Managed Security: Evolving the Data Center 2. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
AGENDA
2
1. TCTS - Introduction
2. Data Center Trends and Security Challenges
3. Strategic Priorities to Secure Data Center
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
3. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
TATA COMMUNICATION TRANSFORMATION SERVICES (TCTS)
Managed services for network and business operations across Telco lifecycle areas, as well as consultancy and business
enablement services, to global enterprises and telecommunications companies, via a global delivery model
7000+
Multi domain/ vendor agnostic network
specialist across multiple technologies 6 Global delivery centers including
on-site customer delivery centers
Business process management
Operational performance improvement
Transformation
Network audit and consultancy
Security audit and consultancy
Business consulting
Fulfillment
Assurance
Network engineering and planning
B2B enablement
Service monetisation
Customer experience management
Business
enablement
Network and
services
Business
excellence
Audit and
consultancy
3
Simplify complexity
by improving process efficiency
Accelerate
time-to-market
with proven experience and expertise
Improve end customer
experience
by enhancing service availability
Reduce costs
by optimising
people, processes and technology
3
4. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATACENTER TECHNOLOGY TRENDS
4
• DCIM Will Move Further Up the IT Stack
• Prefabricated Datacenters Will Come of Age
• Hyperscales and the Open Compute Project Will Disrupt Suppliers’ Status Quo
• Cloud Will Drive Technical and Business Change
• Datacenters Will Evolve from Consumers to Active Energy Players
The data center has evolved faster than everyone imagined and many are
encountering challenges because their approach to security did not evolve
Source: 451 Research
5. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
Evolving Threats Security Operations Compliance
• Manual process
• Short on resources
• Long provisioning times
• Costly
• Complex validation process
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
• Detect, understand,
and block
5
6. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
• Detect, understand,
and block
• Manual process
• Short on resources
• Long provisioning
times
• Costly
• Complex validation
process
Evolving Threats Security Operations Compliance
LISTENER POLL
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
What challenges does your organization face when planning and
implementing data center security?
6
7. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
BIGGER TRUTH
How secure is your data center?
74%
57%
68%
68%
Of organizations
reports that on
average security
change requests takes
days or weeks
to complete
Of organizations
experienced a security
incident that resulted
in the compromise
of one or more
data center services
in the past 2 years
Of organizations that
have suffered lateral
data center server
attacks have confidence
that additional network
segmentation could
definitely prevent
future compromises
Of organizations with
a method for removing
out-of-date firewall
rules says this process
is difficult and
time consuming
Source: Cisco 7
8. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
STRATEGIC PRIORITIES TO SECURE DATA CENTER
• Provide transparency
to usage
• Apply business
context to network
activity
• Simplify operations
and compliance
reporting
Segmentation Threat Control Visibility
• Establish boundaries:
network, compute,
virtual
• Enforce policy by
functions, devices,
organizations
• Control access to
networks, resources,
applications
• Stop internal and
external attacks
• Patrol zone and edge
boundaries
• Control information
access and usage
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
8
9. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
SEGMENTATION
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Firewall
Segmentation
Context Aware
Segmentation
Fabric
Segmentation
Network
Segmentation
9
10. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
THREAT CONTROL
10
11. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Device DeviceDevice
Thousands of network elements
Multi-vendor
technologies
Collect data
Tens of incidents,
problems, and issues
Analyze and correlate data
Millions of traps,
syslogs, events
Aggregate data
Few root causes
Isolate, resolve, restore,
and optimize the network
VISIBILITY
11
12. www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
• Detect, understand,
and block
• Manual process
• Short on resources
• Long provisioning
times
• Costly
• Complex validation
process
Evolving Threats Security Operations Compliance
LISTENER POLL
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Are data centers doing enough to train their employees for new security threats in
the age of virtualization? Or is there still a lot of room for improvement?
12
14. www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Security Consulting SecurityAssessments Managed Security
• Regulatory Compliance
Assessment
• Security Governance
Assessment
• Technical Security
Assessment
• Security Monitoring &
Management Services
• Security Design &
Implementation
• Solution & Platform
Engineering
• Security Architecture
Review
• Security Migration
Services
• Solution Optimization
Services
TCTS SECURITY OFFERINGS
Transformation methodologies to mitigate cyber security concerns
14