SlideShare a Scribd company logo
Enterprise Security Reloaded
Citrix update 2019
John Chambers | Executive
Chairman, Cisco System
“At least 40% of all
businesses will die in the
next 10 years… if they don’t
figure out how to change
their entire company to
accommodate new
technologies”
40
%
John Chambers | Executive
Chairman, Cisco System
“At least 40% of all
businesses will die in the
next 10 years… if they don’t
figure out how to change
their entire company to
accommodate new
technologies”
The world is
CHANGING
Companies must
TRANSFORM
On-Site Data On-Premise
+ ERP Apps
Company-Issued
Desktops
Office Workers Within Datacenter On-Premise
MOST COMPANIES ARE MID-TRANSFORMATION
MOST COMPANIES ARE MID-TRANSFORMATION
Cloud / Mobile Era
MOST COMPANIES ARE MID-TRANSFORMATION
Multiple Cloud
Storage Zones
SaaS and
Mobile Apps
PC’s, Laptops,
Tablets, Smartphones,
Connected Things
Work Anywhere, Contractors,
Multi-Generational
Workforce
Branch Operations, and
Hybrid-Multi Cloud
So is our way of
WORKING
On-premises /
Private cloud
On-premises /
Private cloud
Experience +
Productivity
Control +
Security
DUALITY
A NEW VISION ON THE
WORKPLACE
FOCUSED
on the USER &
CONTEXT
That MOVES BEYOND the
PERIMETER
Enterprise security reinvented : Beyond Corp / Zero trust
Source: https://www.beyondcorp.com/
“BeyondCorp is a Zero Trust security framework
modeled by Google that shifts access controls from
the perimeter to individual devices and users. The
end result allows employees to work securely from
any location without the need for a traditional VPN.
The guiding principles of beyond corp
a.k.a. zero trust, Conditional or contextual access
Perimeterless Design Context-Aware Dynamic Access Controls
Connecting from a particular network
must not determine
Which services you can access
Access to services is granted
based on what we know about
you and your device
All access to services must be
authenticated, authorized and
encrypted
In practice
Establish identity as the
control plane
Assume every resource is
on the open internet
Never trust – always verify
Layered approach
Core building blocks
UEM / EMM Identity federation Policy engine
CONDITIONS CONTROLS
Session Risk
Effective
policy
MACHINE
LEARNING
REAL TIME
EVALUATION
ENGINE
POLICIES
Employee & Partner
Users & Roles
Trusted &
Compliant Devices
Location
Client apps &
Auth Method
Allow/block
access
Limited
access
Require
MFA
Force password
reset
Terms of Use
Basic goals
CONDITIONAL
ACCESS
Keep user accounts safe based on location & risk
Keep data safe by only allowing managed devices
Meet compliancy requirements
Enable security without compromising experience
USERS
UNTRUSTED DEVICES TRUSTED DEVICES
ANY NETWORK
ENTRY POINT LAYER
DEVICE AUTH BYPASS
LAYER
DEVICE AUTH LAYER
USER AUTH BYPASS
LAYER
USER AUTH LAYER
ACCESS TERMINATION
LAYER
APPLICATION BACK-END LAYER
Theoretical architecture
USERS
UNTRUSTED DEVICES TRUSTED DEVICES
INTERNAL OR EXTERNAL NETWORK
FIREWALL / LOAD BALANCER / REVERSE PROXY
DEVICE AUTH BYPASS
LAYER
EMM / UEM
USER AUTH BYPASS
LAYER
SF AUTH / MF AUTH / BIOMETRICS
LEGACY APPS
(RDSH / VDI / App proxy)
MODERN APPS ( MODERN AUTH, CONTAINERIZED)
Theoretical architecture
USERS
UNTRUSTED DEVICES TRUSTED DEVICES
INTERNAL OR EXTERNAL NETWORK
CITRIX ADC / CITRIX SDWAN
CITRIX CEM CITRIX CEM
CITRIX CLOUDCITRIX CLOUD (INTELLIGENCE)
CITRIX APPS &
DESKTOPS
CITRIX CLOUD / CITRIX ADC
Product translation
Security
Citrix Analytics
28
Closed-loop, autonomous system to dynamically adjust security
Citrix Analytics
Security
User Behavior Security Analytics
• Prevent internal threats & data exfiltration attacks
• Track & model individual User behaviors across enterprise
• Identify & aggregate User Risky behaviors into Risk Profiles
Application Security Analytics
• Protect Applications from external attacks
• Track, access and rank applications based on risks
• Suggest mitigation steps to enhance security
Data Security Analytics
• Prevent internal threats & data exfiltration attacks
• Track ‘sensitive files’ via DLP engines
Security Analytics to establish Secure Digital Perimeter
Sophisticated attacks require
a sophisticated response
Machine Learning and Artificial
Intelligence
Engineered for hybrid architectures
Gain insights and prevention, not data
30
Security Analytics
Descriptive
What happened?
Diagnostic
How it happened?
Predictive
What will happen?
Prescriptive
What to do?
Excessive (sensitive)
file downloads
Stolen
credentials
Loss of
(sensitive) data
Quarantine
User
User Behavior Security
Analytics
The user threat
Survey: Most frequently used
security breach tactic: compromised
credentials and weak passwords.1
User Behavior Analytics
81%
of breaches -
compromised
credentials or weak
passwords
1. Verizon Data Breach Investigations Report (DBIR) 2017
▪ Detect & mitigate threats
from trusted internal users
with malicious intent
▪ Easily identify high risk users
with drill-down capabilities
on behavior
▪ Apply corrective actions
User Behavior Security Analytics
care.grow.passion.

