SlideShare a Scribd company logo
1 of 32
Security “in-the-Cloud”
Getting Past the fluff and into the Cloud
Presented by: Babak Pasdar
President & CEO
Bat Blue Corporation
Cloud/Sec
Board Member:
* Security Goals:
Maintain the integrity, privacy and
availability of organizational systems
and data.
* Perimeter Security Challenges
The current approach to Perimeter security is...
...Expensive
...Resource intensive
…Ultimately ineffective
Cloud/Sec
* Perimeter Security Challenges - Expensive
The Current Approach to Perimeter Security
Demands...
...Dozens of Disparate Technologies
Firewalls, IPS, Proxy, URL-Filter, Anti-Virus, Anti-
Spyware, VPN (SSL/IPSec), Web App Firewalls, Load
Balancers, SIMs, etc...
...Multitude (24+) of Devices
Cloud/Sec
This translates to initial capital costs of...
...$75K - $100K+ for a small site
...$250K - $500K for a medium site or dot com
...$750k - $Millions for a large site
* Security Challenges - Resource Intensive
Dozens of Technologies & 24+ Devices...
...Require extremely complex & expensive
implementations
...Drive hundreds of direct and indirect
integration points forcing complicated
troubleshooting
...Requires managing dozens of disparate
policy sets quite often by disparate
resources
...Operate as “Islands of Security” without
an integrated operational mode
...Managing many vendor relationships
Cloud/Sec
ISP-1 ISP-2
In-DMZ Out-DMZ
P
r
o
x
y
A
V
U
R
L
I
P
S
e
c
S
S
L
S
p
a
m
* Security Challenges - Ineffective Security
Ineffective Security Model...
...Expensive equipment force organizations to
manage risk
...Complex security leads to a focus on
functionality and performance and not
security
...”Islands of Security” lead to protection gaps
and inconsistent security operations
...It takes hours, days or weeks to get a view on
what happened hours, days or weeks ago
Cloud/Sec
* Security Challenges - Ineffective Security
Ineffective Security Tools...
...Firewall is NOT security | Firewall is “Noise
Management”
...VPN is NOT security | VPN is privacy
...HTTPS is NOT security | HTTPS is privacy
...SSL is NOT security | SSL is privacy
...Security REQUIRES application level insight:
.... Proxy
.... IDS / IPS
.... Other Miscellaneous (WAN XL &
Network Visibility)
Cloud/Sec
* Security Challenges - Ineffective Security
Proxy as a security tool...
...is only application protocol aware (ie: http)
...limited to a handful of protocols and not all
...functions no better than a firewall, but at a
higher level
...is extremely slow
Cloud/Sec
* Security Challenges - Ineffective Security
IPS as a security tool...
...IPS is only 20-50% effective
after tuning
...That means it is 50+% un-credible
forcing alerting on rather than
blocking threats
...Forensics is extremely resource
intensive and can only leads to one
of two results:
Cloud/Sec
IPS overlays Thousands of
Signatures over data streams
Bit-pattern matching generates
significant false positives
This forces organizations
to do Forensics
Your Tools
Are Inaccurate!
You're
Breached!
Both of which are after the fact and at great cost!!!!
* Security Challenges - so what's the answer?
Cloud/Sec
A completely new security paradigm that delivers...
Economy – eliminating all capital expenses
Effectiveness – Application layer security for all
traffic regardless of port and
protocol
Efficiency – Reduce the burden on the IT staff
and make security operations
repeatable
Introducing:
Cloud/Sec
Cloud/Sec is a completely in-the-cloud perimeter security
solution that...
...Delivers superior application visibility & security
...Offers a single unified interface for managing Security
...Runs on BlueNET – a Cloud enabler that is extremely fast
...Diversely available data centers nationwide
...Requires no hardware investments & simple to activate
...Supports all organizational locations
....Headquarters
....Branch offices
....Home users
....Hotel / traveling users
....Mobile phone users (coming soon)
Cloud/Sec
Cloud/Sec Delivers superior visibility & security...
…Consolidate Perimeter Security functions
…Application identity & visibility
...User-based access control
(by application or port/protocol)
...Accurate Threat Management
(Malware, Spyware & Vulnerabilities)
...SSL decryption and re-encryption!!!
...Comprehensive integrated application & threat research
...URL filtering and site classification
...File by type transfer control
...Data Leakage Prevention (Credit Card, Social Security, etc..)
Consolidated Perimeter Security - Application Identity & Visibility
Cloud/Sec
Consolidated Security Perimeter - Access Control
Cloud/Sec
A single Policy can
support...
...Access Control
...Threat Management
...Malware Protection
...URL Filtering
...File Control
...Leakage Prevention
Consolidated Security Perimeter - Threat Management
Cloud/Sec
Consolidated Security Perimeter - SSL Decryption and Re-encryption
…Internet Internal SSL Decryption & Re-encryption→
...Internal Internet SSL Decryption & Re-encryption→
Cloud/Sec
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Step 1. Identify Applications
Step 2. Get Detailed Assessment on the Application
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Step 3. Get Source and Destination Information including IP, User &
Country
Step 4. Get Site
Categorization Information
Step 5. Get Threat Information
Consolidated Security Perimeter – Application & Threat Research
Cloud/Sec
Consolidated Security Perimeter - URL Filtering & Site Classification
Cloud/Sec
Consolidated Security Perimeter - File Transfer Control
Cloud/Sec
Consolidated Security Perimeter - Data Leakage Prevention
Cloud/Sec
BlueNET
BlueNETBlueNET – The Cloud Enabler
BlueNETBlueNET eliminates the performance penalty of operating in-the-cloud
…Designed from the ground up to support Cloud Apps
...Uses “Hot Potato Extreme” Routing
...Guaranteed “One Hop Out” Routing
...No single point of failure for even the smallest sites
...Incorporates terabit-grade infrastructure
...Operates with extremely low latency
...Available in data centers nationwide
Cloud/Sec
BlueNETBlueNET & Cloud/SecCloud/Sec data centers...
…New York, NY ...Atlanta, GA ...Los Angeles, CA
111 8th
Ave. ...Sanfrancisco, CA
60 Hudson St. ...Chicago, IL ...Ashburn, VA
...Clifton, NJ ...Seattle, WA* ...Las Vegas, NV*
* Coming Soon
Cloud/SecCloud/Sec – Use Cases
…Multi-Site Organization
...Headquarters
...Branch Office
...Home
...Hotel
...Complete in-the-cloud Computing
...In-the-cloud Site Redundancy
...Dot Com Perimeter in-the-cloud
...Internet Anonymization
Cloud/SecCloud/Sec – Use Cases
…Multi-Site Organization
...Headquarters
...Branch Office
...Home
...Hotel
Cloud/SecCloud/Sec – Use Cases
...Complete in-the-cloud Computing
Cloud/SecCloud/Sec – Use Cases
...Dot Com Perimeter in-the-cloud
Cloud/SecCloud/Sec – Use Cases
...In-the-cloud Site Redundancy
Cloud/SecCloud/Sec – Use Cases
...Internet Anonymization
Cloud/SecCloud/Sec – Use Cases
...Internet Anonymization
Cloud/SecCloud/Sec – Performance Specs
Cloud/SecCloud/Sec
Thank YouThank You
Any Questions? Want to see a demo?
Please see us at booth 713.

