The Secure Digital Perimeter
Business Continuity and app Security
Implement a defense-in-depth
Vanessa Vilchez
Gerencia Comercial de Perú & Ecuador
SDP story security
Our
Point of
View
3 © 2017 Citrix | Confidential
The journey
The workspace has
expanded outside
the desktop, and
outside the
corporate firewall
Traditional ...
• Known apps & networks
• IT managed environments
• Secure corp. perimeter
... Today
•Many SaaS & cloud apps
•Un-sanctioned cloud storage
•Remote & mobile users
4 © 2017 Citrix | Confidential
IT and
Networking
professionals
traditional/
custom apps
Main Office
Branch
Remote
Users
On-premises access
SaaS, hybrid & multi-cloud access
Work is distributed
5 © 2017 Citrix
CASB
ADC
SD-WAN
VCC
App-Ops
EMM
MAM
Many point-solutions to protect apps, data, network …
Adds
IT complexity
MDM
UEBA
UEM
SD-WAN aaS
WAN-OP
ADCaaS
GSLB
SSL
LB
VDI
SIEM
NTA
IPS
NGFW
DLP
WAF SWG
VPN
SSO
IAM
DNS
DDoS Gateway
WAFaaS
6 © 2017 Citrix | Confidential
83% of businesses believe the
complexity of their organizational
structures and IT infrastructure is
putting their companies at even
greater risk for security breaches.
The Need for a New IT Security Architecture;
Citrix and Ponemon Institute; Jan 2017
7 © 2017 Citrix
Cyber-security is a huge business concern
Attackers with increased
motivation driven by
monetary value of an
attack
88% of execs say they
are unable to hire & retain
sufficient talent to shore
up the security
architecture and expertise
The attack surface is vast
and lot more vulnerable
for traditional security
approaches
8 © 2017 Citrix | Confidential
Three quarters of enterprises
agree the need for a new
security framework to
address the threat of cyber-
security.
The Need for a New IT Security Architecture;
Citrix and Ponemon Institute; Jan 2017
 Cloud & app sprawl
 Distributed work-styles
 Un-sanctioned storage
 BYO and # of devices
 IT complexity
 Motivated hackers
 Vast attack surfaces
 Malicious behaviors
9 © 2017 Citrix
Where to apply the policy? What to apply the policy on? (digital workspace)
Traditional
Attack-centric (unknown entities) User identity based (known users)
Force user to where security exists Follow the user wherever they are
Zone-based (trusted DMZ, intranet) Context-based user interactions with apps, data, n/w
Doors and locks System of detectors
A new differentiated approach to security
People-
centric
10 © 2017 Citrix
Business continuity
and application
security
Implement a defense-in-depth (availability and
security) for apps in the datacenter and cloud
Actively monitor the app infrastructure for
external or internal attacks
Use Case
11 © 2017 Citrix
• Perimeters used to be easy to define and police
• Physical buildings
• Desktop machines
• Firewall protecting resources
–Servers delivering resources
–Data inside the firewall
What is Citrix talking about with this Secure perimeter
Why are we discussing it?
12 © 2017 Citrix
Security & Performance Analytics
Unified
Experience
“BYO”
Identity
Single
Sign-on
Contextual
Access
Contextual
Performance
Unified
Endpoint Mgmt.
App Ops
Content Control
IT/NetworkingUsers
Secure Digital Perimeter
Security for the digital workspace
Legacy/
Custom
Apps
Evolve from attack-
centric to dynamic
people-centric
perimeter security
Why
SDP?
security
© 2018 Citrix | Summit 2018 | Confidential – Content in this presentation is under NDA
With application sprawl, the network is critical to
securely delivering apps, content and workspaces.
The SDP approach significantly
expands Networking offerings in
a SaaS, hybrid, multi-cloud and multi-
device world
… enabling simplified control, 3600 visibility
and intelligent analytics
Why is SDP important?
