SlideShare a Scribd company logo
Akamai Security Summit World Tour | Stockholm1
Moving Beyond The Perimeter
Richard Meeus
EMEA Director of Security Technical & Strategy @ Akamai
© 2019 Akamai2
We no longer need to debate
the need for change
© 2019 Akamai3
Users & Apps Have Left The Building
CORP NET
Office
No VPN =
No Security
Cafe
IaaS
SaaS
The Web
App #1 App #2
App #3 App #n
● Complex
● Slow
● High RiskDC
DC
© 2019 Akamai4
“As businesses monetize information and insights
across a complex business ecosystem, the idea of a
corporate perimeter becomes quaint - even
dangerous.”
Excerpt from Forrester’s Future-Proof your Digital Business
with Zero Trust Securityodd, peculiar, or
inappropriate
© 2019 Akamai5
Internet
External
User External
Firewall
Active
Directory
Front
End
443
53 and 443
Internal
User
SQL
Server
Index, Query, Application,
Central Administration
Servers
Web
Servers
HWLB
FirewallFirewall
LDSLDS
(Domain Bound Servers)
Outer DMZ Inner DMZ Intranet
Internal Network
Perimeter
Network
Traditional Trust Model Trusted
Not
Trusted
Trust In The Corporate Network Is Not Inherent
© 2019 Akamai6
Trust In The Corporate Network Is Not Inherent
Internet
External
User External
Firewall
Active
Directory
Front
End
443
53 and 443
Internal
User
SQL
Server
Index, Query, Application,
Central Administration
Servers
Web
Servers
HWLB
FirewallFirewall
LDSLDS
(Domain Bound Servers)
Outer DMZ Inner DMZ Intranet
Internal Network
Perimeter
Network
Zero Trust Model Not
Trusted
Not
Trusted
© 2019 Akamai7
To What Extent Do You Agree/Disagree?
“The network perimeter is indefensible in
today’s technology ecosystem of distributed
cloud networks and mobile/remote users.”
“Digital transformation necessitates
adjustments to traditional (perimeter-
based) security strategies.”
58% 84%
■ Strongly Agree
■Agree
Base: 164 IT Security Decision Makers | Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys (July 2018) | ©2018
Forester
© 2019 Akamai8
That Idea & Zero Trust Are Catching On
https://www.usenix.org/conference/enigma2018/presentatio
n/hildebrandt
© 2019 Akamai9
Zero Trust Security & Google BeyondCorp
aka Operation
Aurora
© 2019 Akamai10
It’s time to move
security controls
to the Edge
© 2019 Akamai11
Adaptive Access & Threat Protection
One edge platform to secure all
enterprise apps & users
Identity Aware Proxy
• Identity, single sign-on & multi-factor
authentication
• Inline app access, app performance & app
security
Secure Internet Gateway
• Malware, phishing & DNS-based data
exfiltration protection with inline payload
analysisOffice Cafe
The Web
DC
IaaS
SaaS
App #1 App #2
App #3 App #n
App #1
App #2
© 2019 Akamai12
Where can this take us?
• Internet is the corporate network
• Every office is a hotspot
• All apps feel like SaaS apps
© 2019 Akamai13
Akamai on Akamai:
Acceleration and Secured Delivery Of Akamai Applications With Zero Trust
ION+KSD Secure Edge EAA POP
NO DMZ
INFRASTRUCTURE
CONNECTORS,
INTERNAL ORIGINS
Improved user
experience over VPN
• Simple
• Faster
Enhanced Security
Reduced
Infrastructure
© 2019 Akamai15
Security Demo Setup
– VPN
Other Apps
Corporate Directory (AD)
VPN Client
……
Intranet
(Sharepoint)
Jenkins
(Dev Ops)
Oracle EBS
(Expense)
Account Payable
Mail (Exchange)
Contacts
Internet
Corporate Perimeter
Desktop with VPN
(left)
VPN Connector
VPN Tunnel
© 2019 Akamai16
Security Demo Setup
– Akamai Zero Trust
Corporate Directory (AD)
Intranet
(Sharepoint)
Jenkins
(Dev Ops)
Oracle EBS
(Expense)
Account Payable
Mail (Exchange)
Contacts
Corporate Perimeter
EAA Connector
Firewall
Akamai Intelligent
Platform
Desktop with ZT
(right)
Enterprise
Threat
Protector
© 2019 Akamai17 © 2019 Akamai17

More Related Content

What's hot

IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
SlideTeam
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
Cloudflare
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
VivianMarcello3
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
Community IT Innovators
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Priyanka Aash
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
Lionel Faleiro
 
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Akamai Technologies
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution Overview
Claudiu Sandor
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
Edureka!
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 

