SlideShare a Scribd company logo
1 of 17
Download to read offline
Moving from a Data Center to a
Hybrid IT Environment Securely
Jeff Green
SVP Product & Customer Service
Agenda
•  The Hybrid IT Challenge
•  The new security stack
•  10 Strategies for securing Hybrid IT
IT is Transforming
IDG Research Services Gartner Gartner
BYOD is here for 85% Cloud is an option for 55% IOT is coming for 40%
Endpoints Shadow IT & Cloud Services
Auth-n, Compliance & Control Nightmare
PS Connect Secure
Pulse Client
Datacenter Cloud
Data Center & Cloud Secure Access
Comparison
Access Policy
Endpoint Compliance
Access Visibility
Device trust
Device
iOS
Android
Win.
Mac
Chrome
NAC
VPN
Management
Secure
Sign-on
Contextual
Access
Policies
Cloud
Access
Identity and Access Management
Brillo
Free
RTOS
End-Point Mobile Management
The New Hybrid IT Security Stack
v
vNetwork
10 Strategies to Securing HYBRID IT
8
Understand cloud services in your organization
Understand access patterns
1 Use tools and technology to understand how Cloud apps/
technologies are being used in your company
Understand devices connecting to your apps
Strategy 1 – Visibility
9
Policy, Compliance,
Access Control
2 Use your VPN technology to secure the data center
3 Use your secure access technology (VPN) to secure cloud services
PS Connect Secure
Pulse Client
Strategy 2 & 3 – Secure Data in Motion
Datacenter
Use VPN/IDP gateway to hairpin
access, compliance and identity
•  Restricted IP
•  Internal IDP and DNS
10
Public Cloud
Policy and Compliance
Datacenter
Private Cloud
Pulse Data Membrane™ Technology
Pulse One Management
Pulse Workspace
4
Use endpoint containerization to protect your data
Strategy 4 – Protect Your Mobile Data
PS Connect Secure
Access Policy & Compliance
is controlled whether through
VPN or Direct to cloud
11
•  Push a certificate using SCEP and Certificate Authority
•  Use the certificate as part of the authentication process
5
Use certification to create trusted devices
6
Assess the devices posture during access
Threat protection installed?
Device encrypted or container?
Is it a trusted device?
Any indication of compromise?
Is it correctly patched or vulnerable?
Is it unlocked?
Is it running risky apps?
Strategy 5 & 6 – Trust the Device
12
Access decision based on contextual information
to improve secure access
7
Use contextual information to control access decisions
Strategy 7 – Leverage Context
DeviceLocation
Data Network
13
Federation
Cloud and SaaS based services can be set up to use SAML and point at a Identity
Provider
SSO needs to move beyond the browser
Identity Federation plays many important roles in securing access.
Strategy 8 – Identity Federation
8
Use SAML/Oauth and IDP federation
Public Cloud Private CloudData Center
14
Trust Elevation
•  Use Step-up authentication for high value resources
Create group and role-based rules
•  Authentication chains for sensitive data access.
Use data from multiple places
•  Use identity attributes from multiple sources like
external identity repositories.
Create simplicity and great user experience
•  Biometrics are becoming common
•  Great user experience mean adoption
Strategy 9 – Modernize Your 2FA/MFA
9
Use more modern MFA solutions
+
Something
you know
Something
you have
+ +
Multifactor Authentication
Something
you know
Something
you have
Something
you are
Knowledge
questions
One time
password
Biometrics
15
Strategy 10 – Find the glue
10
Evaluated the vendor you are selecting. Find a vendor
or multiple vendor that can be the glue or be glued.
2FA/MFA
Authentication
Identity
Federation
Contextual
Access Control
Device
Compliance
Data Protection
Secure Data
Center Access
Secure Cloud
Access
Visibility
16
•  The perimeter is dissolving
•  Hybrid is here to stay – some companies will never be 100% cloud
or stay 100% data center
•  Identity with a trusted device becomes critically important
•  You can only secure what you can see so visibility is key
•  There are tools available to you today but search for the glue to
center your solution
It’s a Wrap!
Some final thoughts
Jeff Green
SVP Products and Customer Service
jeffg@pulsesecure.net
Questions?