15 © 2017 Citrix
• It is Citrix’s approach to securing
the workspace
• Leverages existing Citrix portfolio
and investments
• Available as cloud-based
network and security services
SDP
Not a product sku
17 © 2017 Citrix
Intelligent
analytics
360
visibility
Simplified
control
• On-demand people-centric
• Centralized policy control with
distributed enforcement
• Minimize/hide attack surfaces
• Easier IT & regulatory
compliance
• Aggregate logs and
transaction flows
• Full visibility across SaaS,
hybrid and multi-cloud
• Share threat intelligence
across services
• Detect and stop malicious
user-behaviors
• Trigger contextual actions
& policies
SDP – Trusted security
Attributes security
1. Contextual and secure access
2. Mobile and device security
3. User security and malware protection
4. Secure collaboration with content security and
intellectual property (IP) protection
5. Governance, risk and compliance
6. Business continuity and app security
7. User behavior analytics and proactive security insights
Citrix SDP provides …
Use CASES security
21 © 2017 Citrix
Business continuity
and application
security
Implement a defense-in-depth (availability and
security) for apps in the datacenter and cloud
Actively monitor the app infrastructure for
external or internal attacks
Use Cases
22 © 2017 Citrix
Contextual and
secure access
Implement identity and access management
(IAM) solution in federation with AD and
AzureAD (AAD)
Branch and remote users access applications in
datacenter, public Internet or cloud …
securely, from any device
Use Cases
23 © 2017 Citrix
Mobile and device
security
Customers looking to implement BYOD and
protect application data on mobile devices
Use Case
24 © 2017 Citrix
User security and
malware protection
Secure the end-points and application
infrastructure from malware threats and
ransomware attacks
Use Case
25 © 2017 Citrix
Secure collaboration
with data security and
intellectual property (IP)
protection
Protect confidential information and intellectual
property
Secure collaboration and file sharing
Use Information Rights Management (IRM)
Use Cases
26 © 2017 Citrix
Governance,
risk and
compliance
Reduce business risks by:
- implementing compliance standards
- adopting industry regulations and
- adhering to internal policy governance
Use Cases
27 © 2017 Citrix
User behavior analytics
and proactive security
insights
Detect anomalous user behaviors … and threats
Detect malware and phishing sites visited by users
Secure XA/XD sites by discovering and applying
the latest fixes and updates
Use Cases
29 © 2017 Citrix

Business Continuity and app Security

  • 1.
    The Secure DigitalPerimeter Business Continuity and app Security Implement a defense-in-depth Vanessa Vilchez Gerencia Comercial de Perú & Ecuador
  • 2.
  • 3.
    3 © 2017Citrix | Confidential The journey The workspace has expanded outside the desktop, and outside the corporate firewall Traditional ... • Known apps & networks • IT managed environments • Secure corp. perimeter ... Today •Many SaaS & cloud apps •Un-sanctioned cloud storage •Remote & mobile users
  • 4.
    4 © 2017Citrix | Confidential IT and Networking professionals traditional/ custom apps Main Office Branch Remote Users On-premises access SaaS, hybrid & multi-cloud access Work is distributed
  • 5.
    5 © 2017Citrix CASB ADC SD-WAN VCC App-Ops EMM MAM Many point-solutions to protect apps, data, network … Adds IT complexity MDM UEBA UEM SD-WAN aaS WAN-OP ADCaaS GSLB SSL LB VDI SIEM NTA IPS NGFW DLP WAF SWG VPN SSO IAM DNS DDoS Gateway WAFaaS
  • 6.
    6 © 2017Citrix | Confidential 83% of businesses believe the complexity of their organizational structures and IT infrastructure is putting their companies at even greater risk for security breaches. The Need for a New IT Security Architecture; Citrix and Ponemon Institute; Jan 2017
  • 7.
    7 © 2017Citrix Cyber-security is a huge business concern Attackers with increased motivation driven by monetary value of an attack 88% of execs say they are unable to hire & retain sufficient talent to shore up the security architecture and expertise The attack surface is vast and lot more vulnerable for traditional security approaches
  • 8.
