With the increase in frequency and sophistication of cyber-attacks such as ransomware and data exfiltration, enterprises are starting to adopt micro-segmentation as a key defense. With micro-segmentation you’re able to segment a network down to the individual hosts, drastically bringing down the attack surface.
ColorTokens platform-agnostic software-defined security enables enterprises to efficiently secure their dynamic application environments in minutes.
ColorTokens micro-segmentation reduces the attack surface and helps protect workloads, applications, and users distributed across bare metal or multi-cloud data centers.
For more info, visit www.colortokens.com. Live Demo - http://bit.ly/CTLiveDemo
3. Traditional Security is Rigid, Reactive and Complex
>75% of data center traffic – East-West
• Perimeter security is no more SECURE
– Attackers and attacks happening inside the
data center
• Reactive security doesn’t help
– Antivirus solutions playing catchup with
sophisticated attacks (zero-day, APTs)
E W
N
S
Bare-metal Hypervisors Cloud Containers
Data center evolution
Microservices
| 3
4. Data Centers of Today and Tomorrow
• Dynamic application environments
– Changing testing, development & staging environments
– Changing data access policies among these environments
| 4
Users
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Staging
Users
5. Data Centers of Today and Tomorrow
• Dynamic workloads
– Dynamic provisioning of Web, App or DB servers in an application environment
– Changing resource access policies
| 5
Web Server App Server DB
App Server DB
Security Policies
Security Policies
6. Data Centers of Today and Tomorrow
• Dynamic users
– User access from within the office
– User access from outside the office
– Vendor/contractor accesses
| 6
Web Server App Server DB
App. 1
Web Server App Server DB
App. 2
Office Users Mobile Users Vendor/Contractor
7. Data Centers of Today and Tomorrow
• Hybrid Data Center
– Application environments on the cloud and on-premise
– Dynamic resource access policies
| 7
Web Server App Server DB
Development
Web Server App Server DB
Testing
Office users Mobile users
Web Server App Server DB
Cloud
Resource Access Policies
8. | 8
Are no longer monolithic
Are spread across multiple locations
Have dynamic workloads created, deleted/migrated across clouds
In short, modern data centers:
Your data center can no longer be
built around rigid security solutions
Maintaining consistent security policies in hybrid environments is a challenge
Increases the attack surface - risk and exposure to data theft
Accomplishing compliance is painful
Because:
Data Centers of Today and Tomorrow
9. And, Hackers Know Rigid, Traditional Security is Ineffective
| 9
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Cloud
Office Users Mobile Users Vendor/Contractor
10. The Solution? Data Center Micro-Segmentation!
| 10
Proper ‘segmentation’ to protect data center assets
One of the golden rules in security
Foundation for compliance standards and security best practices!
With the increase in frequency and sophistication of cyber-
attacks such as ransomware and data exfiltration, enterprises
are starting to adopt micro-segmentation as a key defense:
- To segment the network down to individual hosts, and
- Reduce the attack surface
11. Different Approaches to Data Center Micro-Segmentation?
| 11
Network-based
Hypervisor-based
Host-based
Most common micro-segmentation techniques
12. Network-Based Micro-Segmentation
| 12
- Most of the network teams are familiar
with implementation as it’s been around for a while
- Firewall rules are managed and enforced outside the
workloads or hypervisor
- Leverages perimeter firewall for both N/S and E/W
traffic
Pros Cons
- Network centric approach - one can end up creating macro-
segmentation, increasing the attack surface
- Difficult to have fine grained/micro policies at
the workload level
- Policies are not agile when the workloads move
- Thousands of ACLs/firewall rules become cumbersome in
dynamic environments
- Can become very expensive with security inspection
- $$$ in public cloud implementations - cost of firewall +
cost of running multiple VMs to support firewall
function (minimum 2 for HA)
- Performance impact due to additional gateway bottlenecks
13. Hypervisor-Based Micro-Segmentation
| 13
- Programmable overlay networks and policies
- Policies are enforced outside the workload on the
hypervisor itself
- Agility to move policies along with workloads
Pros Cons
- No support for bare metal /physical workloads
- Hypervisor and vendor specific - lock-in
- Limited or no support to public cloud environment
- No support for container workloads
- Lack of process visibility
- Performance impact (CPU impact natively on the hypervisor)
- Number of policies supported by hypervisor
14. Host-Based Micro-Segmentation
| 14
- Completely independent of infrastructure/hypervisors
- Works across multi-vendor OS environments
- Works seamlessly across dynamic, distributed environments
- Independent of network changes (deploy one VM or thousands in
minutes)
- Policy agility along with the workloads
- Granular context awareness and visibility on every workload
- Insights into processes running on every workload to address issues
like dynamic port range, etc.
- Built around zero trust
Pros Cons
- Need to install an agent on every host
15. Host-Based Micro-Segmentation
| 15
ColorTokens provides a paradigm shift in enterprise IT security.
ColorTokens is platform-independent and enables enterprises to shift from
reactive to a proactive security model, without additional investment in
hardware and operational complexities.
16. ColorTokens Proactive Security for Hybrid Data Centers
| 16
Web Server App Server DB
Development
Web Server App Server DB
Testing
Web Server App Server DB
Cloud
Office Outside Vendor/Contractor
X
X
Micro-segmentation
Visibility
Process
level security
17. THANK YOU
Micro-Segmentation in 3 Easy Steps [Video]
See a Live Demo
Got Questions?
For more information about the ColorTokens
solution email us at sales@colortokens.com
Call +1 (408) 341-6030 to speak to a
ColorTokens security specialist.