SlideShare a Scribd company logo
1 of 37
Keeping Security In-Step with your
Application Demand Curve
Nick Matthews, Solutions Architect, AWS
Rob Ayoub, Research Director, IDC
Dave Morrissey, Director – Cloud Service Providers, Fortinet
$6.53M 56% 70%
https://www.csid.com/resources/stats/data-breaches/
Increase in theft of hard
intellectual property
http://www.pwc.com/gx/en/issues/cyber-
security/information-security-survey.html
Of consumers indicated
they’d avoid businesses
following a security breach
https://www.csid.com/resources/stats/data-breaches/
Average cost of a
data breach
Your Data and IPAre Your Most Valuable Assets
In June 2015, IDC released a report which found that most customers
can be more secure in AWS than their on-premises environment. How?
Automating logging
and monitoring
Simplifying
resource access
Making it easy to
encrypt properly
Enforcing strong
authentication
AWS Can Be More Secure than
Your Existing Environment
AWS and You Share Responsibility for Security
Constantly Monitored
The AWS infrastructure is protected by extensive
network and security monitoring systems:
 Network access is monitored by AWS
security managers daily
 AWS CloudTrail lets you monitor
and record all API calls
 Amazon Inspector automatically assesses
applications for vulnerabilities
Highly Available
The AWS infrastructure footprint helps protect your data from costly
downtime
 43 Availability Zones in 16 regions for
multi-synchronous geographic redundancy
 Retain control of where your data resides
for compliance with regulatory requirements
 Mitigate the risk of DDoS attacks using
services like Route 53
 Dynamically grow to meet unforeseen demand
using Auto Scaling
Integrated with Your Existing Resources
AWS enables you to improve your security using many
of your existing tools and practices
 Integrate your existing Active Directory
 Use dedicated connections as a secure,
low-latency extension of your data center
 Provide and manage your own encryption
keys if you choose
Key AWS Certifications and Assurance Programs
The Importance of Consistent and Scalable
Security in the Cloud
Rob Ayoub, Research Director, IDC
Agenda
 The Move to the Cloud
 Security Once you Get There
 The importance of Elastic Security in the Cloud
 Essential Guidance
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
The Move to the Cloud
 Physically protected
 No remote connectivity
 Limited number of users
 One system
In the beginning…
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
ServerClients
Security Still On Premise
AV
HIPS USB
Firewall
IPS
SWG
SEG
VPN
Then We Became Client/Server
Security
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
Source: IDC
Now We are on the 3rd Platform
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
How would you best describe your organization's current or near-term plans to use Public Cloud or Private Cloud
solutions to support production workloads and services?
14.1%
8.0%
21.7%
12.5%
38.2%
20.3%
25.9%
59.3%
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2015 2016
Not interested Evaluating Deploying Embracing
129% increase in
organizations embracing
cloud
What Does the Adoption Trend of Cloud Look Like?
IDC# US41636616 (August 2016)
Source: IDC CloudView, cJanuary, 2016, n=11,350
worldwide respondents; IDC CloudView Survey,
December, 2014, n=19,080 worldwide respondents;
weighted by GDP and company size © IDC Visit us at IDC.com and follow us on Twitter: @IDC
Security concerns
Not convinced of ROI
Reduced customization opportunities
Insufficient internal buy-in
Don’t have the IT skills
Will cost too much
OP / Performance concerns
Worries around network infrastructure
Reliability / Downtime
Vendor lock-in
Hard to integrate
Loss of operational control
Regulatory / Compliance issues
IT Governance
15% 40% 45% 50%20% 25% 30% 35%
Which of the following best describe your organization's main concerns about Cloud and are IMPORTANT
INHIBITORS for your organization in considering Public Cloud services or Private Cloud technologies?
What’s Holding Organizations
Back from Switching to Cloud?
© IDC Visit us at IDC.com and follow us on Twitter:
@IDCIDC# US41636616 (August 2016)
Source: IDC CloudView, January, 2016, n=11,350
worldwide respondents; IDC CloudView Survey,
December, 2014, n=19,080 worldwide respondents;
weighted by GDP and company size © IDC Visit us at IDC.com and follow us on Twitter: @IDC
Security Once You Get There
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
Scale Changes Your Perspective…
Q: What are the top three (3) cyber-attacks that your customer networks are currently experiencing?
Phishing Ransomware Spyware Web-borne
Malware
Similar Threats – New Vectors
© IDC Visit us at IDC.com and follow us on Twitter: @IDCSource: IDC-The Channel Company Security Trends Survey 2016