    8 © 2017Citrix | Confidential Three quarters of enterprises agree the need for a new security framework to address the threat of cyber- security. The Need for a New IT Security Architecture; Citrix and Ponemon Institute; Jan 2017  Cloud & app sprawl  Distributed work-styles  Un-sanctioned storage  BYO and # of devices  IT complexity  Motivated hackers  Vast attack surfaces  Malicious behaviors
  • 9.
    9 © 2017Citrix Where to apply the policy? What to apply the policy on? (digital workspace) Traditional Attack-centric (unknown entities) User identity based (known users) Force user to where security exists Follow the user wherever they are Zone-based (trusted DMZ, intranet) Context-based user interactions with apps, data, n/w Doors and locks System of detectors A new differentiated approach to security People- centric
  • 10.
    10 © 2017Citrix Business continuity and application security Implement a defense-in-depth (availability and security) for apps in the datacenter and cloud Actively monitor the app infrastructure for external or internal attacks Use Case
  • 11.
    11 © 2017Citrix • Perimeters used to be easy to define and police • Physical buildings • Desktop machines • Firewall protecting resources –Servers delivering resources –Data inside the firewall What is Citrix talking about with this Secure perimeter Why are we discussing it?
  • 12.
    12 © 2017Citrix Security & Performance Analytics Unified Experience “BYO” Identity Single Sign-on Contextual Access Contextual Performance Unified Endpoint Mgmt. App Ops Content Control IT/NetworkingUsers Secure Digital Perimeter Security for the digital workspace Legacy/ Custom Apps Evolve from attack- centric to dynamic people-centric perimeter security
  • 13.
  • 14.
    © 2018 Citrix| Summit 2018 | Confidential – Content in this presentation is under NDA With application sprawl, the network is critical to securely delivering apps, content and workspaces. The SDP approach significantly expands Networking offerings in a SaaS, hybrid, multi-cloud and multi- device world … enabling simplified control, 3600 visibility and intelligent analytics Why is SDP important?
  • 15.
    15 © 2017Citrix • It is Citrix’s approach to securing the workspace • Leverages existing Citrix portfolio and investments • Available as cloud-based network and security services SDP Not a product sku
  • 16.
    17 © 2017Citrix Intelligent analytics 360 visibility Simplified control • On-demand people-centric • Centralized policy control with distributed enforcement • Minimize/hide attack surfaces • Easier IT & regulatory compliance • Aggregate logs and transaction flows • Full visibility across SaaS, hybrid and multi-cloud • Share threat intelligence across services • Detect and stop malicious user-behaviors • Trigger contextual actions & policies SDP – Trusted security
  • 17.
  • 18.
    1. Contextual andsecure access 2. Mobile and device security 3. User security and malware protection 4. Secure collaboration with content security and intellectual property (IP) protection 5. Governance, risk and compliance 6. Business continuity and app security 7. User behavior analytics and proactive security insights Citrix SDP provides …
  • 19.
  • 20.
    21 © 2017Citrix Business continuity and application security Implement a defense-in-depth (availability and security) for apps in the datacenter and cloud Actively monitor the app infrastructure for external or internal attacks Use Cases
  • 21.
    22 © 2017Citrix Contextual and secure access Implement identity and access management (IAM) solution in federation with AD and AzureAD (AAD) Branch and remote users access applications in datacenter, public Internet or cloud … securely, from any device Use Cases
  • 22.
    23 © 2017Citrix Mobile and device security Customers looking to implement BYOD and protect application data on mobile devices Use Case
  • 23.
    24 © 2017Citrix User security and malware protection Secure the end-points and application infrastructure from malware threats and ransomware attacks Use Case
  • 24.
    25 © 2017Citrix Secure collaboration with data security and intellectual property (IP) protection Protect confidential information and intellectual property Secure collaboration and file sharing Use Information Rights Management (IRM) Use Cases
  • 25.
