SlideShare a Scribd company logo
1 of 37
Download to read offline
Defense in depth:
practical steps to securing
data & achieving compliance
© 2016 @cohesivenet
about me
Chris Purrington
VP Sales and Managing Director, UK
Cohesive Networks
© 2016 @cohesivenet
about Cohesive Networks
VNS3 security and
connectivity solutions
protect cloud-based apps
2100+ customers in 20+
countries across all industry
verticals and sectors
Enterprise
Security
Top 20 Most Promising
Company 2015
Partner
Network
TECHNOLOGY PARTNER
Cloud Marketplace Provider
© 2016 @cohesivenet
2,100+ customers in 20+ countries
• 800+ Self Service Customers
• 18+ SI Resellers
• 45+ ISV OEM

Including Industry Leaders
• Global Mutual Fund Company
• US ERP provider
• Global BPMS provider
• Cloud-based Threat Detection
• UK Fashion Brand
• Global Big Data Analytics Provider
customers run businesses in the cloud
© 2016 @cohesivenet
agenda
• Perimeter-based security has not evolved
• Data center security is not cloud security
• Modern defense in depth
• Application segmentation
• Customer use cases
© 2016 @cohesivenet
Perimeter-based security has not evolved
© 2016 @cohesivenet
security no longer #1 barrier to cloud adoption - still a top priority
2016
© 2016 @cohesivenet
weaknesses of the perimeter-based approach frequently on display:
METHOD OF LEAK
hacked
accidentally published
configuration error
inside job
leak
lost/stolen computer
lost/stolen media
poor security
World’s Biggest Data Breaches - Information is Beautiful
© 2016 @cohesivenet
© 2016 @cohesivenet
Perimeter Security
private data center security: walls
80% of security spend is on perimeter, leaving only 20% for interior
network security
© 2016 @cohesivenet
Perimeter Security
private data center vulnerability
hacker penetration
© 2016 @cohesivenet
Perimeter Security
private data center vulnerability
vulnerabilities go undetected for an average of
234 days!
© 2016 @cohesivenet
data center security is not cloud security
© 2016 @cohesivenet
Source: Azure Compliance
public cloud providers do build secure clouds…
• CSPs must meet tougher standards
• Reputation = vested interest in high levels of security
• Bigger budgets for infrastructure, data centres, compliance
• Better systems to vet and manage security staff
• Security software: dedicated instances, VLANs, VPNs, firewalls, edge protection
© 2016 @cohesivenet
• “49% of IT decision makers admit they are ‘very or extremely anxious’ about
the security implications of cloud services” - BT study 2015
• 75% of enterprises use additional security measures beyond what CSPs
offer - Clutch survey, March 2016
• Security risks exist beyond the “shared responsibility model”:
• 3rd party shared environments
• lack of insight into and control of underlying infra.
• isolation from other cloud users
• lack of in cloud encryption in transit
… yet CIOs and CEOs are still concerned.
© 2016 @cohesivenet
modern defense in depth
© 2016 @cohesivenet
deliver your applications in your over the top cloud networks
Layer 7


Layer 6
Layer 5
Layer 4
Layer 3
Layer 3
Layer 2
Layer1
Layer 0
Cloud Layer 3 Network
Limit of user access,
control and visibility
Hardware
You Can’t Get To
Hypervisor You
Don’t Control
Application
Policies
You Control
Overlay Network 1 Overlay Network 2
Cloud
Service
Provider
Applications
© 2016 @cohesivenet
add cloud network and security with VNS3
firewall vpn concentrator
protocol
distributor
extensible nfv
VNS3 Core NetworkComponents
router switch
•Deploy in any cloud/virtual infra
•Create your own application specific network
•Separate network identity from physical location
•Control end to end encryption, IP addressing & network
topology
© 2016 @cohesivenet
extend overlay networks beyond single CSPs
Active IPsec Tunnel
VNS3 Controller 1 VNS3 Controller 2 VNS3 Controller 3
VNS3 Overlay Network - 172.31.1.0/24
Peered Peered
Overlay IP: 172.31.1.1
Cloud Server A
Overlay IP: 172.31.1.2
Cloud Server B
Overlay IP: 172.31.1.3
Cloud Server C
Overlay IP: 172.31.1.4
Primary DB
Overlay IP: 172.31.1.5
Backup DB
ireland frankfurt
Data Center 2
London
Data Center 1
Seattle, WA
Failover IPsec Tunnel
vpc 1 vlan 2 vpc 3
VNS3:ha 1
ireland
© 2016 @cohesivenet
VNS3:net extending your network functions
Plug-in model allows you to easily customize your network appliance to
add additional layer 4-7 network capabilities
firewall vpn concentrator
protocol
distributor
extensible nfv
VNS3CoreComponents
router switch
waf content caching nids proxy load balancing custom
L4-L7 Plugin System
© 2016 @cohesivenet
build on CSP’s layers of control and access
Provider Owned/Provider Controlled
Provider Owned/User Controlled
VNS3 - User Owned/User Controlled
User Owned/User Controlled
Key security elements must be controlled

