Availability + Performance
Digital assets are king, think about how build out multilayer security, dealing with thi sin 3 phases, solve for 1. trad volumetric attack 2. application attack, 3. How do we orchestrate protection we wrap around individual workflows, look at how networks are delivered, it’s about workflows and workloads, build out proection based on ciricical of digital interaction, we strie t oget targeted proection at a workload and workflow level…Trifecta approach…
20% of attacks are application attacks…have effective solution we can build around customers….
Super Scrubbing Centers
Close to where most Internet attacks enter CenturyLink network
Regional Scrubbing Centers
Handle attacks that originate within the regions
Local Scrubbing Centers
Unique abit yto deliver at edge of network container envo that we can tailr to custome requriemetn to build mutli layer seufrity at a workload lavel, now have ability to blalne invesemtnt dollars against risk at a global level, example can containerize ThreatX serices and deliver that at the edge of our network benefiting from clou dedge….
Ability to….provide can deliver application focused security protection. Through those containers can deliver multiple service chained services. An example of this is ThreatX. These cotnainers can be focused on different workflows amd workloads
This is what this slide is looking to articulate, the CenturyLink CDN edge compute. We can deliver containerized applications anywhere around the globe.
We can orchestrate those to create an environment that is agile and flexible. Within that containerized environment we can deliver security applications tailored to be individual workflow or workload.
Giving CenturyLink Customer the ability to create a multi-layer security policy around those individual workloads, a bit light Lego. Depending on where they want to invest and maybe where they don't want to invest, they can build out the appropriate structure.
If I look at several common use cases we are seeing in our organization of a moment. One with a large US retailer where 60% of their business is transacted online and a very large US content distributor, to mention the ones top of mind.
Both companies have large monolithic security structures around by digital assets, and both are suffering from the inflexibility in that structure. Their providers are not able to tailor the solution to meet their needs, as they operate in a world of one size fit them all.
To combat this, they are having to rely on professional services from their supplier, which has cost them more and adding significant cycles. They're not able to respond quickly to emergent threats, adapt the technology to take advantage of enhancements that have been taken to make by niche vendors. This is having direct impact on their organization the ability to execute, and the team moral as they frustrated by the pace that they are being forced to operate at.
CenturyLink can give them an environment which they can rapidly deploy at the edge of our network that can orchestrate delivery of security applications targeted to individual workflows, this environment can be tailored near real time development cycles.
We have given them the ability to run a digital twin on a local device and quickly publish to a live environment reducing development cycles drastically. They then can choose best of breed point solutions in the WAF and Bot Management space which are focused on individual pain points. These are delivered in a containerized environment based on individual risk profiles of the estate they want to protect.
Bring edge and volumetric together and orchestrate that to have end to end solution