What's hot (20)

IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Office 365 Security Best Practices
Office 365 Security Best PracticesOffice 365 Security Best Practices
Office 365 Security Best Practices
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
 
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Cloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
 
Meraki Solution Overview
Meraki Solution OverviewMeraki Solution Overview
Meraki Solution Overview
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 

Similar to Trust No One - Zero Trust on the Akamai Platform

Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
caesar92
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
Symantec
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
Ramy Houssaini
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
Zscaler
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
Amazon Web Services
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Amazon Web Services
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Akamai Technologies
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...
Michael Elder
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
IBM Security
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
Sonia Baratas Alves
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
Amazon Web Services
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
IBM Security
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPs
Manuel Daza
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
Tyrone Systems
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Flexera
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
 

Similar to Trust No One - Zero Trust on the Akamai Platform (20)

Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019 Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
Build anywhere; Secure everywhere - DEM01-R - AWS re:Inforce 2019
 
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
Site Shield Product Brief - Origin defense by cloaking web infrastructure and...
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...How IBM is helping developers win the race to innovate with next-gen cloud se...
How IBM is helping developers win the race to innovate with next-gen cloud se...
 
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat PreventionIntroducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
 
Enabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud ApplicationsEnabling Secure Use of Cloud Applications
Enabling Secure Use of Cloud Applications
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Foster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPsFoster your business with the cloud - Webinar for MSPs
Foster your business with the cloud - Webinar for MSPs
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 

More from Elisabeth Bitsch-Christensen

Designing for API Doomsday
Designing for API DoomsdayDesigning for API Doomsday
Designing for API Doomsday
Elisabeth Bitsch-Christensen
 
What is a Bot and why you should care
What is a Bot and why you should careWhat is a Bot and why you should care
What is a Bot and why you should care
Elisabeth Bitsch-Christensen
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
Elisabeth Bitsch-Christensen
 
Keynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City TourKeynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City Tour
Elisabeth Bitsch-Christensen
 
Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journey
Elisabeth Bitsch-Christensen
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in Sweden
Elisabeth Bitsch-Christensen
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social Media
Elisabeth Bitsch-Christensen
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digital
Elisabeth Bitsch-Christensen
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Elisabeth Bitsch-Christensen
 
Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)
Elisabeth Bitsch-Christensen
 
Digital Strategy in Presidential Elections
Digital Strategy in Presidential ElectionsDigital Strategy in Presidential Elections
Digital Strategy in Presidential Elections
Elisabeth Bitsch-Christensen
 
Engagement marketing: Influence the Influencer
Engagement marketing: Influence the InfluencerEngagement marketing: Influence the Influencer
Engagement marketing: Influence the Influencer
Elisabeth Bitsch-Christensen
 
CCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 GalleryCCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 Gallery
Elisabeth Bitsch-Christensen
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
Elisabeth Bitsch-Christensen
 
Web forumsocialairlines
Web forumsocialairlinesWeb forumsocialairlines
Web forumsocialairlines
Elisabeth Bitsch-Christensen
 

More from Elisabeth Bitsch-Christensen (16)

Designing for API Doomsday
Designing for API DoomsdayDesigning for API Doomsday
Designing for API Doomsday
 
What is a Bot and why you should care
What is a Bot and why you should careWhat is a Bot and why you should care
What is a Bot and why you should care
 
How to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No OneHow to Counter Cybersecurity Attacks - Trust No One
How to Counter Cybersecurity Attacks - Trust No One
 
Keynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City TourKeynotes Akamai Trust No One City Tour
Keynotes Akamai Trust No One City Tour
 
Datadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journeyDatadriven organizations and the digital customer journey
Datadriven organizations and the digital customer journey
 
Creating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in SwedenCreating a datadriven news room - Expressen in Sweden
Creating a datadriven news room - Expressen in Sweden
 
Social Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social MediaSocial Airlines and Customer Experience in Social Media
Social Airlines and Customer Experience in Social Media
 
The digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digitalThe digital journey in 8 steps: from catalog to content and digital
The digital journey in 8 steps: from catalog to content and digital
 
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing ProfessionalsDigital CMO - Dataföreningens Nätverk För Marketing Professionals
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
 
Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)Hermods gymnasium-4-feb (1)
Hermods gymnasium-4-feb (1)
 
Digital Strategy in Presidential Elections
Digital Strategy in Presidential ElectionsDigital Strategy in Presidential Elections
Digital Strategy in Presidential Elections
 
Engagement marketing: Influence the Influencer
Engagement marketing: Influence the InfluencerEngagement marketing: Influence the Influencer
Engagement marketing: Influence the Influencer
 
CCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 GalleryCCT Nordics Stockholm 10.15 Gallery
CCT Nordics Stockholm 10.15 Gallery
 
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
 
Web forumsocialairlines
Web forumsocialairlinesWeb forumsocialairlines
Web forumsocialairlines
 
SSMX SocialAirlines
SSMX SocialAirlinesSSMX SocialAirlines
SSMX SocialAirlines
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Trust No One - Zero Trust on the Akamai Platform

  • 1. Akamai Security Summit World Tour | Stockholm1 Moving Beyond The Perimeter Richard Meeus EMEA Director of Security Technical & Strategy @ Akamai
  • 2. © 2019 Akamai2 We no longer need to debate the need for change
  • 3. © 2019 Akamai3 Users & Apps Have Left The Building CORP NET Office No VPN = No Security Cafe IaaS SaaS The Web App #1 App #2 App #3 App #n ● Complex ● Slow ● High RiskDC DC
  • 4. © 2019 Akamai4 “As businesses monetize information and insights across a complex business ecosystem, the idea of a corporate perimeter becomes quaint - even dangerous.” Excerpt from Forrester’s Future-Proof your Digital Business with Zero Trust Securityodd, peculiar, or inappropriate
  • 5. © 2019 Akamai5 Internet External User External Firewall Active Directory Front End 443 53 and 443 Internal User SQL Server Index, Query, Application, Central Administration Servers Web Servers HWLB FirewallFirewall LDSLDS (Domain Bound Servers) Outer DMZ Inner DMZ Intranet Internal Network Perimeter Network Traditional Trust Model Trusted Not Trusted Trust In The Corporate Network Is Not Inherent
  • 6. © 2019 Akamai6 Trust In The Corporate Network Is Not Inherent Internet External User External Firewall Active Directory Front End 443 53 and 443 Internal User SQL Server Index, Query, Application, Central Administration Servers Web Servers HWLB FirewallFirewall LDSLDS (Domain Bound Servers) Outer DMZ Inner DMZ Intranet Internal Network Perimeter Network Zero Trust Model Not Trusted Not Trusted
  • 7. © 2019 Akamai7 To What Extent Do You Agree/Disagree? “The network perimeter is indefensible in today’s technology ecosystem of distributed cloud networks and mobile/remote users.” “Digital transformation necessitates adjustments to traditional (perimeter- based) security strategies.” 58% 84% ■ Strongly Agree ■Agree Base: 164 IT Security Decision Makers | Source: A commissioned study conducted by Forrester Consulting on behalf of Unisys (July 2018) | ©2018 Forester
  • 8. © 2019 Akamai8 That Idea & Zero Trust Are Catching On https://www.usenix.org/conference/enigma2018/presentatio n/hildebrandt
  • 9. © 2019 Akamai9 Zero Trust Security & Google BeyondCorp aka Operation Aurora
  • 10. © 2019 Akamai10 It’s time to move security controls to the Edge
  • 11. © 2019 Akamai11 Adaptive Access & Threat Protection One edge platform to secure all enterprise apps & users Identity Aware Proxy • Identity, single sign-on & multi-factor authentication • Inline app access, app performance & app security Secure Internet Gateway • Malware, phishing & DNS-based data exfiltration protection with inline payload analysisOffice Cafe The Web DC IaaS SaaS App #1 App #2 App #3 App #n App #1 App #2
  • 12. © 2019 Akamai12 Where can this take us? • Internet is the corporate network • Every office is a hotspot • All apps feel like SaaS apps
  • 13. © 2019 Akamai13 Akamai on Akamai: Acceleration and Secured Delivery Of Akamai Applications With Zero Trust ION+KSD Secure Edge EAA POP NO DMZ INFRASTRUCTURE CONNECTORS, INTERNAL ORIGINS Improved user experience over VPN • Simple • Faster Enhanced Security Reduced Infrastructure
  • 14. © 2019 Akamai15 Security Demo Setup – VPN Other Apps Corporate Directory (AD) VPN Client …… Intranet (Sharepoint) Jenkins (Dev Ops) Oracle EBS (Expense) Account Payable Mail (Exchange) Contacts Internet Corporate Perimeter Desktop with VPN (left) VPN Connector VPN Tunnel
  • 15. © 2019 Akamai16 Security Demo Setup – Akamai Zero Trust Corporate Directory (AD) Intranet (Sharepoint) Jenkins (Dev Ops) Oracle EBS (Expense) Account Payable Mail (Exchange) Contacts Corporate Perimeter EAA Connector Firewall Akamai Intelligent Platform Desktop with ZT (right) Enterprise Threat Protector
  • 16. © 2019 Akamai17 © 2019 Akamai17