by the customer, but separate from 

the provider
Cloud Edge Protection
Cloud Isolation
Cloud VLAN
Cloud Network Firewall
Cloud Network Service
VNS3 Virtual Firewall
VNS3 Encrypted Overlay
N
etwork
VNS3 NIDS, WAF, e
tc.
Instance
OS Port Filtering
Encrypted Disk
© 2016 @cohesivenet
application segmentation with VNS3
© 2016 @cohesivenet
application segmentation
micro-perimeter around critical apps in any
© 2016 @cohesivenet
limit server interactions
Ensure the “right” traffic is going through
secure app-layer switches
© 2016 @cohesivenet
control network flow
traffic only flows in permitted directions,
from permitted locations
© 2016 @cohesivenet
security for each app
© 2016 @cohesivenet
enforce traffic policies with firewalls
© 2016 @cohesivenet
detect malicious traffic with NIDS
! !
!!
© 2016 @cohesivenet
limit intra-app network traffic with WAF
© 2016 @cohesivenet
monitor traffic with app-layer switches
© 2016 @cohesivenet
Perimeter Security
private data center vulnerability
vulnerabilities go undetected for an average of
234 days!
© 2016 @cohesivenet
VNS3 security use cases
© 2016 @cohesivenet
Investment Management Firm meets
PCI and FISMA requirements for Data
Center deployments using VNS3:turret
north america
VNS3:turret secured and segmented
applications deployed to the private
data center allowing IMF to enforce
security policies at the application
layer
private cloud
$230B in Funds Under
Management
financial services
Customer DC
App
Application 1
Web
DB
MO
Application 2
App
Web
DB
MO
Application 3
App
Web
DB
MO
Application 4
App
Web
DB
MO
Application 5
App
Web
DB
MO
Application N
App
Web
DB
MO
© 2016 @cohesivenet3434
Telecom Retail and Services company
productized mobile, fixed line and
broadband provisioning as SaaS
europe
VNS3 used to secure all public &
private VLAN traffic for adherence to
Data Protection Standards
cloud WAN / hybrid cloud
$4.5B Mobile and Mobile
Related Revenues
telecommunications
MVNO Carrier
MVNO Brand
VNS3 Overlay Network
Topology per Customer
IPsec Tunnel
Mobile
Customer
Mobile
Customer
internet
internet
us-west-2
MVNO Infrastructure Overlay
logical
subnet 1
logical
subnet 2
logical
subnet 3
logical
subnet N
server database
database database
server
server server
© 2016 @cohesivenet35
Disruptive payment processor built
loosely coupled infrastructure in public
cloud with DR resource networks for
database replication/failover
north america
VNS3 created overlay network to
federate multiple AWS regions, IP
mobility, and secure db replication
cloud dr
Available in over 8,000

