This document discusses the problem of data breaches due to security silos and introduces the Connected Security Alliance's solution of integrating different security products. It notes that over $80 billion is spent annually on security but breaches are still prevalent. The Alliance aims to eliminate information gaps between security solutions through product integration. It presents a reference architecture that connects solutions for network security, endpoint security, identity security, and security information and event management to better protect, detect, and remediate breaches.
2. L E A R N M O R E
MIKE
DESAI
Senior
Vice
President
L E A R N M O R E
RYAN
ROWCLIFFE
Sr.
Manager
Solution
Architecture
&
Enablement
3. AGENDA
• The
Problem:
Security
Silos
• The
Solution:
Connected
Security
• Reference
Architecture
4. • 4100+
data
breaches
• Millions
in
financial
harm
• $80B
spent
on
Security
• Breaches
still
prevalent
5. 63% 81%
2015 2016
Percentage
of
hacking
related
breaches
that
leveraged
either
stolen
and/or
weak
passwords.*
*
2017
Verizon
Data
Breach
Investigations
Report
6. Impact
of
a
Data
Breach
• Triggering
Cyber
Liability
Insurance
Policy
• Corporate
Brand
Damage
• Loss
of
Revenue
• Customer
Churn
7. Anatomy
of
a
Data
Breach
Majority of the
breaches in the
enterprises start with
social engineering and
phishing
Intruders gained access through a Citrix
remote access portal set up for use by
employees. {Home Depot Breach}
"The hackers acquired elevated rights that allowed them to navigate
portions of Home Depot's network and to deploy unique, custom built
malware on its self check out systems in the U.S. and Canada.” – eWeek
8. Our
Approach
Focus
on
addressing
the
data
breach
problem
Eliminate
the
white
noise
between
security
solutions
Vendors
work
together
to
ensure
interoperability
All
solutions
will
have
product
level
integration
Create
a
reference
architecture
Overall
Goal:
Protect.
Detect.
Remediate.
9. Network
Security
Endpoint
Security
Endpoint
Security
Identity
Security
Endpoint
Security
Identity
Security
Network
Security
Identity
Security
Endpoint
Security
Identity
Security
Security
Information
&
Event
Management
The
Connected
Security
Alliance
A
holistic
approach
to
the
data
breach
problem
12. Pre
Authentication
Risk
Analysis
• Over
3,000x
more
secure
than
2FA
alone
• Runs
in
the
background,
and
doesn’t
disrupt
day-‐to-‐day
usage
• Keeps
checking
after
the
log-‐in
process
for
truly
continuous
authentication
13. 2
Corporate
Apps
Launch
Pad
1
Enter
Corporate
UID/PWD
3
Access
to
Cloud
App
Required
based
on
workflow
Transparent
to
user
Strong
Security.
Amazing
User
Experience
Adaptive
Layers
14. T R U LY
I N T E G R AT E D
All
solutions
pass
rigorous
interoperability
testing
to
ensure
they
are
compatible.
The
result
is
a
reference
architecture
and
documentation
that
can
help
customers
implement
quickly
and
painlessly
A C T I O N A B L E
I N T E L L I G E N C E
By
providing
multiple
datasets
to
determine
risk
or
evidence
of
the
attack,
Alliance
products
can
increase
the
chance
of
detecting
a
breach
before
it
happens
F O U N D AT I O N
O F
I D E N T I T Y
Traditional
perimeter
security
is
failing
due
to
the
user
of
valid,
yet
compromised
user
credentials.
Alliance
members
will
leverage
identity-‐context
to
detect
and
protect
against
bad
actors
Benefits
of
a
Holistic
Approach
B E T T E R
T O G E T H E R
By
providing
multiple
datasets
to
determine
risk
or
evidence
of
the
attack,
Alliance
products
can
increase
the
chance
of
detecting
a
breach
before
it
happens