More Related Content

What's hot

Watson IOT Platform
Watson IOT PlatformWatson IOT Platform
Watson IOT Platform
Brenda Barrioz, CPDS
 
Uni palermo 3 3-2016 cloud 2.0
Uni palermo 3 3-2016 cloud 2.0Uni palermo 3 3-2016 cloud 2.0
Uni palermo 3 3-2016 cloud 2.0
Michele Vecchione
 
OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??
Guy Vinograd ☁
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Mahbubul Alam
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Amazon Web Services
 
HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen.
Marketing Team
 
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Amazon Web Services
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
IISPEastMids
 
Enterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleEnterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu Oracle
MarketingArrowECS_CZ
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
Cisco Case Studies
 
Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016
Jason Lu
 
ADLINK “AIoT at the EDGE”
ADLINK “AIoT at the EDGE”ADLINK “AIoT at the EDGE”
ADLINK “AIoT at the EDGE”
Amazon Web Services
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
Marketing Team
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
Roberto Siagri
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
Cisco Case Studies
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Jon Stevens-Hall
 
Developing Applications with the IoT Button - DevDay Austin 2017
Developing Applications with the IoT Button - DevDay Austin 2017Developing Applications with the IoT Button - DevDay Austin 2017
Developing Applications with the IoT Button - DevDay Austin 2017Amazon Web Services
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
Amazon Web Services
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
Zscaler
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
Cygnet Infotech
 

What's hot (20)

Watson IOT Platform
Watson IOT PlatformWatson IOT Platform
Watson IOT Platform
 
Uni palermo 3 3-2016 cloud 2.0
Uni palermo 3 3-2016 cloud 2.0Uni palermo 3 3-2016 cloud 2.0
Uni palermo 3 3-2016 cloud 2.0
 
OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS CloudIndustrial IoT, Machine Learning, and Innovation in the AWS Cloud
Industrial IoT, Machine Learning, and Innovation in the AWS Cloud
 
HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen.
 
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
Migrate legacy applications to AWS at scale with no code changes (Sponsored b...
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Enterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu OracleEnterprise Cloud transformation z pohledu Oracle
Enterprise Cloud transformation z pohledu Oracle
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016Watson IoT Platform Sizing & Pricing - Sept 2016
Watson IoT Platform Sizing & Pricing - Sept 2016
 
ADLINK “AIoT at the EDGE”
ADLINK “AIoT at the EDGE”ADLINK “AIoT at the EDGE”
ADLINK “AIoT at the EDGE”
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
how to implement an IoT architecture
how to implement an IoT architecturehow to implement an IoT architecture
how to implement an IoT architecture
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
 
Developing Applications with the IoT Button - DevDay Austin 2017
Developing Applications with the IoT Button - DevDay Austin 2017Developing Applications with the IoT Button - DevDay Austin 2017
Developing Applications with the IoT Button - DevDay Austin 2017
 
Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機Intel IoT Edge Computing 在 AI 領域的應用與商機
Intel IoT Edge Computing 在 AI 領域的應用與商機
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 

Similar to Enterprise Security Reloaded

InterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote AddressInterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote Address
Biren Gandhi
 
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Yahoo Developer Network
 
AWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoTAWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoT
Amazon Web Services
 
Embrace network
Embrace networkEmbrace network
Embrace network
Michel Burger
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
Eurotech
 
the power of IoT technology in innovation
the power of IoT technology in innovationthe power of IoT technology in innovation
the power of IoT technology in innovation
Eurotech
 
How Cloud Providers are Playing with Traditional Data Centers
How Cloud Providers are Playing with Traditional Data CentersHow Cloud Providers are Playing with Traditional Data Centers
How Cloud Providers are Playing with Traditional Data Centers
Hostway|HOSTING
 
The Modern Workplace: Now & Next
The Modern Workplace: Now & NextThe Modern Workplace: Now & Next
The Modern Workplace: Now & Next
Atlas_Cloud
 
Future of IT
Future of ITFuture of IT
Future of IT
Simon May
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Cloudy boss
Cloudy bossCloudy boss
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
Amazon Web Services
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
Ericom Software
 
Strategic Desktop Virtualization
Strategic Desktop VirtualizationStrategic Desktop Virtualization
Strategic Desktop Virtualization
IT Service and Support
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
Amazon Web Services
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Eurotech
 
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Amazon Web Services
 

Similar to Enterprise Security Reloaded (20)

InterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote AddressInterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote Address
 
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
Apache Hadoop India Summit 2011 Keynote talk "Exploring the Future IT Infrast...
 
AWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoTAWS Intelligent at Edge for IoT
AWS Intelligent at Edge for IoT
 
Embrace network
Embrace networkEmbrace network
Embrace network
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
the power of IoT technology in innovation
the power of IoT technology in innovationthe power of IoT technology in innovation
the power of IoT technology in innovation
 
How Cloud Providers are Playing with Traditional Data Centers
How Cloud Providers are Playing with Traditional Data CentersHow Cloud Providers are Playing with Traditional Data Centers
How Cloud Providers are Playing with Traditional Data Centers
 
The Modern Workplace: Now & Next
The Modern Workplace: Now & NextThe Modern Workplace: Now & Next
The Modern Workplace: Now & Next
 
Future of IT
Future of ITFuture of IT
Future of IT
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Cloudy boss
Cloudy bossCloudy boss
Cloudy boss
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
Ericom Connect datasheet
Ericom Connect datasheet Ericom Connect datasheet
Ericom Connect datasheet
 
Strategic Desktop Virtualization
Strategic Desktop VirtualizationStrategic Desktop Virtualization
Strategic Desktop Virtualization
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
Global Innovation with AWS IoT - Dirk Didascalou Presentation at Gartner Cata...
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
 

More from Xylos

Connecting & Sensing | Software AG
Connecting & Sensing | Software AGConnecting & Sensing | Software AG
Connecting & Sensing | Software AG
Xylos
 
Webinar: Connecting & Sensing
Webinar: Connecting & SensingWebinar: Connecting & Sensing
Webinar: Connecting & Sensing
Xylos
 
Webinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introductionWebinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introduction
Xylos
 
Innovation that sticks
Innovation that sticksInnovation that sticks
Innovation that sticks
Xylos
 
Everything will be technology (or die)
Everything will be technology (or die)Everything will be technology (or die)
Everything will be technology (or die)
Xylos
 
The CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tipsThe CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tips
Xylos
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
Xylos
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMware
Xylos
 
v10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peekv10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peek
Xylos
 
Operational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simpleOperational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simple
Xylos
 
A closer look at your data management
A closer look at your data managementA closer look at your data management
A closer look at your data management
Xylos
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?
Xylos
 
Keep your user experience under control
Keep your user experience under controlKeep your user experience under control
Keep your user experience under control
Xylos
 
OMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and CohesityOMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and Cohesity
Xylos
 
Innovation powered by Do-Days
Innovation powered by Do-DaysInnovation powered by Do-Days
Innovation powered by Do-Days
Xylos
 