7-Eleven stores nationwide
financial services
¡
Devops
VNS3 1 (NAT + Bastion) console-east
1a-edge logical subnet
1a-private logical subnet DevOps
1c-private logical
subnet
VNS3 logical
subnet 4
1c-edge logical
subnet
Resource Network/ DR
us-east-1b us-east-1e us-west-1a us-west-1b
us-east-1 us-west-1
1a-edge logical
subnet
1a-private logical
subnet
Overlay Network
1e-private logical subnet
1e-edge logical subnet
VNS3 2 VNS3 3 VNS3 4
VNS3 logical
subnet 3
VNS3 logical subnet 1 console logical subnet VNS3 logical subnet 2
server database
© 2016 @cohesivenet36
BMP and CRM vendor offered Fortune
500 customers an alternative SaaS
version of their software in the cloud
ISV
north america
VNS3 isolated each customer in the
cloud and allowed them to integrate all
deployments to their existing NOC
partner/customer network
$600m Annual Revenue
us-west-2
us-east-1
Customer 1
Customer 2
Customer 3
Customer N
ISV data center
Customer 1
Customer 3
Customer N
Customer 2
server
server
server
server
database
database
database
database
Overlay Network
Overlay Network
Overlay Network
Overlay Network
with VNS3:ms
server database
© 2016 @cohesivenet
Cohesive Networks
Security and
connectivity at the
top of the cloud
2,100+ customers
protect cloud-
based applications
cloud demands
grow, along with
complexity
Your Applications Connected and Secure

More Related Content

What's hot

What's hot (20)

Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Palo Alto Networks - Magnifier
Palo Alto Networks - MagnifierPalo Alto Networks - Magnifier
Palo Alto Networks - Magnifier
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 

Viewers also liked

Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 

Viewers also liked (7)

Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 2 Hands On
CIW Lab with CoheisveFT: Get started in public cloud - Part 2 Hands OnCIW Lab with CoheisveFT: Get started in public cloud - Part 2 Hands On
CIW Lab with CoheisveFT: Get started in public cloud - Part 2 Hands On
 
Introduction to Cloud and Eucalyptus
Introduction to Cloud and EucalyptusIntroduction to Cloud and Eucalyptus
Introduction to Cloud and Eucalyptus
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 

Similar to Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps to securing your data and achieving compliance"

cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 

Similar to Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps to securing your data and achieving compliance" (20)

Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
 
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13CohesiveFT and IBM joint EMEA Webinar - 20Jun13
CohesiveFT and IBM joint EMEA Webinar - 20Jun13
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...
(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...
(ENT307) AWS Direct Connect Solutions and Network Automation | AWS re:Invent ...
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
Cloud Security Best Practices - Part 1
Cloud Security Best Practices - Part 1Cloud Security Best Practices - Part 1
Cloud Security Best Practices - Part 1
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
AWS re:Invent 2016: Future-Proofing the WAN and Simplifying Security On Your ...
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure Connectivity on Every Network Layer
Secure Connectivity on Every Network LayerSecure Connectivity on Every Network Layer
Secure Connectivity on Every Network Layer
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 

More from Cohesive Networks

More from Cohesive Networks (20)

Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
 
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASACohesive Networks Support Docs: VNS3 Setup for Cisco ASA
Cohesive Networks Support Docs: VNS3 Setup for Cisco ASA
 
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for SonicwallCohesive Networks Support Docs: VNS3 Setup for Sonicwall
Cohesive Networks Support Docs: VNS3 Setup for Sonicwall
 
Cohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for JuniperCohesive Networks Support Docs: VNS3 Setup for Juniper
Cohesive Networks Support Docs: VNS3 Setup for Juniper
 
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for FortigateCohesive Networks Support Docs: VNS3 Setup for Fortigate
Cohesive Networks Support Docs: VNS3 Setup for Fortigate
 
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container GuideCohesive Networks Support Docs: VNS3:turret Base Container Guide
Cohesive Networks Support Docs: VNS3:turret Base Container Guide
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps to securing your data and achieving compliance"

