SlideShare a Scribd company logo
THE STATE OF CLOUD
FEBRUARY 2021
Omer Ganot, Cloud Security PM, AlgoSec
John Yeoh, Global VP Research, CSA
John Yeoh
2 | Confidential
PRESENTERS
Global VP Research
Omer Ganot
Cloud Security PM
✓Co-developed by CSA and AlgoSec
✓ 1st Survey published Feb 2019
✓ 2nd Survey published Feb 2021
✓ Based on the 2021 State of the Hybrid Cloud Security survey
✓~2,000 Responses from global IT & security professionals
3 | Confidential
PRECURSOR
AGENDA
Cloud adoption
2
3
4
5
Complexity of the modern-day network
Who is responsible for cloud security?
Misconfigurations and outages
Questions … and Answers!
4 | Confidential
CLOUD ADOPTION
WHAT PERCENTAGE OF YOUR WORKLOADS DOES YOUR ORGANIZATION
CURRENTLY RUN IN THE PUBLIC CLOUD IN PRODUCTION?
0.00%
5.00%
10.00%
15.00%
20.00%
25.00%
30.00%
35.00%
40.00%
1-20% 21-40% 41%-60% 61%-80% 81%-100%
2019 2021
• Cloud adoption is accelerating
• 53% of respondents have over 40% of
their workloads in the cloud
• Almost 30% have over 60% in the cloud
2021 WORKLOAD IN CLOUD PERCENTAGE | EXPECTATION VS. ACTUAL
22%
21%
24%
15%
13%
14.64%
23.75%
18.93%
17.50%
13.57%
0%
5%
10%
15%
20%
25%
30%
1-20% 21-40% 41%-60% 61%-80% 81%-100%
2019 Expectations (for 2021) 2021 Actual
2021 WORKLOAD IN CLOUD PERCENTAGE | EXPECTATION VS. ACTUAL
8
22%
21%
24%
15%
7%
6%
13%
21%
22%
18%
13%
8%
0%
5%
10%
15%
20%
25%
30%
1-20% 21-40% 41%-60% 61%-80% 81%-99% 100%
Current Expected (for 2022)
The number of organizations that will have
81%-99% of their workloads in the cloud
within 12 months will double
HAS PUBLIC CLOUD IAAS MET THE EXPECTATIONS AND PROMISES?
(E.G. AWS, AZURE, GCP)
2.1
2.3
2.3
2.3
1.0
2.0
3.0
Reduced Cost Increased Agility and Elasticity DevOps-Friendly Improved Uptime
Better than expected:
As Expected:
Worse than expected:
“CLOUDPLEXITY”
MANAGING SECURITY IN THE CLOUD IS COMPLEX
MULTIPLE CLOUDS
11
Private
Clouds
Multi
Public Clouds
On-Prem Intranet Dedicated Server
WHICH PUBLIC CLOUD PLATFORMS DOES YOUR ORGANIZATION USE?
12
60.70%
56.45%
25.22%
4.40%
8.50% 7.04%
67.31%
65.34%
37%
9.89% 11.05%
9%
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
AWS Azure GCP Alibaba IBM Oracle Cloud
2019 2021
• The entire cloud platform market share
has grown
• 62% use multiple cloud environments
• 27% of all respondents leverage 3 or more
cloud platforms
MANAGING SECURITY IN THE CLOUD IS COMPLEX
MULTIPLE LAYERS OF SECURITY CONTROLS
13
3rd party Security Vendors
Products
Cloud Infra Security
Controls
Advanced Security
Controls by Cloud
Providers
WHICH PUBLIC CLOUD PLATFORMS DOES YOUR ORGANIZATION USE?
14
70.37%
58.48%
45.03%
31.58%
74%
71%
49%
22%
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
Cloud provider’s native security controls
(e.g. Security Groups, Network ACLs)
Cloud provider’s additional security
controls (e.g. Azure Firewall, AWS WAF,
AWS Firewall)
Virtual editions of traditional firewalls (e.g.
Palo Alto Networks, Check Point,
Barracuda) deployed in the cloud
environment
Host based enforcement (e.g. SDP)
2019 2021
50% of organizations use
3rd party Next-Gen firewalls
WHAT BENEFITS ARE YOU LOOKING FOR IN A CLOUD SECURITY MANAGEMENT TOOL?
15
7.4
7.2
6.9
5.8
5.7
4.8
4.3
0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0
Clear visibility (topology, policy) for the entire hybrid network estate
(multi-cloud and on-prem)
Proactively detect network risks
Proactively detect misconfiguration risks (e.g. IAM)
Automation, uniform change management across the different
security controls
Regulatory compliance reports
clean up cloud security controls with excessive rules
Ease of migration of workloads from on-prem to cloud
