Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Securing Your Cloud Transformation

339 views

Published on

Prezentace z konference Virtualization Forum 2019
Praha, 3.10.2019
Sál B

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Securing Your Cloud Transformation

  1. 1. ▪ Internal Use - Confidential MANAGING RISK IN A DIGITAL WORLD @RSAsecurity Secure Your Cloud Transformation
  2. 2. 2 ▪ Internal Use - Confidential DYNAMICS DRIVING CLOUD RISK DevOps increases cloud application speed-to-delivery R A P I D C L O U D A D O P T I O N D Y N A M I C W O R K F O R C E & 3 R D P A R T I E S F A S T T E C H N O L O G Y I N N O V A T I O N Cloud Risk Cloud applications and infrastructure limit IT security visibility User access may be the only line of defense Nine out of ten companies will have some part of their applications or infrastructure in the cloud by 2019 IDG 2018 Cloud Computing Survey; IDC FutureScape: Worldwide IT Industry 2019 Predictions; Gartner Top Security and Risk Management Trends, Jan 2019 500 million new applications will be created within the next 5 years of cloud security failures will be the customer’s fault through 2023 99%
  3. 3. ▪ Internal Use - Confidential CLOUD SECURITY CHALLENGES of organizations describe their cloud strategy as multicloud 86% LACK VISIBILITY 1:Forrester: Multicloud Arises From Changing Cloud Priorities, July 2018; 2: Oracle and KPMG Cloud Threat Report 2019; 3:CSA, Cloud Security Complexity 2019; of organizations lack expertise in cloud-native security 73% SKILLS SHORTAGE phishing is the most common attack vector over the past two years #1 CREDS COMPROMISED
  4. 4. ▪ Internal Use - Confidential THE RSA ADVANTAGE • Benchmark security capabilities against industry standards and best practices EXPERT CLOUD RISK ASSESSMENT & GUIDANCE • Get roadmaps for maturing cloud security based on business needs IDENTITY ANALYTICS & CONTINUOUS MONITORING • Use machine-learning authentication that employs context and risk • Apply identity analytics for insights into cloud access rights and entitlements DEEP VISIBILITY ACROSS ENTIRE CLOUD ESTATE • Correlate identity and access insights with real-time cyber-threat analytics • Spot suspicious cloud activity with user and entity behavior analytics • Assess third-party cloud risks and impacts to your business • See into logs, packets, virtual servers and containers for cloud environments • Connect CSP logging, monitoring and threat intelligence data • Manage CSP third-party risk across their entire lifecycles • Combine cloud configuration data with asset risk, to prioritize action
  5. 5. ▪ Internal Use - Confidential THE RSA ADVANTAGE EXPERT CLOUD RISK ASSESSMENT & GUIDANCE IDENTITY ANALYTICS & CONTINUOUS MONITORING DEEP VISIBILITY ACROSS ENTIRE CLOUD ESTATE Know how you compare to industry standards Fill your cloud security skills gap Empower users and stay safe Control access and quickly detect threats Gain broad insights into cloud environments Govern CSPs and respond faster to cloud risks
  6. 6. ▪ Internal Use - Confidential C O N F I D E N T I A L PRODDUCTS THE ADVANTAGE SERVICES R I S K A S S E S S M E N T S T R A T E G Y SECURITY RISK MANAGEMENT CLOUD SECURITY CAPABILITIES BENCHMARK AND MATURITY ROADMAP CLOUD PROVIDER RELATIONSHIP LIFECYCLE GOVERNANCE DEEP THREAT VISIBILITY INTO PRIVATE, PUBLIC & HYBRID CLOUD ENVIRONMENTS DEEP VISIBILITY & IDENTITY ANALYTICSRISK-BASED AUTHENTICATION FOR HIGH IDENTITY ASSURANCE GRANUAL INSIGHT INTO CLOUD ACCESS RIGHTS & ENTITLEMENTS FRICTIONLESS AUTHENTICATION TO MAKE CLOUD ACCESS SIMPLE DIGITAL TRANSFORMATION BUSINESS& SECURITYRISKS KEEPING WORKERS AGILE WHILE PROTECTING RESOURCES LIMITED VISIBILITY INTO CLOUD RESOURCES AND USER BEHAVIOR UNINTENTIONAL & INTENTIONAL ACCESS ABUSE AN INCREASINGLY LARGER ATTACK SURFACE DYNAMIC WORKFORCE & THIRD-PARTY ECOSYSTEM PRIVATE, PUBLIC AND HYBRID CLOUD ENVIRONMENTS RAPID SOFTWARE-AS-A-SERVICE (SAAS) ADOPTION CLOUD RISK ACCELERATING TECHNOLOGY INNOVATION

×