What if absolutely everything could be connected?
What if absolutely everything could be connected?What if absolutely everything could be connected?
What if absolutely everything could be connected?
Xylos
 
The ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile firstThe ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile first
Xylos
 
There’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter planThere’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter plan
Xylos
 
Mobile-oriented networking is the new black
Mobile-oriented networking is the new blackMobile-oriented networking is the new black
Mobile-oriented networking is the new black
Xylos
 
Don’t let hackers near your privileged accounts
Don’t let hackers near your privileged accountsDon’t let hackers near your privileged accounts
Don’t let hackers near your privileged accounts
Xylos
 

More from Xylos (20)

Connecting & Sensing | Software AG
Connecting & Sensing | Software AGConnecting & Sensing | Software AG
Connecting & Sensing | Software AG
 
Webinar: Connecting & Sensing
Webinar: Connecting & SensingWebinar: Connecting & Sensing
Webinar: Connecting & Sensing
 
Webinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introductionWebinar Mitel MiCloud Flex: an introduction
Webinar Mitel MiCloud Flex: an introduction
 
Innovation that sticks
Innovation that sticksInnovation that sticks
Innovation that sticks
 
Everything will be technology (or die)
Everything will be technology (or die)Everything will be technology (or die)
Everything will be technology (or die)
 
The CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tipsThe CEO’s office: Satya Nadella’s Teams tips
The CEO’s office: Satya Nadella’s Teams tips
 
Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...Get an overview of your network and relax with aruba clear pass and device in...
Get an overview of your network and relax with aruba clear pass and device in...
 
At the table with security solution provider VMware
At the table with security solution provider VMwareAt the table with security solution provider VMware
At the table with security solution provider VMware
 
v10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peekv10 of Backup & Replication: a sneak peek
v10 of Backup & Replication: a sneak peek
 
Operational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simpleOperational information processing: lightning-fast, delightfully simple
Operational information processing: lightning-fast, delightfully simple
 
A closer look at your data management
A closer look at your data managementA closer look at your data management
A closer look at your data management
 
How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?How does Quest Software fit into a Microsoft hybrid environment?
How does Quest Software fit into a Microsoft hybrid environment?
 
Keep your user experience under control
Keep your user experience under controlKeep your user experience under control
Keep your user experience under control
 
OMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and CohesityOMP saves 10 times more storage capacity with Nimble and Cohesity
OMP saves 10 times more storage capacity with Nimble and Cohesity
 
Innovation powered by Do-Days
Innovation powered by Do-DaysInnovation powered by Do-Days
Innovation powered by Do-Days
 
What if absolutely everything could be connected?
What if absolutely everything could be connected?What if absolutely everything could be connected?
What if absolutely everything could be connected?
 
The ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile firstThe ultimate Microsoft Teams experience: AI and mobile first
The ultimate Microsoft Teams experience: AI and mobile first
 
There’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter planThere’s no I in team: your HR team’s starter plan
There’s no I in team: your HR team’s starter plan
 
Mobile-oriented networking is the new black
Mobile-oriented networking is the new blackMobile-oriented networking is the new black
Mobile-oriented networking is the new black
 
Don’t let hackers near your privileged accounts
Don’t let hackers near your privileged accountsDon’t let hackers near your privileged accounts
Don’t let hackers near your privileged accounts
 

Recently uploaded

Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 

Recently uploaded (13)

Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 

Enterprise Security Reloaded

  • 2. John Chambers | Executive Chairman, Cisco System “At least 40% of all businesses will die in the next 10 years… if they don’t figure out how to change their entire company to accommodate new technologies” 40 %
  • 3. John Chambers | Executive Chairman, Cisco System “At least 40% of all businesses will die in the next 10 years… if they don’t figure out how to change their entire company to accommodate new technologies”
  • 6. On-Site Data On-Premise + ERP Apps Company-Issued Desktops Office Workers Within Datacenter On-Premise MOST COMPANIES ARE MID-TRANSFORMATION
  • 7. MOST COMPANIES ARE MID-TRANSFORMATION Cloud / Mobile Era
  • 8. MOST COMPANIES ARE MID-TRANSFORMATION Multiple Cloud Storage Zones SaaS and Mobile Apps PC’s, Laptops, Tablets, Smartphones, Connected Things Work Anywhere, Contractors, Multi-Generational Workforce Branch Operations, and Hybrid-Multi Cloud
  • 9. So is our way of WORKING
  • 13. A NEW VISION ON THE WORKPLACE
  • 14. FOCUSED on the USER & CONTEXT
  • 15. That MOVES BEYOND the PERIMETER
  • 16. Enterprise security reinvented : Beyond Corp / Zero trust Source: https://www.beyondcorp.com/ “BeyondCorp is a Zero Trust security framework modeled by Google that shifts access controls from the perimeter to individual devices and users. The end result allows employees to work securely from any location without the need for a traditional VPN.
  • 17. The guiding principles of beyond corp a.k.a. zero trust, Conditional or contextual access Perimeterless Design Context-Aware Dynamic Access Controls Connecting from a particular network must not determine Which services you can access Access to services is granted based on what we know about you and your device All access to services must be authenticated, authorized and encrypted
  • 18. In practice Establish identity as the control plane Assume every resource is on the open internet Never trust – always verify
  • 20. Core building blocks UEM / EMM Identity federation Policy engine
  • 21. CONDITIONS CONTROLS Session Risk Effective policy MACHINE LEARNING REAL TIME EVALUATION ENGINE POLICIES Employee & Partner Users & Roles Trusted & Compliant Devices Location Client apps & Auth Method Allow/block access Limited access Require MFA Force password reset Terms of Use
  • 22. Basic goals CONDITIONAL ACCESS Keep user accounts safe based on location & risk Keep data safe by only allowing managed devices Meet compliancy requirements Enable security without compromising experience
  • 23. USERS UNTRUSTED DEVICES TRUSTED DEVICES ANY NETWORK ENTRY POINT LAYER DEVICE AUTH BYPASS LAYER DEVICE AUTH LAYER USER AUTH BYPASS LAYER USER AUTH LAYER ACCESS TERMINATION LAYER APPLICATION BACK-END LAYER Theoretical architecture
  • 24. USERS UNTRUSTED DEVICES TRUSTED DEVICES INTERNAL OR EXTERNAL NETWORK FIREWALL / LOAD BALANCER / REVERSE PROXY DEVICE AUTH BYPASS LAYER EMM / UEM USER AUTH BYPASS LAYER SF AUTH / MF AUTH / BIOMETRICS LEGACY APPS (RDSH / VDI / App proxy) MODERN APPS ( MODERN AUTH, CONTAINERIZED) Theoretical architecture
  • 25. USERS UNTRUSTED DEVICES TRUSTED DEVICES INTERNAL OR EXTERNAL NETWORK CITRIX ADC / CITRIX SDWAN CITRIX CEM CITRIX CEM CITRIX CLOUDCITRIX CLOUD (INTELLIGENCE) CITRIX APPS & DESKTOPS CITRIX CLOUD / CITRIX ADC Product translation
  • 27. 28 Closed-loop, autonomous system to dynamically adjust security Citrix Analytics Security User Behavior Security Analytics • Prevent internal threats & data exfiltration attacks • Track & model individual User behaviors across enterprise • Identify & aggregate User Risky behaviors into Risk Profiles Application Security Analytics • Protect Applications from external attacks • Track, access and rank applications based on risks • Suggest mitigation steps to enhance security Data Security Analytics • Prevent internal threats & data exfiltration attacks • Track ‘sensitive files’ via DLP engines Security Analytics to establish Secure Digital Perimeter
  • 28. Sophisticated attacks require a sophisticated response Machine Learning and Artificial Intelligence Engineered for hybrid architectures Gain insights and prevention, not data
  • 29. 30 Security Analytics Descriptive What happened? Diagnostic How it happened? Predictive What will happen? Prescriptive What to do? Excessive (sensitive) file downloads Stolen credentials Loss of (sensitive) data Quarantine User
  • 31. The user threat Survey: Most frequently used security breach tactic: compromised credentials and weak passwords.1 User Behavior Analytics 81% of breaches - compromised credentials or weak passwords 1. Verizon Data Breach Investigations Report (DBIR) 2017
  • 32. ▪ Detect & mitigate threats from trusted internal users with malicious intent ▪ Easily identify high risk users with drill-down capabilities on behavior ▪ Apply corrective actions User Behavior Security Analytics