SlideShare a Scribd company logo
AppGate:
Achieving Compliance in the Cloud
Challenges to Achieving Compliance in the Cloud
Compliance uncertainty is barrier in moving workloads to the cloud
Audit Requirements
Prove the level of access
that each user has and how
those levels are maintained
Evidence collection in a
dynamic environment
Demonstrate the
effectiveness of controls
Regulatory Requirements
Ensuring proper controls
are in place over system
and data access
Separation of duties by
function
Data encryption and
protection
2
SOX
CFPB
NIST 800.53
FedRAMP
NY DFS CyberSecurity
ITAR
PCI DSS
Compliance
GDPR
Privacy Shield
Reduce Scope
HIPAA
FCRA
GLBA
FISMA
Privacy
Individualized perimeter for each user
What Does AppGate Look Like?
3
Fine-grained authorization for on-premises and cloud
What Does AppGate Look Like?
4
Dynamically adjusts to new cloud server instances
What Does AppGate Look Like?
5
Consistent access policies across heterogeneous
environments
What Does AppGate Look Like?
Contextual awareness drives access and
authentication
What Does AppGate Look Like?
7
What is AppGate?
Network security software that dynamically
creates 1:1 network connections
between users and the data they access
8
AppGate Architecture
Controller
Authentication and
token-issuing service
Distributed
Architecture
with 3 Functions
Gateway
Distributed, dynamic
access control
LogServer
Provides secure
logging services
9
Virtual
Network
Adapter
Secure, Encrypted Tunnel
Case Study: Secure, Compliant Cloud Migration
Challenges
• A financial services regulatory agency needed to migrate workloads
to the AWS
• Granular control of users and environment – per user and per
instance dynamic deployments
• Strict controls of admin and DevOps access (separation of duties)
• Heavy compliance and reporting requirements
Solutions
• AppGate provides granular access control, and a migration path that
allows specific users and specific devices
• AppGate provides a complete audit trail and logging of all
user/device/system events
• Logs can be passed to enterprise SIEM system
• Automatically adjusts admin user access based on DevOps changes
10
Case Study: User Access Control to Cloud
Challenges
• Brainspace needed a comprehensive solution to secure access to
the cloud that delivers their SaaS solution
• Stringent audit requirements were under a tight timeline
• Required encrypting all traffic, multi-factor authentication, client
side validation and comprehensive logging
Results with AppGate
• Provided secure access control, work station auditing and policy
controls
• Enforced security policies across employee, vendor and customer
groups whether resources are on-premises or in the cloud
• Easy-to-implement and manage, user-friendly application
• Allows more flexibility around bring your own device
AppGate instantly secured our
environment, without adding
any complexity to it.
“
11
Case Study: Reducing PCI Scope and Effort
Challenges
• SageNet secures, manages and audits a multi-tenant, colocation
data center
• SageNet is subject to subject to rigorous PCI compliance
• Enabling detailed logging of user access and activities
• Leveraging role based context to determine network access
• Using network segmentation to reduce the scope of PCI audits
Solutions
• AppGate time and effort required to collect PCI data by more than
50%
• Onboarding new customer cardholder data environments was
reduced by over 90%
• Created new security offering resulting in new revenue
12
AppGate dramatically reduced
our audit complexity, while
simultaneously opening a new
revenue channel for us.
“
Achieving Compliance in the Cloud
13
ROBUST
LOGGING
SCOPE
REDUCTION
USER-CENTRIC
RESOURCE CONTROL
• User must authenticate
to gain access to
protected resources
• The resource is not
visible or accessible to
users without the proper
credentials
• Reduce the scope of
audits
• Immaterial resources are
no longer part of the
audit
• Meets the logging and
auditing requirements for
compliance frameworks
• Logs can be managed by
third-party log
management/SIEMs
Learn More About
AppGate

More Related Content

What's hot

Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
AddWeb Solution Pvt. Ltd.
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Government Technology & Services Coalition
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
Zscaler
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
Cyxtera Technologies
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
Priyanka Aash
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
Robb Boyd
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
Minded Security
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
DevOps.com
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
Himani Singh
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone Else
Ivan Dwyer
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
Samrat Das
 
Azure security basics
Azure security basicsAzure security basics
Azure security basics
Stas Lebedenko
 
From The Hidden Internet: Lesson From 12 Months Of Monitoring
From The Hidden Internet: Lesson From 12 Months Of MonitoringFrom The Hidden Internet: Lesson From 12 Months Of Monitoring
From The Hidden Internet: Lesson From 12 Months Of Monitoring
Priyanka Aash
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
Robb Boyd
 
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ....NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
NETFest
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
Karl Ots
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
Robb Boyd
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
Priyanka Aash
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Priyanka Aash
 

What's hot (20)