More Related Content

What's hot

ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherMartin Thompson
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...Nur Shiqim Chok
 
ePlus Managed Services
ePlus Managed ServicesePlus Managed Services
ePlus Managed ServicesePlus
 
Veritas Professional Services Presentation
Veritas Professional Services PresentationVeritas Professional Services Presentation
Veritas Professional Services PresentationIdeba
 
Moving the Guidewire platform to OSGi - Paul D'Albora
Moving the Guidewire platform to OSGi - Paul D'AlboraMoving the Guidewire platform to OSGi - Paul D'Albora
Moving the Guidewire platform to OSGi - Paul D'Alboramfrancis
 
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Canada
 
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...eFolder
 
Analytics Everywhere Workshop
Analytics Everywhere WorkshopAnalytics Everywhere Workshop
Analytics Everywhere WorkshopTrustmarque
 
AWS re:Invent 2017 | CloudHealth Tech Session
AWS re:Invent 2017 |  CloudHealth Tech SessionAWS re:Invent 2017 |  CloudHealth Tech Session
AWS re:Invent 2017 | CloudHealth Tech SessionCloudHealth by VMware
 
ePlus Government Leasing
ePlus Government LeasingePlus Government Leasing
ePlus Government LeasingePlus
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks
 
ePlus Staffing Solutions
ePlus Staffing SolutionsePlus Staffing Solutions
ePlus Staffing SolutionsePlus
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged InfrastructureePlus
 
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...LaRel Rogers
 
Cloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | NetfastCloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | Netfastmalosp
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
 
What is Zenoss as a Service?
What is Zenoss as a Service? What is Zenoss as a Service?
What is Zenoss as a Service? Zenoss
 

What's hot (20)

ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen HagenlocherITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
ITAM UK 2017_Implementing a global award winning SAM program_Jochen Hagenlocher
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
 
ePlus Managed Services
ePlus Managed ServicesePlus Managed Services
ePlus Managed Services
 
Veritas Professional Services Presentation
Veritas Professional Services PresentationVeritas Professional Services Presentation
Veritas Professional Services Presentation
 
Moving the Guidewire platform to OSGi - Paul D'Albora
Moving the Guidewire platform to OSGi - Paul D'AlboraMoving the Guidewire platform to OSGi - Paul D'Albora
Moving the Guidewire platform to OSGi - Paul D'Albora
 
Cisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Powered: Your Trusted Source for Cloud and Managed Services
Cisco Powered: Your Trusted Source for Cloud and Managed Services
 
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...
eFolder Partner Chat Webinar — Happy Together: Integrating Managed File Sync ...
 
Analytics Everywhere Workshop
Analytics Everywhere WorkshopAnalytics Everywhere Workshop
Analytics Everywhere Workshop
 
AWS re:Invent 2017 | CloudHealth Tech Session
AWS re:Invent 2017 |  CloudHealth Tech SessionAWS re:Invent 2017 |  CloudHealth Tech Session
AWS re:Invent 2017 | CloudHealth Tech Session
 
ePlus Government Leasing
ePlus Government LeasingePlus Government Leasing
ePlus Government Leasing
 
Moogilu StartupKit
Moogilu StartupKitMoogilu StartupKit
Moogilu StartupKit
 
Extreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics SolutionExtreme Networks Retail Guest Analytics Solution
Extreme Networks Retail Guest Analytics Solution
 
ePlus Staffing Solutions
ePlus Staffing SolutionsePlus Staffing Solutions
ePlus Staffing Solutions
 
Managed Converged Infrastructure
Managed Converged InfrastructureManaged Converged Infrastructure
Managed Converged Infrastructure
 
Extreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking StrategyExtreme Networks and Avaya IP Networking Strategy
Extreme Networks and Avaya IP Networking Strategy
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Cloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | NetfastCloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | Netfast
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
 
What is Zenoss as a Service?
What is Zenoss as a Service? What is Zenoss as a Service?
What is Zenoss as a Service?
 