More Related Content

What's hot

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...Edureka!
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaEdureka!
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPTMOHAMMEDELALAM1
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...Priyanka Aash
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesDr. Rajesh P Barnwal
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical AllianceCisco DevNet
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoNetwork Performance Channel GmbH
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the CloudSymantec
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecuritylfh663
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing Reza Pahlava
 

What's hot (20)

How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
My Final Year Project PPT
My Final Year Project PPTMy Final Year Project PPT
My Final Year Project PPT
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Cisco Security Technical Alliance
Cisco Security Technical AllianceCisco Security Technical Alliance
Cisco Security Technical Alliance
 
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania presoFortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
Fortifying Network Security with a Defense In Depth Strategy - IDC Romania preso
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
INFOGRAPHIC▶  Protecting Corporate Information In the CloudINFOGRAPHIC▶  Protecting Corporate Information In the Cloud
INFOGRAPHIC▶ Protecting Corporate Information In the Cloud
 
A Career in Cybersecurity
A Career in CybersecurityA Career in Cybersecurity
A Career in Cybersecurity
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019SOC-as-a-Service - comSpark 2019
SOC-as-a-Service - comSpark 2019
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 

Similar to Bat Blue Cloud Sec Presentation 4

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...Andris Soroka
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysisCarlo Dapino
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationPa Al
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesJacopo Nardiello
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 

Similar to Bat Blue Cloud Sec Presentation 4 (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
2015 - The Cloud for Managers @ Riga Business School - DSS - Cloud risks and ...
 