VISIBILITY – REQUIREMENTS
16
Full visibility into all
elements that make
up your network:
cloud, SDN and on-
premise
Single pane of glass
to view different
security controls
across hybrid
environments
Clear and uniform
visibility of cloud
assets across the
multi-cloud
Discovery and mapping of
network flows to the
matching business
applications
Topology Security Controls Application Connectivity
Assets
Native Cloud Security Controls
(Security Groups/NACL/NSG)
Virtual appliance in the cloud
Traditional FW
Virtual appliance in the SDN fabric
Private cloud SDN – distributed FW
A SINGLE PANE OF GLASS INTO YOUR ENTIRE NETWORK
17
VISIBILITY INTO SECURITY CONTROLS
18
VISIBILITY INTO APPLICATION NETWORK FLOWS
19
CLOUD SECURITY STAFFING
MANAGING SECURITY IN THE CLOUD IS COMPLEX
MULTIPLE STAKEHOLDERS
Application Developers/
DevOps
CISO IT / Network Security Cloud Teams
Security Operations
21
WHICH TEAM IS RESPONSIBLE FOR MANAGING SECURITY
IN THE PUBLIC CLOUD?
22
6%
18%
8%
16%
4%
35%
9%
0%
5%
10%
15%
20%
25%
30%
35%
40%
Application Owners Cloud Team DevOps
Engineers/Manager
IT Operations Managed Service
Provider
Security Operations Network Operations
WHAT CONCERNS DOES YOUR ORGANIZATION ENCOUNTER WHEN
ADOPTING A PUBLIC CLOUD PLATFORM?
23
58%
47%
44%
32%
14%
13%
9% 8% 8%
0%
10%
20%
30%
40%
50%
60%
Network security Staff lacks cloud
expertise
Migration of
workloads to the
cloud
Insufficient amount
of staff to manage
cloud environment
Integration with the
current IT
environment
Regulatory
compliance
Lack of visibility Legal concerns Cost
79% of organizations are
concerned with the lack of
required talent
MISCONFIGURATIONS & OUTAGES
HOW MANY CLOUD-RELATED
OPERATIONAL INCIDENTS DID YOUR
ORGANIZATION EXPERIENCE IN THE
LAST 12 MONTHS?
MAX
101
Average
4.95
WHAT WAS THE IMPACT OF YOUR MOST DISRUPTIVE CLOUD OUTAGE?
26%
24%
14%
8%
4%
0%
5%
10%
15%
20%
25%
30%
Operational loss of less
than an hour
Operational loss of 1-3
hours
Operational loss of 3-5
hours
Operational loss of a
working day
Operational loss of longer
than a working day
Close to 50% of cloud outages
lasted for over an hour
THE COST OF NETWORK DOWNTIME
According to Gartner
The average cost of network
downtime is about
$5,600 per minute
Just about $300,000 per hour
Source: https://blogs.gartner.com/andrew-lerner/2014/07/16/the-cost-of-downtime/
WHAT WAS THE MAIN CONTRIBUTOR TO THE OUTAGE?
29%
26%
22%
20%
16%
0%
5%
10%
15%
20%
25%
30%
Operational human errors
and mismanagement of
devices
Cloud provider issue Security misconfiguration Security attacks such as
denial of service (DoS)
Network bandwidth issues
More than 50% of outages
are due to human error
Validate the
change
Map
devices in
path
Check for
risk
involved
Plan the
Rules
Implement
the change
on the
devices
RISK AWARE CHANGE AUTOMATION
Request a
network
change
29
WHAT CONCERNS DOES YOUR ORGANIZATION ENCOUNTER WHEN
ADOPTING A PUBLIC CLOUD PLATFORM?
30
58%
47%
44%
32%
14% 13%
9% 8% 8%
0%
10%
20%
30%
40%
50%
60%
Network security Staff lacks cloud
expertise
Migration of
workloads to the
cloud
Insufficient
amount of staff
to manage cloud
environment
Integration with
the current IT
environment
Regulatory
compliance
Lack of visibility Legal concerns Cost
• Cloud Adoption is growing quickly
• Hybrid networks are complex
• Multiple cloud vendors
• On-prem, private and public cloud
• Multiple stake-holders
• It’s difficult to recruit cloud security professionals
• Outages can be costly
• They can be eliminated with automation
• You can apply your security guidelines in the cloud
if you choose the right tools
31
SUMMARY
32 | Confidential
QUESTIONS?
THANK YOU