Network
Applications
Data
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
Too Many Vectors!!
The 2017
Cyber
Security
Reality
Growing
number of
environments
and devices to
protect
Death of the
perimeter
Sophistication
of cyber
miscreants
growing rapidly
Proliferation of
security tool
sets
Scarcity of
qualified
information
security
professionals
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
3rd Platform Effects on Security
The Need for Elastic
Security in the Cloud
Security is not known for being flexible or elastic…
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
The Times They Are a Changin’
One HUGE Example of Elasticity
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
At That Scale, Security Must Be Elastic
 Impossible to manually
provision security
 Workloads/servers need
consistent security every time
 Security must be tailored to the
specific cloud environment
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
Cloud Security Adoption: Customer Preferences
Q: What are your customer preferences for on-premises and
SaaS/cloud SECURITY solutions?
Prefer on-
premise
security
solutions
37%
Prefer cloud
security
solutions
21%
Prefer adopting a
hybrid security
approach
42%
 Cloud, mobility, and Big Data adoption
has increasingly impacted enterprise’s
security strategies. They add complexity
and drive investments in IT infrastructure
and data protection.
 The rising number of cyberattacks and
increasing complexities have led to
demand for managed security services
and more sophisticated security solutions.
Guidance
 Enterprises should evaluate a security providers ability
to be both flexible based on the environment and elastic
in order to meet the demands of modern cloud
environments
 Performance is critical when deploying cloud security
products, simply porting an existing product to a VM will
not allow for efficiencies in the cloud
 Inherent automation is key to cloud security products.
© IDC Visit us at IDC.com and follow us on Twitter: @IDC
Dynamic Security for AWS
Workloads
Dave Morrissey, Director – Cloud Service Providers, Fortinet
Fortinet Facts
Devices shipped
>3.1M
Unit share worldwide
#1
Patents
380
Patents pending
298
In Network Security (IDC)
Founded
2000
FY16 Revenue
$1.3B
Customers
>310K
Sunnyvale, CA
Advanced AWS partner
Security Must Be Flexible in the Cloud
Environment Flexibility
Elastic Flexibility
Deployment Flexibility
Global Security Scaling
Supported in all 16 AWS Regions.
Cloud Formation Templates
accessible from GitHub.
New Deployments
Cloud Formation Templates built
specifically for new AWS VPC
deployments.
Existing AWS Networks
Cloud Formation Templates built
specifically for existing AWS VPC
augments.
Flexibility to Scale Security in any Environment
You select the
scale-in/out trigger
 CPU Utilization
 Memory Utilization
 Concurrent Sessions
Adds to Security Groups
Complements your use of Security
Groups Network Segmentation &
NACLs.
Advanced Security Layers
 Application
Control
 Antivirus
 Antispam
 IPS
Flexible Scaling Criteria
 Threat
Research
 DLP
 WAF
 VPN
Flexible Deployment Options
Multiple Auto Scaling Cloud
Formation Templates
Use the License you
already Own
On Demand
Pay-as-you-Go
BYOL
 New VPC – Two options
 Existing VPC – Two options
 Use your BYOL license as
your primary instance in each
Availability Zone
 Create On Demand Auto
Scale Groups that Build on
your BYOL License
 Create primary instances and
Auto Scale Groups with
Hourly or Annual usage rates
 On Demand Hourly will
ALWAYS be used as the Auto
Scaling Group – true Elasticity
FortiGate Firewall Auto Scaling…Made Easy
Integrates with AWS Services
 AWS Cloud Formation Template: automates
Auto Scaling deployment
 Amazon CloudWatch: alarms trigger scale-
up/down
 AWS Elastic Load Balancing: distributes
inbound traffic equally
 Amazon Simple Que Service: lifecycle hook
posts scaling events
 Amazon EC2: creates a worker node
 AZs: launches (2) FortiGates in (2) AZs in a High
Availability architecture
 AWS Identify and Access Management (IAM):
creates dynamic roles for EC2 launch and SQS
for Auto Scaling lifecycle hook
 Management Console: enables the Cloud
Formation Template deployment
Q & A
Moderators
Nick Matthews, nickmatt@amazon.com
John Jacobs, jjacobs@fortinet.com
Speakers
Rob Ayoub, rayoub@idc.com
Dave Morrissey, dmorrissey@fortinet.com
Resources
 Learn More: www.Fortinet.com/aws
 Contact Fortinet: awssales@fortinet.com
 Auto Scaling Guide:
https://www.fortinet.com/content/dam/fortinet/assets/solutio
ns/aws/dg-fortigate-autoscaling.pdf
 Configuring your FortiGate Firewall:
http://cookbook.fortinet.com/creating-security-policies/
services like Route 53
 Admin Guide for your FortiGate Firewall:
http://docs.fortinet.com/fortigate/admin-guides

