interception, managed centrally via *Hosted Reporter 10 and *Management Center (riding on a common operating environment), and lastly all backed by *VIP multi-factor authentication. (WOW)
    5. 5. 5Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. The great news is Symantec has partnered with Amazon Web Services to provide our customers access to easily spin up a controlled virtual environment to play with the solutions for 2 weeks. Super easy to get going with our Symantec Security Services Platform. Giving this transformation to the cloud and the need for seamless multi-factor authentication for this Inaugural edition I chose to cover our CASB/WSS/VIP story to protect users and data everywhere. Just ping me for a free trial...
    6. 6. 6Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. According to the Forrester report, “Blue Coat/Symantec integrates CSG with its on- premises secure web gateway. The solution supports both proxy-based and API monitoring of cloud platforms (both AWS and Azure) and cloud applications. It has strong capabilities for Salesforce and other structured data protection, including search, sort, and filtering operations, and offers a wide selection of encryption and decryption policy options. The solution’s built-in cloud application catalog, support for Office 365, and mobile-device-based encryption lag.”
    7. 7. Cloud Access Security Broker (CASB) PRODUCTS
    8. 8. 8Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. New Challenges 26% of Cloud Docs are Broadly Shared1 1 1H 2016 Shadow Data Report Proliferation of Cloud Apps Variety of Endpoints Shadow Data Problem Compromised Accounts Risk Assessment Intrusion Detection Proxy/Firewall DLP Incident Response Investigations Malware Detection
    9. 9. 9Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Proxy Cloud Proxy Events Outside Perimeter Risk Assessment Intrusion Detection Proxy/Firewall Incident Response Investigations DLP Malware Detection Enterprise Perimeter Cloud API StreamIQ™ ContentIQ™ ThreatScore™ LIST (WEB)
    10. 10. 10Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Management Center Agen t Single Pane of Glass for Cloud Security Visibility of Shadow IT Protection Against Malicious Attacks Granular Control of Sensitive Data 10 PRODUCTS
    11. 11. Cloud Secure Web Gateway PRODUCTS
    12. 12. 12Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Shadow Cloud IT Consumer Internet Proxy “We supply employees with mobile devices. We need to govern their use and protect information and users when they are out in the world.” Remote Sites, Mobile Devices and Users How to Protect PRODUCTS
    13. 13. 13Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Web Security Service Consumer Internet Shadow Cloud IT Proxy Extend Web & Cloud Governance to Mobile Take Remote Sites Safely “Direct to Net” PRODUCTS
    14. 14. 14Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. PRODUCTS Dubai https://www.bluecoat.com/cloud-data-center-locations/ AMERICAS Ashburn, VA * Santa Clara, CA Chicago, IL * Miami, FL Seattle, WA * Toronto, Ontario, Canada Dallas, TX Denver, CO Buenos Aires, Argentina Mexico City, Mexico Sao Paulo, Brazil New York, NY Montreal, Quebec, Canada EMEA London, UK (2x) * Frankfurt, Germany * Paris, France* Zurich, Switzerland Stockholm, Sweden Madrid, Spain Helsinki, Finland Milan, Italy Johannesburg, South Africa Oslo, Norway Tel Aviv, Israel Dubai, UAE APAC Sydney, Australia Auckland, New Zealand Republic of Singapore* Tokyo, Japan Shanghai, China Hong Kong, China Taipei, Taiwan Seoul, Korea Mumbai, India Chennai, India * Core site Blue Coat Global Data Center Footprint SSAE16ISO 27001 • Coverage across 6 continents • Hosted at Top Tier infrastructure providers • Redundant within and between locations • Connect to any/closest Data Center • Fully meshed /redundant network • 40 Data Centers
    15. 15. 15Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Secure Web Access in the Cloud Proxy Enabled Web Security Service Prox y Proxy All Endpoints • Terminate and decrypt traffic • Emulate all device types • Extract content for inspection • Integrate authentication Control Web & Cloud Governance • Discover shadow IT risk • Block web-borne threats • Enforce access policy & audit usage of web & cloud W W W . W E B S I T E . C O M Prevent Threats & Orchestrate Content• Pre-filter sandbox with advanced content inspection • Send content to DLP, sandbox, analytics, etc.. • Open integration architecture to quickly add new services.JAR .EXE Sandbox Malware to Identify Advanced Threats• Multi-factor file analysis • Real time operation – prevent file delivery until sandbox analysis complete Web PRODUCTS
