Cloud Access Security Brokers
CASB
Feb’18
WHAT IS CASB?
2
WHAT IS DRIVING THE NEED?
3
Enterprise productivity apps are gaining momentum and the proclivity of business
users to acquire such apps is growing too
There are more than 20,000 apps out there and the numbers are growing
Forbes says
 Hybrid cloud adoption grew 3X in 2017 – 57% from 19%
 80% of all IT budgets will be committed to cloud in next
15 months
 73% of orgs are planning a move to fully software-
defined DCs within 2 years
 49% of businesses are delaying cloud deployment due to
lack of cybersecurity skills
 23% lack confidence to move their data to cloud
Loss of reputation, business disruption
HOW IT WORKS?
5
On Prem
On Prem
On Prem
Existing Model CASB Model
GARTNER CASB PILLARS
6
• Threat intelligence
• UBA
• EBA
• Anomaly/ Malware
alert
• Encryption
• Tokenization
• DLP
• HIPPA
• PCI
• SOx
• Users
• Devices
• Applications
• Data
• Actions
Visibility Compliance
Threat
Protection
Data
Security
CASB
• PROVIDES VISIBILITY TO STEALTH IT, THOUGH CLOSELY TRACKS ACTIVITIES IN CLOUD ENVIRONMENT
• EXTENDED COVERAGE FOR COMMUNICATIONS HAPPENING BETWEEN CLOUD APPLICATIONS AND ON PREM ESTATE
• PROVIDES INCIDENT ALERTS AND PREVENTS ANOMALIES(QUARANTINE ETC)
• ACTS AS A SPOE, HENCE FUNNELS TRAFFIC FOR EFFECTIVE MONITORING AND INSPECTION
• ASSURES DLP, COMPLIANCE, SECURITY CONTROL PROVISIONING AND ACTIONABLE THREAT INTELLIGENCE SHARING IN CLOUD ENVIRONMENT
• RESEARCH IS UNDERWAY TO INTEGRATE SUPERVISED/ UNSUPERVISED MACHINE LEARNING TO PROVIDE ADVANCE THREAT DETECTION AND RISK
MITIGATION
7
HOW DOES CASB WORK?
8
>> CASB is
connected to cloud
service API
>> Monitors usage
irrespective of how
and where the cloud
services are
accessed
>> Covers tracking
of the usage out of
org network on
unmanaged devices
API Model
>> CASB is
deployed On Prem
or on Cloud
>> Users are
installed with self-
signed certificates
>> Intrusive
deployment as the
user traffic is routed
through CASB
Forward
Proxy
>> Most common
method for
deploying CASB
>> Replaces IAM
service for
authentication
>> Easier way to
implement for cloud
end users
Reverse Proxy
COVERAGE
9
WHAT IS IN IT FOR US?
10
Managing cloud apps
Preventing Data Exfiltration
Access Control
Unmanaged apps Managed apps
Policy Management
Threat Intelligence
GARTNER’S MAGIC QUADRANT FOR CASBS
THANK YOU!
12
Content courtesy: NetSkope, SkyHigh and Google Sources

Cloud Access Security Brokers

  • 1.
    Cloud Access SecurityBrokers CASB Feb’18
  • 2.
  • 3.
    WHAT IS DRIVINGTHE NEED? 3 Enterprise productivity apps are gaining momentum and the proclivity of business users to acquire such apps is growing too There are more than 20,000 apps out there and the numbers are growing
  • 4.
    Forbes says  Hybridcloud adoption grew 3X in 2017 – 57% from 19%  80% of all IT budgets will be committed to cloud in next 15 months  73% of orgs are planning a move to fully software- defined DCs within 2 years  49% of businesses are delaying cloud deployment due to lack of cybersecurity skills  23% lack confidence to move their data to cloud Loss of reputation, business disruption
  • 5.
    HOW IT WORKS? 5 OnPrem On Prem On Prem Existing Model CASB Model
  • 6.
    GARTNER CASB PILLARS 6 •Threat intelligence • UBA • EBA • Anomaly/ Malware alert • Encryption • Tokenization • DLP • HIPPA • PCI • SOx • Users • Devices • Applications • Data • Actions Visibility Compliance Threat Protection Data Security
  • 7.
    CASB • PROVIDES VISIBILITYTO STEALTH IT, THOUGH CLOSELY TRACKS ACTIVITIES IN CLOUD ENVIRONMENT • EXTENDED COVERAGE FOR COMMUNICATIONS HAPPENING BETWEEN CLOUD APPLICATIONS AND ON PREM ESTATE • PROVIDES INCIDENT ALERTS AND PREVENTS ANOMALIES(QUARANTINE ETC) • ACTS AS A SPOE, HENCE FUNNELS TRAFFIC FOR EFFECTIVE MONITORING AND INSPECTION • ASSURES DLP, COMPLIANCE, SECURITY CONTROL PROVISIONING AND ACTIONABLE THREAT INTELLIGENCE SHARING IN CLOUD ENVIRONMENT • RESEARCH IS UNDERWAY TO INTEGRATE SUPERVISED/ UNSUPERVISED MACHINE LEARNING TO PROVIDE ADVANCE THREAT DETECTION AND RISK MITIGATION 7
  • 8.
    HOW DOES CASBWORK? 8 >> CASB is connected to cloud service API >> Monitors usage irrespective of how and where the cloud services are accessed >> Covers tracking of the usage out of org network on unmanaged devices API Model >> CASB is deployed On Prem or on Cloud >> Users are installed with self- signed certificates >> Intrusive deployment as the user traffic is routed through CASB Forward Proxy >> Most common method for deploying CASB >> Replaces IAM service for authentication >> Easier way to implement for cloud end users Reverse Proxy
  • 9.
  • 10.
    WHAT IS INIT FOR US? 10 Managing cloud apps Preventing Data Exfiltration Access Control Unmanaged apps Managed apps Policy Management Threat Intelligence
  • 11.
  • 12.
    THANK YOU! 12 Content courtesy:NetSkope, SkyHigh and Google Sources