More Related Content

What's hot

DevOps on AWS - Accelerating Software Delivery
DevOps on AWS - Accelerating Software DeliveryDevOps on AWS - Accelerating Software Delivery
DevOps on AWS - Accelerating Software DeliveryAmazon Web Services
 
Microsoft on AWS - AWS Summit SG 2017
Microsoft on AWS - AWS Summit SG 2017Microsoft on AWS - AWS Summit SG 2017
Microsoft on AWS - AWS Summit SG 2017Amazon Web Services
 
Common Workloads on the AWS Cloud
Common Workloads on the AWS CloudCommon Workloads on the AWS Cloud
Common Workloads on the AWS CloudAmazon Web Services
 
Expanding your Data Center with Hybrid Cloud Infrastructure
Expanding your Data Center with Hybrid Cloud InfrastructureExpanding your Data Center with Hybrid Cloud Infrastructure
Expanding your Data Center with Hybrid Cloud InfrastructureAmazon Web Services
 
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...Amazon Web Services
 
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...Amazon Web Services
 
Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017Amazon Web Services
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSAmazon Web Services
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Amazon Web Services
 
Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201Amazon Web Services
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAmazon Web Services
 
AWS Partner: REAN: Join Us to Explore DevOps on AWS
AWS Partner: REAN: Join Us to Explore DevOps on AWSAWS Partner: REAN: Join Us to Explore DevOps on AWS
AWS Partner: REAN: Join Us to Explore DevOps on AWSAmazon Web Services
 
Building enterprise class disaster recovery as a service to aws - session spo...
Building enterprise class disaster recovery as a service to aws - session spo...Building enterprise class disaster recovery as a service to aws - session spo...
Building enterprise class disaster recovery as a service to aws - session spo...Amazon Web Services
 
Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Amazon Web Services
 
Adopting DevOps at Scale on AWS with VirtusaPolaris
Adopting DevOps at Scale on AWS with VirtusaPolarisAdopting DevOps at Scale on AWS with VirtusaPolaris
Adopting DevOps at Scale on AWS with VirtusaPolarisAmazon Web Services
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAmazon Web Services
 
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)Amazon Web Services
 
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...Amazon Web Services
 
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...Amazon Web Services
 

What's hot (20)

DevOps on AWS - Accelerating Software Delivery
DevOps on AWS - Accelerating Software DeliveryDevOps on AWS - Accelerating Software Delivery
DevOps on AWS - Accelerating Software Delivery
 
Microsoft on AWS - AWS Summit SG 2017
Microsoft on AWS - AWS Summit SG 2017Microsoft on AWS - AWS Summit SG 2017
Microsoft on AWS - AWS Summit SG 2017
 
Common Workloads on the AWS Cloud
Common Workloads on the AWS CloudCommon Workloads on the AWS Cloud
Common Workloads on the AWS Cloud
 
Expanding your Data Center with Hybrid Cloud Infrastructure
Expanding your Data Center with Hybrid Cloud InfrastructureExpanding your Data Center with Hybrid Cloud Infrastructure
Expanding your Data Center with Hybrid Cloud Infrastructure
 
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...
Hybrid IT Approach and Technologies with the AWS Cloud | AWS Public Sector Su...
 
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...
AWS re:Invent 2016: Partner-Led Migrations to AWS Starting with the Enterpris...
 
Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWS
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
 
Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201Design Patterns for Developers - Technical 201
Design Patterns for Developers - Technical 201
 
New Achitectures
New AchitecturesNew Achitectures
New Achitectures
 
AWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud InnovationsAWS & Intel: A Partnership Dedicated to Cloud Innovations
AWS & Intel: A Partnership Dedicated to Cloud Innovations
 
AWS Partner: REAN: Join Us to Explore DevOps on AWS
AWS Partner: REAN: Join Us to Explore DevOps on AWSAWS Partner: REAN: Join Us to Explore DevOps on AWS
AWS Partner: REAN: Join Us to Explore DevOps on AWS
 
Building enterprise class disaster recovery as a service to aws - session spo...
Building enterprise class disaster recovery as a service to aws - session spo...Building enterprise class disaster recovery as a service to aws - session spo...
Building enterprise class disaster recovery as a service to aws - session spo...
 
Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017Configuration Management in the Cloud | AWS Public Sector Summit 2017
Configuration Management in the Cloud | AWS Public Sector Summit 2017
 
Adopting DevOps at Scale on AWS with VirtusaPolaris
Adopting DevOps at Scale on AWS with VirtusaPolarisAdopting DevOps at Scale on AWS with VirtusaPolaris
Adopting DevOps at Scale on AWS with VirtusaPolaris
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS Resources
 
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
AWS re:Invent 2016: The Psychology of Security Automation (SAC307)
 
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...
AWS re:Invent 2016: [JK REPEAT] The Enterprise Fast Lane - What Your Competit...
 
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...
AWS re:Invent 2016: DevOps on AWS: Accelerating Software Delivery with the AW...
 

Similar to Keeping Security In-Step with your Application Demand Curve

CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSAmazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Amazon Web Services
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016Amazon Web Services Korea
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPTAmazon Web Services
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saaskavinalli
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...Amazon Web Services
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
Fortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsFortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsAmazon Web Services
 

Similar to Keeping Security In-Step with your Application Demand Curve (20)

CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Barracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWSBarracuda WAF: Scalable Security for Applications on AWS
Barracuda WAF: Scalable Security for Applications on AWS
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
AWS 클라우드가 이끄는 공공기관 혁신 :: Brad Coughlan :: AWS Summit Seoul 2016
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
Fortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure WorkloadsFortinet Automates Migration onto Layered Secure Workloads
Fortinet Automates Migration onto Layered Secure Workloads
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Keeping Security In-Step with your Application Demand Curve