    26 © 2017Citrix Governance, risk and compliance Reduce business risks by: - implementing compliance standards - adopting industry regulations and - adhering to internal policy governance Use Cases
  • 26.
    27 © 2017Citrix User behavior analytics and proactive security insights Detect anomalous user behaviors … and threats Detect malware and phishing sites visited by users Secure XA/XD sites by discovering and applying the latest fixes and updates Use Cases
  • 27.
    29 © 2017Citrix

Editor's Notes

  • #2 So, what are we going to talk about today. First, we are going to go through the new approach to security that encompass the new secure digital perimeter.
  • #3 Now, let’s dive into the SDP story.
  • #5 Work is now distributed. Users are working from anywhere. Branch offices, remote locations like home, hotel, or anywhere, not only the corporate offices. They are using applications from on premises, SaaS, or other web or cloud accesses but still need to reach their traditional applications and services within the data center. Now IT and Network professionals need to think in a differently.
  • #6 And the point solutions available to deliver apps and content securely and reliably only add to this complexity.
  • #7  4.268  La TI y los profesionales de seguridad de TI encuestados en 14países
  • #8 Attackers have an increased motivation driven by financial / monetary value of an attack Enterprises are targeted by state-sponsored attackers. Average time to discover a breach is around 200 days SMB and consumers are targeted by ransomware There is a shortage of security experts/skills More than 1 million unfilled security jobs 70% of companies plan to increase the size of they cybersecurity teams by 15% or more Compliance checklist is not considered sufficient anymore “Surface Area” is becoming too vast for traditional security approaches to remain effective When everything is connected, security is everything New ways of working (multiple user locations/devices) and new locations where data is stored (cloud, SaaS etc.) With complexity being the biggest enemy of security, a completely new approach is required…
  • #9 Three quarters of enterprises agree that a new security framework is needed to address the cyber threats of today. Things like app and cloud sprawl, BYO devices, IT complexity, and the addition new attack vectors.
  • #10 We start with the ‘what’ – the Digital Workspace – and use it’s constructs to define what should happen within it. This defines ‘where’ to apply policy, and not just some arbitrary points within the infrastructure Rather than focus on conventional ‘threat’ centric perimeter protection, focus on ‘user’ centric controls to prevent malicious behavior – threats are unknowns, focus on what you know, the user Rather than ‘force the user’ into discrete points where Security Policy can be applied, have the Security Policy ‘follow the user’, wherever they are – in the world of Cloud the user can be everywhere We used to focus on ‘zones’ (trusted zone, DMZ, Intranet zone etc.). A user-centric approach focusses on what we know– using ‘context’ we know the user – and their real-time interactions, with the network, apps and data Rather than rely on a vast number of doors and ‘locks’ that attackers will probably breakthrough anyway, build a system of ‘detectors’ that an attacker must evade – if one gets flagged it’s game over for the attacker
  • #13 Complexity is really hard to tame but it's also where Citrix can help. Really helping organizations deal with the complexity and pull it together, in a way that creates this new software-defined perimeter and also enables the easy access for people wherever they are around the world, whatever device they come in, to give them contextual access to the apps, information and resources they need. Whether it's a cloud technology coming from one of many clouds, or whether it's traditional on-prem technology, or whether it's mobile technology, they need to access it all in a simple, contextual way, and that is precisely what we do. On one side, IT needs to manage all of those devices and control the policies for access. You need to manage all of the apps, and need to modernize them. We know that app modernization is one of the biggest hurdles that IT organizations face. You also need to have full visibility, and that is the way to turn your company into an intelligent organization. For the end user, for people at work, the most important thing is the unified experience enabling them to access their workspaces. It needs to be familiar and fluid. From the moment they get into the workspace, they need to feel like they have access to everything that they need.
  • #18 recording and aggregating logs and transaction flows between user, apps, devices, content and network
  • #20 .