More Related Content

What's hot

2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
AlgoSec
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
AlgoSec
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)
AlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
AlgoSec
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
shira koper
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
AlgoSec
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
shira koper
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
AlgoSec
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
shira koper
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
AlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
AlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
AlgoSec
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
shira koper
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
CloudPassage
 

What's hot (20)

2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)Examining the Impact of Security Management on the Business (Infographic)
Examining the Impact of Security Management on the Business (Infographic)
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
Managing Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network SecurityManaging Application Connectivity in the World of Network Security
Managing Application Connectivity in the World of Network Security
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Migrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best PracticesMigrating and Managing Security in an AWS Environment- Best Practices
Migrating and Managing Security in an AWS Environment- Best Practices
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application ConnectivityMovin' On Up to the Cloud: How to Migrate your Application Connectivity
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
DevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOpsDevSecOps: Putting the Sec into the DevOps
DevSecOps: Putting the Sec into the DevOps
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...Best Practices for Workload Security: Securing Servers in Modern Data Center ...
Best Practices for Workload Security: Securing Servers in Modern Data Center ...
 

Similar to The state of the cloud csa survey webinar

Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security studyDome9 Security
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
GSTF
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
Netskope
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
Bitglass
 
Cloud Offerings and Data Security
Cloud Offerings and Data SecurityCloud Offerings and Data Security
Cloud Offerings and Data Security
ICFAIEDGE
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Bill Burns
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
Enterprise Management Associates
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
Qualys
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
Lora O'Haver
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
GSTF
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
AlgoSec
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
the-state-of-observability-2021.pdf
the-state-of-observability-2021.pdfthe-state-of-observability-2021.pdf
the-state-of-observability-2021.pdf
ssuser2033e7
 
The Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services TrafficThe Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services Traffic
DevOps.com
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Microsoft Technet France
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Alert Logic
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
Fortinet
 

Similar to The state of the cloud csa survey webinar (20)

Ponemon cloud security study
Ponemon cloud security studyPonemon cloud security study
Ponemon cloud security study
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Cloud Offerings and Data Security
Cloud Offerings and Data SecurityCloud Offerings and Data Security
Cloud Offerings and Data Security
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
The Borderless Enterprise: Adapting Network Management to Mobility, Cloud, & ...
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
the-state-of-observability-2021.pdf
the-state-of-observability-2021.pdfthe-state-of-observability-2021.pdf
the-state-of-observability-2021.pdf
 
The Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services TrafficThe Imperative for Visibility into Cloud Native Web Services Traffic
The Imperative for Visibility into Cloud Native Web Services Traffic
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Infographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into FocusInfographic: Bringing Your Cloud Visibility Back Into Focus
Infographic: Bringing Your Cloud Visibility Back Into Focus
 

More from AlgoSec

compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
AlgoSec
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
AlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
AlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
AlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
AlgoSec
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
AlgoSec
 

More from AlgoSec (10)

compliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinarcompliance made easy. pass your audits stress-free webinar
compliance made easy. pass your audits stress-free webinar
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 
Create and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best PracticesCreate and Manage a Micro-Segmented Data Center – Best Practices
Create and Manage a Micro-Segmented Data Center – Best Practices
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