  • 1. Keeping Security In-Step with your Application Demand Curve Nick Matthews, Solutions Architect, AWS Rob Ayoub, Research Director, IDC Dave Morrissey, Director – Cloud Service Providers, Fortinet
  • 2. $6.53M 56% 70% https://www.csid.com/resources/stats/data-breaches/ Increase in theft of hard intellectual property http://www.pwc.com/gx/en/issues/cyber- security/information-security-survey.html Of consumers indicated they’d avoid businesses following a security breach https://www.csid.com/resources/stats/data-breaches/ Average cost of a data breach Your Data and IPAre Your Most Valuable Assets
  • 3. In June 2015, IDC released a report which found that most customers can be more secure in AWS than their on-premises environment. How? Automating logging and monitoring Simplifying resource access Making it easy to encrypt properly Enforcing strong authentication AWS Can Be More Secure than Your Existing Environment
  • 4. AWS and You Share Responsibility for Security
  • 5. Constantly Monitored The AWS infrastructure is protected by extensive network and security monitoring systems:  Network access is monitored by AWS security managers daily  AWS CloudTrail lets you monitor and record all API calls  Amazon Inspector automatically assesses applications for vulnerabilities
  • 6. Highly Available The AWS infrastructure footprint helps protect your data from costly downtime  43 Availability Zones in 16 regions for multi-synchronous geographic redundancy  Retain control of where your data resides for compliance with regulatory requirements  Mitigate the risk of DDoS attacks using services like Route 53  Dynamically grow to meet unforeseen demand using Auto Scaling
  • 7. Integrated with Your Existing Resources AWS enables you to improve your security using many of your existing tools and practices  Integrate your existing Active Directory  Use dedicated connections as a secure, low-latency extension of your data center  Provide and manage your own encryption keys if you choose
  • 8. Key AWS Certifications and Assurance Programs
  • 9. The Importance of Consistent and Scalable Security in the Cloud Rob Ayoub, Research Director, IDC
  • 10. Agenda  The Move to the Cloud  Security Once you Get There  The importance of Elastic Security in the Cloud  Essential Guidance © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 11. The Move to the Cloud
  • 12.  Physically protected  No remote connectivity  Limited number of users  One system In the beginning… © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 13. ServerClients Security Still On Premise AV HIPS USB Firewall IPS SWG SEG VPN Then We Became Client/Server Security © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 14. Source: IDC Now We are on the 3rd Platform © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 15. How would you best describe your organization's current or near-term plans to use Public Cloud or Private Cloud solutions to support production workloads and services? 14.1% 8.0% 21.7% 12.5% 38.2% 20.3% 25.9% 59.3% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 2015 2016 Not interested Evaluating Deploying Embracing 129% increase in organizations embracing cloud What Does the Adoption Trend of Cloud Look Like? IDC# US41636616 (August 2016) Source: IDC CloudView, cJanuary, 2016, n=11,350 worldwide respondents; IDC CloudView Survey, December, 2014, n=19,080 worldwide respondents; weighted by GDP and company size © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 16. Security concerns Not convinced of ROI Reduced customization opportunities Insufficient internal buy-in Don’t have the IT skills Will cost too much OP / Performance concerns Worries around network infrastructure Reliability / Downtime Vendor lock-in Hard to integrate Loss of operational control Regulatory / Compliance issues IT Governance 15% 40% 45% 50%20% 25% 30% 35% Which of the following best describe your organization's main concerns about Cloud and are IMPORTANT INHIBITORS for your organization in considering Public Cloud services or Private Cloud technologies? What’s Holding Organizations Back from Switching to Cloud? © IDC Visit us at IDC.com and follow us on Twitter: @IDCIDC# US41636616 (August 2016) Source: IDC CloudView, January, 2016, n=11,350 worldwide respondents; IDC CloudView Survey, December, 2014, n=19,080 worldwide respondents; weighted by GDP and company size © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 17. Security Once You Get There
  • 18. © IDC Visit us at IDC.com and follow us on Twitter: @IDC Scale Changes Your Perspective…
  • 19. Q: What are the top three (3) cyber-attacks that your customer networks are currently experiencing? Phishing Ransomware Spyware Web-borne Malware Similar Threats – New Vectors © IDC Visit us at IDC.com and follow us on Twitter: @IDCSource: IDC-The Channel Company Security Trends Survey 2016
  • 20. Network Applications Data © IDC Visit us at IDC.com and follow us on Twitter: @IDC Too Many Vectors!!
  • 21. The 2017 Cyber Security Reality Growing number of environments and devices to protect Death of the perimeter Sophistication of cyber miscreants growing rapidly Proliferation of security tool sets Scarcity of qualified information security professionals © IDC Visit us at IDC.com and follow us on Twitter: @IDC 3rd Platform Effects on Security
  • 22. The Need for Elastic Security in the Cloud
  • 23. Security is not known for being flexible or elastic… © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 24. © IDC Visit us at IDC.com and follow us on Twitter: @IDC The Times They Are a Changin’
  • 25. One HUGE Example of Elasticity © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 26. At That Scale, Security Must Be Elastic  Impossible to manually provision security  Workloads/servers need consistent security every time  Security must be tailored to the specific cloud environment © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 27. Cloud Security Adoption: Customer Preferences Q: What are your customer preferences for on-premises and SaaS/cloud SECURITY solutions? Prefer on- premise security solutions 37% Prefer cloud security solutions 21% Prefer adopting a hybrid security approach 42%  Cloud, mobility, and Big Data adoption has increasingly impacted enterprise’s security strategies. They add complexity and drive investments in IT infrastructure and data protection.  The rising number of cyberattacks and increasing complexities have led to demand for managed security services and more sophisticated security solutions.
  • 28. Guidance  Enterprises should evaluate a security providers ability to be both flexible based on the environment and elastic in order to meet the demands of modern cloud environments  Performance is critical when deploying cloud security products, simply porting an existing product to a VM will not allow for efficiencies in the cloud  Inherent automation is key to cloud security products. © IDC Visit us at IDC.com and follow us on Twitter: @IDC
  • 29. Dynamic Security for AWS Workloads Dave Morrissey, Director – Cloud Service Providers, Fortinet
  • 30. Fortinet Facts Devices shipped >3.1M Unit share worldwide #1 Patents 380 Patents pending 298 In Network Security (IDC) Founded 2000 FY16 Revenue $1.3B Customers >310K Sunnyvale, CA Advanced AWS partner
  • 31. Security Must Be Flexible in the Cloud Environment Flexibility Elastic Flexibility Deployment Flexibility
  • 32. Global Security Scaling Supported in all 16 AWS Regions. Cloud Formation Templates accessible from GitHub. New Deployments Cloud Formation Templates built specifically for new AWS VPC deployments. Existing AWS Networks Cloud Formation Templates built specifically for existing AWS VPC augments. Flexibility to Scale Security in any Environment
  • 33. You select the scale-in/out trigger  CPU Utilization  Memory Utilization  Concurrent Sessions Adds to Security Groups Complements your use of Security Groups Network Segmentation & NACLs. Advanced Security Layers  Application Control  Antivirus  Antispam  IPS Flexible Scaling Criteria  Threat Research  DLP  WAF  VPN
  • 34. Flexible Deployment Options Multiple Auto Scaling Cloud Formation Templates Use the License you already Own On Demand Pay-as-you-Go BYOL  New VPC – Two options  Existing VPC – Two options  Use your BYOL license as your primary instance in each Availability Zone  Create On Demand Auto Scale Groups that Build on your BYOL License  Create primary instances and Auto Scale Groups with Hourly or Annual usage rates  On Demand Hourly will ALWAYS be used as the Auto Scaling Group – true Elasticity
  • 35. FortiGate Firewall Auto Scaling…Made Easy Integrates with AWS Services  AWS Cloud Formation Template: automates Auto Scaling deployment  Amazon CloudWatch: alarms trigger scale- up/down  AWS Elastic Load Balancing: distributes inbound traffic equally  Amazon Simple Que Service: lifecycle hook posts scaling events  Amazon EC2: creates a worker node  AZs: launches (2) FortiGates in (2) AZs in a High Availability architecture  AWS Identify and Access Management (IAM): creates dynamic roles for EC2 launch and SQS for Auto Scaling lifecycle hook  Management Console: enables the Cloud Formation Template deployment
  • 36. Q & A Moderators Nick Matthews, nickmatt@amazon.com John Jacobs, jjacobs@fortinet.com Speakers Rob Ayoub, rayoub@idc.com Dave Morrissey, dmorrissey@fortinet.com
  • 37. Resources  Learn More: www.Fortinet.com/aws  Contact Fortinet: awssales@fortinet.com  Auto Scaling Guide: https://www.fortinet.com/content/dam/fortinet/assets/solutio ns/aws/dg-fortigate-autoscaling.pdf  Configuring your FortiGate Firewall: http://cookbook.fortinet.com/creating-security-policies/ services like Route 53  Admin Guide for your FortiGate Firewall: http://docs.fortinet.com/fortigate/admin-guides