Security architecture - Perform a gap analysis
Security architecture - Perform a gap analysisSecurity architecture - Perform a gap analysis
Security architecture - Perform a gap analysis
 
Cloud security
Cloud security Cloud security
Cloud security
 
Protect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/ReputationProtect the data - Cyber security - Breaches - Brand/Reputation
Protect the data - Cyber security - Breaches - Brand/Reputation
 
The Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on KubernetesThe Art of Cloud Native Defense on Kubernetes
The Art of Cloud Native Defense on Kubernetes
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Bat Blue Cloud Sec Presentation 4

  • 1. Security “in-the-Cloud” Getting Past the fluff and into the Cloud Presented by: Babak Pasdar President & CEO Bat Blue Corporation Cloud/Sec Board Member:
  • 2. * Security Goals: Maintain the integrity, privacy and availability of organizational systems and data. * Perimeter Security Challenges The current approach to Perimeter security is... ...Expensive ...Resource intensive …Ultimately ineffective Cloud/Sec
  • 3. * Perimeter Security Challenges - Expensive The Current Approach to Perimeter Security Demands... ...Dozens of Disparate Technologies Firewalls, IPS, Proxy, URL-Filter, Anti-Virus, Anti- Spyware, VPN (SSL/IPSec), Web App Firewalls, Load Balancers, SIMs, etc... ...Multitude (24+) of Devices Cloud/Sec This translates to initial capital costs of... ...$75K - $100K+ for a small site ...$250K - $500K for a medium site or dot com ...$750k - $Millions for a large site
  • 4. * Security Challenges - Resource Intensive Dozens of Technologies & 24+ Devices... ...Require extremely complex & expensive implementations ...Drive hundreds of direct and indirect integration points forcing complicated troubleshooting ...Requires managing dozens of disparate policy sets quite often by disparate resources ...Operate as “Islands of Security” without an integrated operational mode ...Managing many vendor relationships Cloud/Sec
  • 6. * Security Challenges - Ineffective Security Ineffective Security Model... ...Expensive equipment force organizations to manage risk ...Complex security leads to a focus on functionality and performance and not security ...”Islands of Security” lead to protection gaps and inconsistent security operations ...It takes hours, days or weeks to get a view on what happened hours, days or weeks ago Cloud/Sec
  • 7. * Security Challenges - Ineffective Security Ineffective Security Tools... ...Firewall is NOT security | Firewall is “Noise Management” ...VPN is NOT security | VPN is privacy ...HTTPS is NOT security | HTTPS is privacy ...SSL is NOT security | SSL is privacy ...Security REQUIRES application level insight: .... Proxy .... IDS / IPS .... Other Miscellaneous (WAN XL & Network Visibility) Cloud/Sec
  • 8. * Security Challenges - Ineffective Security Proxy as a security tool... ...is only application protocol aware (ie: http) ...limited to a handful of protocols and not all ...functions no better than a firewall, but at a higher level ...is extremely slow Cloud/Sec
  • 9. * Security Challenges - Ineffective Security IPS as a security tool... ...IPS is only 20-50% effective after tuning ...That means it is 50+% un-credible forcing alerting on rather than blocking threats ...Forensics is extremely resource intensive and can only leads to one of two results: Cloud/Sec IPS overlays Thousands of Signatures over data streams Bit-pattern matching generates significant false positives This forces organizations to do Forensics Your Tools Are Inaccurate! You're Breached! Both of which are after the fact and at great cost!!!!
  • 10. * Security Challenges - so what's the answer? Cloud/Sec A completely new security paradigm that delivers... Economy – eliminating all capital expenses Effectiveness – Application layer security for all traffic regardless of port and protocol Efficiency – Reduce the burden on the IT staff and make security operations repeatable