    16. 16. 16Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Web Security Service with Malware Analysis Service Add-On Web Security Service (WSS) • ProxySG Secure Web Gateway • Dual Anti-Virus Scanning • Global Intelligence Network • URL Filtering and Categorization • Comprehensive Reporting • SSL Interception/Policy-Based Decryption • CASB Audit Integration Malware Analysis Service (MAS) • Static Code Analysis • YARA Rules Analysis • Behavioral Analysis • Emulation of Windows Processes • Inline, Real-Time Blocking • File and URL Reputation MAS prevents first-client infection from unknown malware PRODUCTS
    17. 17. 17Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Malware Analysis Service: Standard vs Advanced Key Capabilities Standard Advanced Static Code Analysis ✔ ✔ YARA Rule Analysis ✔ ✔ Behavioral Analysis ✔ ✔ Emulation of Windows Platform ✔ ✔ Inline, Real-time Blocking ✔ ✔ File and URL Reputation ✔ ✔ Windows Emulation ✔ ✔ Full Windows OS Detonation ✗ ✔ EXE and DLL Support ✔ ✔ Office Documents and PDF Support ✗ ✔ +JAVA, MSI, RTF, ZIP Full Detonation Report ✗ ✔
    18. 18. 18Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Email Web Access Cloud Apps User Security Information Protection Advanced Threat Protection Protect Across Web, Mail and Cloud App Vectors PRODUCTS
    19. 19. Cloud Data Protection PRODUCTS
    20. 20. 20Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. IN TRANSIT AT REST IN USE ZZ Cloud Data Flow “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN “귏企専吁企倁ᐋ가귉” “企専吁企倁ᐋ” “가귉귏企専吁企倁” “ᐋ귏企専吁企倁가귉” TOKEN PRODUCTS
    21. 21. 21Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec CDP Data Protection Process Symantec Cloud Data Protection Gateway Cloud Data Protection Token Map Repository User Cloud App Cloud Application Example: enterprise defined a policy to protect FIRST NAME And LAST NAME Fields In ServiceNow Without impacting the cloud apps’ functionality (e.g. search, sort e-mail)
    22. 22. 22Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data Protection Steps Data Governance Determines Info Sensitivity Classification Cross-Cloud Data Protection Policies Defined CDP Enforces Policies in Real-Time Without impacting the cloud application’s functionality (e.g. search, sort e-mail) Mobile Users Remote Workers Enterprise SaaS SaaS SaaSPaaS PRODUCTS
    23. 23. 23Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Cloud Data ProtectionInfo Stored & Processed in the Cloud Unauthorized users see only tokenized replacement values Unauthorized Users Direct Connection to ServiceNow Authorized users see all sensitive data in the clear Makes the move to the cloud possible for all sorts of regulated use cases PRODUCTS
    24. 24. VIP and VIP Access Manager PRODUCTS
    25. 25. 25Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Symantec Identity Access Management • Two-Factor Authenticatio n (2FA) • Single Sign On (SSO) • For Enterprises, Consumers, & Cloud Apps VIP and VIP Access Manager Network (Enterprise Gateway) Cloud Applications (Access Manager) Consumer (CDK/API) PRODUCTS
    26. 26. 26Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Every Organization Needs Strong Authentication 63% of Confirmed Data Breaches Involve Leveraging Weak, Default or Stolen Passwords 1. Something you KNOW 2. Something you HAVE3. Something you ARE PRODUCTS
    27. 27. 27Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. Identity & Access Control Secure Access for the Entire User Base Identity & Access Control SS O Access Manager Internal Users (Employees) External Users (Partners/Contractors) Corporate Network Cloud Apps PKI Customers Remote Workers PRODUCTS
    28. 28. 28Copyright © 2016 Blue Coat Systems Inc. All Rights Reserved. VIP Deployment and Integration Cloud-based and zero capital investment (Bring-Your-Own-Credential) Easy Deployment All-in-one pricing, many credential modalities, and even for consumers Tap your finger to authenticate: password-less authentication Multi-platform Support Designed to Integrate With the security and trust you expect from Symantec API CDK FIDO OATH PUSH B2C B2E Radius SAML PRODUCTS
    29. 29. Data Loss Prevention Next Week PRODUCTS

    ×