The state of the cloud csa survey webinar

  • 1. THE STATE OF CLOUD FEBRUARY 2021 Omer Ganot, Cloud Security PM, AlgoSec John Yeoh, Global VP Research, CSA
  • 2. John Yeoh 2 | Confidential PRESENTERS Global VP Research Omer Ganot Cloud Security PM
  • 3. ✓Co-developed by CSA and AlgoSec ✓ 1st Survey published Feb 2019 ✓ 2nd Survey published Feb 2021 ✓ Based on the 2021 State of the Hybrid Cloud Security survey ✓~2,000 Responses from global IT & security professionals 3 | Confidential PRECURSOR
  • 4. AGENDA Cloud adoption 2 3 4 5 Complexity of the modern-day network Who is responsible for cloud security? Misconfigurations and outages Questions … and Answers! 4 | Confidential
  • 6. WHAT PERCENTAGE OF YOUR WORKLOADS DOES YOUR ORGANIZATION CURRENTLY RUN IN THE PUBLIC CLOUD IN PRODUCTION? 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 35.00% 40.00% 1-20% 21-40% 41%-60% 61%-80% 81%-100% 2019 2021 • Cloud adoption is accelerating • 53% of respondents have over 40% of their workloads in the cloud • Almost 30% have over 60% in the cloud
  • 7. 2021 WORKLOAD IN CLOUD PERCENTAGE | EXPECTATION VS. ACTUAL 22% 21% 24% 15% 13% 14.64% 23.75% 18.93% 17.50% 13.57% 0% 5% 10% 15% 20% 25% 30% 1-20% 21-40% 41%-60% 61%-80% 81%-100% 2019 Expectations (for 2021) 2021 Actual
  • 8. 2021 WORKLOAD IN CLOUD PERCENTAGE | EXPECTATION VS. ACTUAL 8 22% 21% 24% 15% 7% 6% 13% 21% 22% 18% 13% 8% 0% 5% 10% 15% 20% 25% 30% 1-20% 21-40% 41%-60% 61%-80% 81%-99% 100% Current Expected (for 2022) The number of organizations that will have 81%-99% of their workloads in the cloud within 12 months will double
  • 9. HAS PUBLIC CLOUD IAAS MET THE EXPECTATIONS AND PROMISES? (E.G. AWS, AZURE, GCP) 2.1 2.3 2.3 2.3 1.0 2.0 3.0 Reduced Cost Increased Agility and Elasticity DevOps-Friendly Improved Uptime Better than expected: As Expected: Worse than expected:
  • 11. MANAGING SECURITY IN THE CLOUD IS COMPLEX MULTIPLE CLOUDS 11 Private Clouds Multi Public Clouds On-Prem Intranet Dedicated Server
  • 12. WHICH PUBLIC CLOUD PLATFORMS DOES YOUR ORGANIZATION USE? 12 60.70% 56.45% 25.22% 4.40% 8.50% 7.04% 67.31% 65.34% 37% 9.89% 11.05% 9% 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% AWS Azure GCP Alibaba IBM Oracle Cloud 2019 2021 • The entire cloud platform market share has grown • 62% use multiple cloud environments • 27% of all respondents leverage 3 or more cloud platforms
  • 13. MANAGING SECURITY IN THE CLOUD IS COMPLEX MULTIPLE LAYERS OF SECURITY CONTROLS 13 3rd party Security Vendors Products Cloud Infra Security Controls Advanced Security Controls by Cloud Providers
  • 14. WHICH PUBLIC CLOUD PLATFORMS DOES YOUR ORGANIZATION USE? 14 70.37% 58.48% 45.03% 31.58% 74% 71% 49% 22% 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% Cloud provider’s native security controls (e.g. Security Groups, Network ACLs) Cloud provider’s additional security controls (e.g. Azure Firewall, AWS WAF, AWS Firewall) Virtual editions of traditional firewalls (e.g. Palo Alto Networks, Check Point, Barracuda) deployed in the cloud environment Host based enforcement (e.g. SDP) 2019 2021 50% of organizations use 3rd party Next-Gen firewalls
  • 15. WHAT BENEFITS ARE YOU LOOKING FOR IN A CLOUD SECURITY MANAGEMENT TOOL? 15 7.4 7.2 6.9 5.8 5.7 4.8 4.3 0.0 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 Clear visibility (topology, policy) for the entire hybrid network estate (multi-cloud and on-prem) Proactively detect network risks Proactively detect misconfiguration risks (e.g. IAM) Automation, uniform change management across the different security controls Regulatory compliance reports clean up cloud security controls with excessive rules Ease of migration of workloads from on-prem to cloud