Similar to Moving from a Data Center to a Hybrid IT Environment Securely

Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfSymptai Consulting Limited
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataCloudera, Inc.
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityJeff Green
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudDataStax
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 

Similar to Moving from a Data Center to a Hybrid IT Environment Securely (20)

Migrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdfMigrating to the Cloud - From Preparation to Operation copy.pdf
Migrating to the Cloud - From Preparation to Operation copy.pdf
 
Seeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the DataSeeking Cybersecurity--Strategies to Protect the Data
Seeking Cybersecurity--Strategies to Protect the Data
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
Implementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile IdentityImplementing Secure Access & Mobile Identity
Implementing Secure Access & Mobile Identity
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
briefing
briefingbriefing
briefing
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid CloudHow to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
How to Power Innovation with Geo-Distributed Data Management in Hybrid Cloud
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Moving from a Data Center to a Hybrid IT Environment Securely

  • 1. Moving from a Data Center to a Hybrid IT Environment Securely Jeff Green SVP Product & Customer Service
  • 2. Agenda •  The Hybrid IT Challenge •  The new security stack •  10 Strategies for securing Hybrid IT
  • 3. IT is Transforming IDG Research Services Gartner Gartner BYOD is here for 85% Cloud is an option for 55% IOT is coming for 40%
  • 4. Endpoints Shadow IT & Cloud Services Auth-n, Compliance & Control Nightmare
  • 5. PS Connect Secure Pulse Client Datacenter Cloud Data Center & Cloud Secure Access Comparison Access Policy Endpoint Compliance Access Visibility Device trust
  • 6. Device iOS Android Win. Mac Chrome NAC VPN Management Secure Sign-on Contextual Access Policies Cloud Access Identity and Access Management Brillo Free RTOS End-Point Mobile Management The New Hybrid IT Security Stack v vNetwork
  • 7. 10 Strategies to Securing HYBRID IT
  • 8. 8 Understand cloud services in your organization Understand access patterns 1 Use tools and technology to understand how Cloud apps/ technologies are being used in your company Understand devices connecting to your apps Strategy 1 – Visibility
  • 9. 9 Policy, Compliance, Access Control 2 Use your VPN technology to secure the data center 3 Use your secure access technology (VPN) to secure cloud services PS Connect Secure Pulse Client Strategy 2 & 3 – Secure Data in Motion Datacenter Use VPN/IDP gateway to hairpin access, compliance and identity •  Restricted IP •  Internal IDP and DNS
  • 10. 10 Public Cloud Policy and Compliance Datacenter Private Cloud Pulse Data Membrane™ Technology Pulse One Management Pulse Workspace 4 Use endpoint containerization to protect your data Strategy 4 – Protect Your Mobile Data PS Connect Secure Access Policy & Compliance is controlled whether through VPN or Direct to cloud
  • 11. 11 •  Push a certificate using SCEP and Certificate Authority •  Use the certificate as part of the authentication process 5 Use certification to create trusted devices 6 Assess the devices posture during access Threat protection installed? Device encrypted or container? Is it a trusted device? Any indication of compromise? Is it correctly patched or vulnerable? Is it unlocked? Is it running risky apps? Strategy 5 & 6 – Trust the Device
  • 12. 12 Access decision based on contextual information to improve secure access 7 Use contextual information to control access decisions Strategy 7 – Leverage Context DeviceLocation Data Network
  • 13. 13 Federation Cloud and SaaS based services can be set up to use SAML and point at a Identity Provider SSO needs to move beyond the browser Identity Federation plays many important roles in securing access. Strategy 8 – Identity Federation 8 Use SAML/Oauth and IDP federation Public Cloud Private CloudData Center
  • 14. 14 Trust Elevation •  Use Step-up authentication for high value resources Create group and role-based rules •  Authentication chains for sensitive data access. Use data from multiple places •  Use identity attributes from multiple sources like external identity repositories. Create simplicity and great user experience •  Biometrics are becoming common •  Great user experience mean adoption Strategy 9 – Modernize Your 2FA/MFA 9 Use more modern MFA solutions + Something you know Something you have + + Multifactor Authentication Something you know Something you have Something you are Knowledge questions One time password Biometrics
  • 15. 15 Strategy 10 – Find the glue 10 Evaluated the vendor you are selecting. Find a vendor or multiple vendor that can be the glue or be glued. 2FA/MFA Authentication Identity Federation Contextual Access Control Device Compliance Data Protection Secure Data Center Access Secure Cloud Access Visibility
  • 16. 16 •  The perimeter is dissolving •  Hybrid is here to stay – some companies will never be 100% cloud or stay 100% data center •  Identity with a trusted device becomes critically important •  You can only secure what you can see so visibility is key •  There are tools available to you today but search for the glue to center your solution It’s a Wrap! Some final thoughts
  • 17. Jeff Green SVP Products and Customer Service jeffg@pulsesecure.net Questions?