Zero trust Architecture
Zero trust Architecture Zero trust Architecture
Zero trust Architecture
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
BeyondCorp - Google Security for Everyone Else
BeyondCorp  - Google Security for Everyone ElseBeyondCorp  - Google Security for Everyone Else
BeyondCorp - Google Security for Everyone Else
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Azure security basics
Azure security basicsAzure security basics
Azure security basics
 
From The Hidden Internet: Lesson From 12 Months Of Monitoring
From The Hidden Internet: Lesson From 12 Months Of MonitoringFrom The Hidden Internet: Lesson From 12 Months Of Monitoring
From The Hidden Internet: Lesson From 12 Months Of Monitoring
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ....NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
.NET Fest 2019. Stas Lebedenko. Practical serverless use cases in Azure with ...
 
Azure security architecture
Azure security architectureAzure security architecture
Azure security architecture
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 

Viewers also liked

Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo GradoModelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Cliffor Jerry Herrera Castrillo
 
March 2017 Corporate Presentation
March 2017 Corporate PresentationMarch 2017 Corporate Presentation
March 2017 Corporate Presentation
oncolyticsinc
 
Downtown Wilmington Growth and Development
Downtown Wilmington Growth and DevelopmentDowntown Wilmington Growth and Development
Downtown Wilmington Growth and Development
Alexis Milas
 
Media phots
Media photsMedia phots
Media phots
Nia Williams
 
Letters
LettersLetters
Reel History
Reel HistoryReel History
Reel History
JonStupples
 
Receta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientesReceta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientes
Asunción Alastrué Pinilla
 
Modelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo GradoModelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo Grado
Cliffor Jerry Herrera Castrillo
 
Наталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по ДиснеюНаталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по Диснею
ScrumTrek
 
Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees
Episcopal Migration Ministries
 
Adopting Kubernetes with Puppet
Adopting Kubernetes with PuppetAdopting Kubernetes with Puppet
Adopting Kubernetes with Puppet
Puppet
 
Presentation
PresentationPresentation
Presentation
deaa alkaabi
 
Menú especial
Menú especialMenú especial
Menú especial
durancasals
 
90 90-90
90 90-9090 90-90
90 90-90
NANCY SOMI
 
Benjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | ContractingBenjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Digital | Marketing | Social | Brand
 
"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη
magdalinikalatheri
 

Viewers also liked (16)

Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo GradoModelo de Examen de reparación de Ciencias Naturales Séptimo Grado
Modelo de Examen de reparación de Ciencias Naturales Séptimo Grado
 
March 2017 Corporate Presentation
March 2017 Corporate PresentationMarch 2017 Corporate Presentation
March 2017 Corporate Presentation
 
Downtown Wilmington Growth and Development
Downtown Wilmington Growth and DevelopmentDowntown Wilmington Growth and Development
Downtown Wilmington Growth and Development
 
Media phots
Media photsMedia phots
Media phots
 
Letters
LettersLetters
Letters
 
Reel History
Reel HistoryReel History
Reel History
 
Receta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientesReceta de albondigas y sus nutrientes
Receta de albondigas y sus nutrientes
 
Modelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo GradoModelo de Examen de reparación de Filosofía Undécimo Grado
Modelo de Examen de reparación de Filosofía Undécimo Grado
 
Наталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по ДиснеюНаталья Гульчевская. Ретроспектива по Диснею
Наталья Гульчевская. Ретроспектива по Диснею
 
Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees Love in Action: Episcopal Churches Welcome Refugees
Love in Action: Episcopal Churches Welcome Refugees
 
Adopting Kubernetes with Puppet
Adopting Kubernetes with PuppetAdopting Kubernetes with Puppet
Adopting Kubernetes with Puppet
 
Presentation
PresentationPresentation
Presentation
 
Menú especial
Menú especialMenú especial
Menú especial
 
90 90-90
90 90-9090 90-90
90 90-90
 
Benjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | ContractingBenjamin Wardell | Recruiters Campaign CV | Contracting
Benjamin Wardell | Recruiters Campaign CV | Contracting
 
"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη"Ελίτσα Μαυρομάτα" από την Έφη
"Ελίτσα Μαυρομάτα" από την Έφη
 

Similar to AppGate: Achieving Compliance in the Cloud

2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
Cristian Garcia G.
 
Enhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsEnhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices Applications
Akshay Mathur
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
allan sam
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
RightScale
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
apidays
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
Amazon Web Services
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
Priyanka Aash
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
Amazon Web Services
 
Data as a_service_1.1_anup
Data as a_service_1.1_anupData as a_service_1.1_anup
Data as a_service_1.1_anup
Anup kumar
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
kkhhusshi
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Pyingkodi Maran
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Mitchell Pronschinske
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
nerdic
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
Sectricity
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
 

Similar to AppGate: Achieving Compliance in the Cloud (20)

2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Enhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices ApplicationsEnhanced Security and Visibility for Microservices Applications
Enhanced Security and Visibility for Microservices Applications
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)SACON - Beyond corp (Arnab Chattopadhayay)
SACON - Beyond corp (Arnab Chattopadhayay)
 
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
How Retail Insights, LLC Used Alert Logic to Meet Compliance Mandates and Enh...
 