  • 1. Defense in depth: practical steps to securing data & achieving compliance
  • 2. © 2016 @cohesivenet about me Chris Purrington VP Sales and Managing Director, UK Cohesive Networks
  • 3. © 2016 @cohesivenet about Cohesive Networks VNS3 security and connectivity solutions protect cloud-based apps 2100+ customers in 20+ countries across all industry verticals and sectors Enterprise Security Top 20 Most Promising Company 2015 Partner Network TECHNOLOGY PARTNER Cloud Marketplace Provider
  • 4. © 2016 @cohesivenet 2,100+ customers in 20+ countries • 800+ Self Service Customers • 18+ SI Resellers • 45+ ISV OEM
 Including Industry Leaders • Global Mutual Fund Company • US ERP provider • Global BPMS provider • Cloud-based Threat Detection • UK Fashion Brand • Global Big Data Analytics Provider customers run businesses in the cloud
  • 5. © 2016 @cohesivenet agenda • Perimeter-based security has not evolved • Data center security is not cloud security • Modern defense in depth • Application segmentation • Customer use cases
  • 6. © 2016 @cohesivenet Perimeter-based security has not evolved
  • 7. © 2016 @cohesivenet security no longer #1 barrier to cloud adoption - still a top priority 2016
  • 8. © 2016 @cohesivenet weaknesses of the perimeter-based approach frequently on display: METHOD OF LEAK hacked accidentally published configuration error inside job leak lost/stolen computer lost/stolen media poor security World’s Biggest Data Breaches - Information is Beautiful
  • 10. © 2016 @cohesivenet Perimeter Security private data center security: walls 80% of security spend is on perimeter, leaving only 20% for interior network security
  • 11. © 2016 @cohesivenet Perimeter Security private data center vulnerability hacker penetration
  • 12. © 2016 @cohesivenet Perimeter Security private data center vulnerability vulnerabilities go undetected for an average of 234 days!
  • 13. © 2016 @cohesivenet data center security is not cloud security
  • 14. © 2016 @cohesivenet Source: Azure Compliance public cloud providers do build secure clouds… • CSPs must meet tougher standards • Reputation = vested interest in high levels of security • Bigger budgets for infrastructure, data centres, compliance • Better systems to vet and manage security staff • Security software: dedicated instances, VLANs, VPNs, firewalls, edge protection
  • 15. © 2016 @cohesivenet • “49% of IT decision makers admit they are ‘very or extremely anxious’ about the security implications of cloud services” - BT study 2015 • 75% of enterprises use additional security measures beyond what CSPs offer - Clutch survey, March 2016 • Security risks exist beyond the “shared responsibility model”: • 3rd party shared environments • lack of insight into and control of underlying infra. • isolation from other cloud users • lack of in cloud encryption in transit … yet CIOs and CEOs are still concerned.
  • 16. © 2016 @cohesivenet modern defense in depth
  • 17. © 2016 @cohesivenet deliver your applications in your over the top cloud networks Layer 7 
 Layer 6 Layer 5 Layer 4 Layer 3 Layer 3 Layer 2 Layer1 Layer 0 Cloud Layer 3 Network Limit of user access, control and visibility Hardware You Can’t Get To Hypervisor You Don’t Control Application Policies You Control Overlay Network 1 Overlay Network 2 Cloud Service Provider Applications
  • 18. © 2016 @cohesivenet add cloud network and security with VNS3 firewall vpn concentrator protocol distributor extensible nfv VNS3 Core NetworkComponents router switch •Deploy in any cloud/virtual infra •Create your own application specific network •Separate network identity from physical location •Control end to end encryption, IP addressing & network topology
  • 19. © 2016 @cohesivenet extend overlay networks beyond single CSPs Active IPsec Tunnel VNS3 Controller 1 VNS3 Controller 2 VNS3 Controller 3 VNS3 Overlay Network - 172.31.1.0/24 Peered Peered Overlay IP: 172.31.1.1 Cloud Server A Overlay IP: 172.31.1.2 Cloud Server B Overlay IP: 172.31.1.3 Cloud Server C Overlay IP: 172.31.1.4 Primary DB Overlay IP: 172.31.1.5 Backup DB ireland frankfurt Data Center 2 London Data Center 1 Seattle, WA Failover IPsec Tunnel vpc 1 vlan 2 vpc 3 VNS3:ha 1 ireland