Editor's Notes

  1. Rob (IDC) hand-off Introduce Dave Morrissey Dave intros self and takes over
  2. Cloud, aerospace, NASA, Rocket
  3. Rob (IDC) hand-off Introduce Dave Morrissey Dave intros self and takes over
  4. I’d like to start with a quick introduction to Fortinet. Fortinet is a US based company that has been providing advanced network security solutions for over 15 years. Fortinet surpasses $1billion in revenue, is highly profitable with $1.4B in cash and zero debt and continues as the #1 Network Security vendor with over 3.1million products shipped to over 310,000 global customers. In fact, Fortinet has 2 TIMES more security products shipped than its closest competitor. From a customer perspective: Fortinet has a large footprint in enterprise, small to mid-sized companies, government, education and healthcare. This is extended to a global customer base of Fortune Companies with 8 of the Top 10 in EMEA and 9 of the Top 10 in APAC. 50 of the 60 worlds largest companies and ALL 10 of the top global Telecom Carriers have chosen Fortinet to protect their networks.
  5. Rob and IDC hit upon three key areas that Fortinet addresses: Security vendors should allow for environment flexibility – supporting new and existing VPC environments in global regions Elasticity should be flexible – allowing the use of customer defined scale criteria that layers onto existing AWS security Deployment should be flexible – leveraging Cloud Formation Templates to AUTOMATE scaling and simplify the deployment set-up
  6. Add notes
  7. Add notes
  8. Add notes
  9. Takes minutes …ad 1-2 items to call out In summary: Fortinet has created a set of Cloud Formation Templates that facilitate flexibility in: Your new or existing environment How you set-up the scaling criteria Auto Scaling automation and deployment By creating Templates that enable the use of BYOL licenses in conjunction with On Demand instances – our customers get the best of both worlds with a fixed asset that is always on linked to a dynamic asset that only scales when needed for a true Pay-As-You-Go model and maximum operational and capital efficiency. We look forward to working with you on creating new or augmenting existing VPCs that include Scalable Security capabilities. Thank you…