  • 11. Introducing: Cloud/Sec Cloud/Sec is a completely in-the-cloud perimeter security solution that... ...Delivers superior application visibility & security ...Offers a single unified interface for managing Security ...Runs on BlueNET – a Cloud enabler that is extremely fast ...Diversely available data centers nationwide ...Requires no hardware investments & simple to activate ...Supports all organizational locations ....Headquarters ....Branch offices ....Home users ....Hotel / traveling users ....Mobile phone users (coming soon)
  • 12. Cloud/Sec Cloud/Sec Delivers superior visibility & security... …Consolidate Perimeter Security functions …Application identity & visibility ...User-based access control (by application or port/protocol) ...Accurate Threat Management (Malware, Spyware & Vulnerabilities) ...SSL decryption and re-encryption!!! ...Comprehensive integrated application & threat research ...URL filtering and site classification ...File by type transfer control ...Data Leakage Prevention (Credit Card, Social Security, etc..)
  • 13. Consolidated Perimeter Security - Application Identity & Visibility Cloud/Sec
  • 14. Consolidated Security Perimeter - Access Control Cloud/Sec A single Policy can support... ...Access Control ...Threat Management ...Malware Protection ...URL Filtering ...File Control ...Leakage Prevention
  • 15. Consolidated Security Perimeter - Threat Management Cloud/Sec
  • 16. Consolidated Security Perimeter - SSL Decryption and Re-encryption …Internet Internal SSL Decryption & Re-encryption→ ...Internal Internet SSL Decryption & Re-encryption→ Cloud/Sec
  • 17. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec Step 1. Identify Applications Step 2. Get Detailed Assessment on the Application
  • 18. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec Step 3. Get Source and Destination Information including IP, User & Country Step 4. Get Site Categorization Information Step 5. Get Threat Information
  • 19. Consolidated Security Perimeter – Application & Threat Research Cloud/Sec
  • 20. Consolidated Security Perimeter - URL Filtering & Site Classification Cloud/Sec
  • 21. Consolidated Security Perimeter - File Transfer Control Cloud/Sec
  • 22. Consolidated Security Perimeter - Data Leakage Prevention Cloud/Sec
  • 23. BlueNET BlueNETBlueNET – The Cloud Enabler BlueNETBlueNET eliminates the performance penalty of operating in-the-cloud …Designed from the ground up to support Cloud Apps ...Uses “Hot Potato Extreme” Routing ...Guaranteed “One Hop Out” Routing ...No single point of failure for even the smallest sites ...Incorporates terabit-grade infrastructure ...Operates with extremely low latency ...Available in data centers nationwide
  • 24. Cloud/Sec BlueNETBlueNET & Cloud/SecCloud/Sec data centers... …New York, NY ...Atlanta, GA ...Los Angeles, CA 111 8th Ave. ...Sanfrancisco, CA 60 Hudson St. ...Chicago, IL ...Ashburn, VA ...Clifton, NJ ...Seattle, WA* ...Las Vegas, NV* * Coming Soon
  • 25. Cloud/SecCloud/Sec – Use Cases …Multi-Site Organization ...Headquarters ...Branch Office ...Home ...Hotel ...Complete in-the-cloud Computing ...In-the-cloud Site Redundancy ...Dot Com Perimeter in-the-cloud ...Internet Anonymization
  • 26. Cloud/SecCloud/Sec – Use Cases …Multi-Site Organization ...Headquarters ...Branch Office ...Home ...Hotel
  • 27. Cloud/SecCloud/Sec – Use Cases ...Complete in-the-cloud Computing
  • 28. Cloud/SecCloud/Sec – Use Cases ...Dot Com Perimeter in-the-cloud
  • 29. Cloud/SecCloud/Sec – Use Cases ...In-the-cloud Site Redundancy
  • 30. Cloud/SecCloud/Sec – Use Cases ...Internet Anonymization Cloud/SecCloud/Sec – Use Cases ...Internet Anonymization
  • 32. Cloud/SecCloud/Sec Thank YouThank You Any Questions? Want to see a demo? Please see us at booth 713.