  • 20. © 2016 @cohesivenet VNS3:net extending your network functions Plug-in model allows you to easily customize your network appliance to add additional layer 4-7 network capabilities firewall vpn concentrator protocol distributor extensible nfv VNS3CoreComponents router switch waf content caching nids proxy load balancing custom L4-L7 Plugin System
  • 21. © 2016 @cohesivenet build on CSP’s layers of control and access Provider Owned/Provider Controlled Provider Owned/User Controlled VNS3 - User Owned/User Controlled User Owned/User Controlled Key security elements must be controlled
 by the customer, but separate from 
 the provider Cloud Edge Protection Cloud Isolation Cloud VLAN Cloud Network Firewall Cloud Network Service VNS3 Virtual Firewall VNS3 Encrypted Overlay N etwork VNS3 NIDS, WAF, e tc. Instance OS Port Filtering Encrypted Disk
  • 22. © 2016 @cohesivenet application segmentation with VNS3
  • 23. © 2016 @cohesivenet application segmentation micro-perimeter around critical apps in any
  • 24. © 2016 @cohesivenet limit server interactions Ensure the “right” traffic is going through secure app-layer switches
  • 25. © 2016 @cohesivenet control network flow traffic only flows in permitted directions, from permitted locations
  • 27. © 2016 @cohesivenet enforce traffic policies with firewalls
  • 28. © 2016 @cohesivenet detect malicious traffic with NIDS ! ! !!
  • 29. © 2016 @cohesivenet limit intra-app network traffic with WAF
  • 30. © 2016 @cohesivenet monitor traffic with app-layer switches
  • 31. © 2016 @cohesivenet Perimeter Security private data center vulnerability vulnerabilities go undetected for an average of 234 days!
  • 32. © 2016 @cohesivenet VNS3 security use cases
  • 33. © 2016 @cohesivenet Investment Management Firm meets PCI and FISMA requirements for Data Center deployments using VNS3:turret north america VNS3:turret secured and segmented applications deployed to the private data center allowing IMF to enforce security policies at the application layer private cloud $230B in Funds Under Management financial services Customer DC App Application 1 Web DB MO Application 2 App Web DB MO Application 3 App Web DB MO Application 4 App Web DB MO Application 5 App Web DB MO Application N App Web DB MO
  • 34. © 2016 @cohesivenet3434 Telecom Retail and Services company productized mobile, fixed line and broadband provisioning as SaaS europe VNS3 used to secure all public & private VLAN traffic for adherence to Data Protection Standards cloud WAN / hybrid cloud $4.5B Mobile and Mobile Related Revenues telecommunications MVNO Carrier MVNO Brand VNS3 Overlay Network Topology per Customer IPsec Tunnel Mobile Customer Mobile Customer internet internet us-west-2 MVNO Infrastructure Overlay logical subnet 1 logical subnet 2 logical subnet 3 logical subnet N server database database database server server server
  • 35. © 2016 @cohesivenet35 Disruptive payment processor built loosely coupled infrastructure in public cloud with DR resource networks for database replication/failover north america VNS3 created overlay network to federate multiple AWS regions, IP mobility, and secure db replication cloud dr Available in over 8,000
 7-Eleven stores nationwide financial services ¡ Devops VNS3 1 (NAT + Bastion) console-east 1a-edge logical subnet 1a-private logical subnet DevOps 1c-private logical subnet VNS3 logical subnet 4 1c-edge logical subnet Resource Network/ DR us-east-1b us-east-1e us-west-1a us-west-1b us-east-1 us-west-1 1a-edge logical subnet 1a-private logical subnet Overlay Network 1e-private logical subnet 1e-edge logical subnet VNS3 2 VNS3 3 VNS3 4 VNS3 logical subnet 3 VNS3 logical subnet 1 console logical subnet VNS3 logical subnet 2 server database
  • 36. © 2016 @cohesivenet36 BMP and CRM vendor offered Fortune 500 customers an alternative SaaS version of their software in the cloud ISV north america VNS3 isolated each customer in the cloud and allowed them to integrate all deployments to their existing NOC partner/customer network $600m Annual Revenue us-west-2 us-east-1 Customer 1 Customer 2 Customer 3 Customer N ISV data center Customer 1 Customer 3 Customer N Customer 2 server server server server database database database database Overlay Network Overlay Network Overlay Network Overlay Network with VNS3:ms server database
  • 37. © 2016 @cohesivenet Cohesive Networks Security and connectivity at the top of the cloud 2,100+ customers protect cloud- based applications cloud demands grow, along with complexity Your Applications Connected and Secure