Data as a_service_1.1_anup
Data as a_service_1.1_anupData as a_service_1.1_anup
Data as a_service_1.1_anup
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 
Zero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptxZero trust model for cloud computing.pptx
Zero trust model for cloud computing.pptx
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
bringing transparency on networks
bringing transparency on networksbringing transparency on networks
bringing transparency on networks
 
Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)Bright talk mapping the right aut solution for you 2014 final (1)
Bright talk mapping the right aut solution for you 2014 final (1)
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 

Recently uploaded

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

AppGate: Achieving Compliance in the Cloud

  • 2. Challenges to Achieving Compliance in the Cloud Compliance uncertainty is barrier in moving workloads to the cloud Audit Requirements Prove the level of access that each user has and how those levels are maintained Evidence collection in a dynamic environment Demonstrate the effectiveness of controls Regulatory Requirements Ensuring proper controls are in place over system and data access Separation of duties by function Data encryption and protection 2 SOX CFPB NIST 800.53 FedRAMP NY DFS CyberSecurity ITAR PCI DSS Compliance GDPR Privacy Shield Reduce Scope HIPAA FCRA GLBA FISMA Privacy
  • 3. Individualized perimeter for each user What Does AppGate Look Like? 3
  • 4. Fine-grained authorization for on-premises and cloud What Does AppGate Look Like? 4
  • 5. Dynamically adjusts to new cloud server instances What Does AppGate Look Like? 5
  • 6. Consistent access policies across heterogeneous environments What Does AppGate Look Like?
  • 7. Contextual awareness drives access and authentication What Does AppGate Look Like? 7
  • 8. What is AppGate? Network security software that dynamically creates 1:1 network connections between users and the data they access 8
  • 9. AppGate Architecture Controller Authentication and token-issuing service Distributed Architecture with 3 Functions Gateway Distributed, dynamic access control LogServer Provides secure logging services 9 Virtual Network Adapter Secure, Encrypted Tunnel
  • 10. Case Study: Secure, Compliant Cloud Migration Challenges • A financial services regulatory agency needed to migrate workloads to the AWS • Granular control of users and environment – per user and per instance dynamic deployments • Strict controls of admin and DevOps access (separation of duties) • Heavy compliance and reporting requirements Solutions • AppGate provides granular access control, and a migration path that allows specific users and specific devices • AppGate provides a complete audit trail and logging of all user/device/system events • Logs can be passed to enterprise SIEM system • Automatically adjusts admin user access based on DevOps changes 10
  • 11. Case Study: User Access Control to Cloud Challenges • Brainspace needed a comprehensive solution to secure access to the cloud that delivers their SaaS solution • Stringent audit requirements were under a tight timeline • Required encrypting all traffic, multi-factor authentication, client side validation and comprehensive logging Results with AppGate • Provided secure access control, work station auditing and policy controls • Enforced security policies across employee, vendor and customer groups whether resources are on-premises or in the cloud • Easy-to-implement and manage, user-friendly application • Allows more flexibility around bring your own device AppGate instantly secured our environment, without adding any complexity to it. “ 11
  • 12. Case Study: Reducing PCI Scope and Effort Challenges • SageNet secures, manages and audits a multi-tenant, colocation data center • SageNet is subject to subject to rigorous PCI compliance • Enabling detailed logging of user access and activities • Leveraging role based context to determine network access • Using network segmentation to reduce the scope of PCI audits Solutions • AppGate time and effort required to collect PCI data by more than 50% • Onboarding new customer cardholder data environments was reduced by over 90% • Created new security offering resulting in new revenue 12 AppGate dramatically reduced our audit complexity, while simultaneously opening a new revenue channel for us. “
  • 13. Achieving Compliance in the Cloud 13 ROBUST LOGGING SCOPE REDUCTION USER-CENTRIC RESOURCE CONTROL • User must authenticate to gain access to protected resources • The resource is not visible or accessible to users without the proper credentials • Reduce the scope of audits • Immaterial resources are no longer part of the audit • Meets the logging and auditing requirements for compliance frameworks • Logs can be managed by third-party log management/SIEMs

Editor's Notes

  1. There are many competing standards and controls
  2. Site is Protected by Gateway Servers only accept incoming connections from Gateway Plaintext traffic for standard logging, monitoring tools
  3. Too much text