  • 16. VISIBILITY – REQUIREMENTS 16 Full visibility into all elements that make up your network: cloud, SDN and on- premise Single pane of glass to view different security controls across hybrid environments Clear and uniform visibility of cloud assets across the multi-cloud Discovery and mapping of network flows to the matching business applications Topology Security Controls Application Connectivity Assets
  • 17. Native Cloud Security Controls (Security Groups/NACL/NSG) Virtual appliance in the cloud Traditional FW Virtual appliance in the SDN fabric Private cloud SDN – distributed FW A SINGLE PANE OF GLASS INTO YOUR ENTIRE NETWORK 17
  • 19. VISIBILITY INTO APPLICATION NETWORK FLOWS 19
  • 21. MANAGING SECURITY IN THE CLOUD IS COMPLEX MULTIPLE STAKEHOLDERS Application Developers/ DevOps CISO IT / Network Security Cloud Teams Security Operations 21
  • 22. WHICH TEAM IS RESPONSIBLE FOR MANAGING SECURITY IN THE PUBLIC CLOUD? 22 6% 18% 8% 16% 4% 35% 9% 0% 5% 10% 15% 20% 25% 30% 35% 40% Application Owners Cloud Team DevOps Engineers/Manager IT Operations Managed Service Provider Security Operations Network Operations
  • 23. WHAT CONCERNS DOES YOUR ORGANIZATION ENCOUNTER WHEN ADOPTING A PUBLIC CLOUD PLATFORM? 23 58% 47% 44% 32% 14% 13% 9% 8% 8% 0% 10% 20% 30% 40% 50% 60% Network security Staff lacks cloud expertise Migration of workloads to the cloud Insufficient amount of staff to manage cloud environment Integration with the current IT environment Regulatory compliance Lack of visibility Legal concerns Cost 79% of organizations are concerned with the lack of required talent
  • 25. HOW MANY CLOUD-RELATED OPERATIONAL INCIDENTS DID YOUR ORGANIZATION EXPERIENCE IN THE LAST 12 MONTHS? MAX 101 Average 4.95
  • 26. WHAT WAS THE IMPACT OF YOUR MOST DISRUPTIVE CLOUD OUTAGE? 26% 24% 14% 8% 4% 0% 5% 10% 15% 20% 25% 30% Operational loss of less than an hour Operational loss of 1-3 hours Operational loss of 3-5 hours Operational loss of a working day Operational loss of longer than a working day Close to 50% of cloud outages lasted for over an hour
  • 27. THE COST OF NETWORK DOWNTIME According to Gartner The average cost of network downtime is about $5,600 per minute Just about $300,000 per hour Source: https://blogs.gartner.com/andrew-lerner/2014/07/16/the-cost-of-downtime/
  • 28. WHAT WAS THE MAIN CONTRIBUTOR TO THE OUTAGE? 29% 26% 22% 20% 16% 0% 5% 10% 15% 20% 25% 30% Operational human errors and mismanagement of devices Cloud provider issue Security misconfiguration Security attacks such as denial of service (DoS) Network bandwidth issues More than 50% of outages are due to human error
  • 29. Validate the change Map devices in path Check for risk involved Plan the Rules Implement the change on the devices RISK AWARE CHANGE AUTOMATION Request a network change 29
  • 30. WHAT CONCERNS DOES YOUR ORGANIZATION ENCOUNTER WHEN ADOPTING A PUBLIC CLOUD PLATFORM? 30 58% 47% 44% 32% 14% 13% 9% 8% 8% 0% 10% 20% 30% 40% 50% 60% Network security Staff lacks cloud expertise Migration of workloads to the cloud Insufficient amount of staff to manage cloud environment Integration with the current IT environment Regulatory compliance Lack of visibility Legal concerns Cost
  • 31. • Cloud Adoption is growing quickly • Hybrid networks are complex • Multiple cloud vendors • On-prem, private and public cloud • Multiple stake-holders • It’s difficult to recruit cloud security professionals • Outages can be costly • They can be eliminated with automation • You can apply your security guidelines in the cloud if you choose the right tools 31 SUMMARY