We at EveryCloud, help you to be more cloud confident, we do this in a number of ways that include email security, web security, insider threat management, identity and access management, cloud communications and cloud access security.
Web Security – preventing DLP, URL spoofing, malicious sties, rogue web applications etc. Control access to networks, apps and websites, visualise users, data and device behaviour
Email Security – preventing phishing, ransomware, spam and data exposure. Improved protection against malware and other threats, increase employee and network efficiency.
Identity Access Management - helping your business to stay safe, by providing powerful solutions for MFA, password vulnerabilities, improve visibility and reporting, helping you reduce high volume helpdesk tickets, on boarding and off boarding staff, contractors and suppliers, leveraging best of breed SaaS, unify API access and management to keep apps and data safe, automate user lifecycles by connecting business and IT processes
Insider Threat protection - providing a 360-degree view of activities around your data – the who, what, where and when – by monitoring user behaviour and data flow – then instantly alerting to any anomalous or malicious activity.
Cloud Communications - we help your journey to a Cloud based Contact Centre improving Customer Service in an omni-channel environment integrating Call Centre, Email, Live Chat, co-browsing, Instant Messaging and much more.
Cloud Access Security - we assist you to govern your business’ cloud usage with visibility and control. We help you to understand risky activity, protect and prevent the loss of sensitive data and guard against cloud-based threats such as malware and ransomware.
Email us discover@everycloud.co.uk or visit our website www.everycloud.co.uk - we are happy to help you
2. By 2020
85%
of large enterprises will
use a cloud access
security broker to protect
their operations
3. v
THE CHANGING THREAT LANDSCAPE
3
Data Center
YESTERDAY TODAY
Mobile
Users
Branch
Office
HQ Remote
Users
VPN
HQ Branch
Office
Data Center
Remote
Users
VPN
NetworkPerimeter
4. v
CYBERSECURITY MONTH – SOME FACTS
“74%of companies have abandoned traditional security policies and tech because
they can’t be used effectively for the Cloud” Source: The Evolution of Cloud Security Group
“80%of participants acknowledged their on-premises security policies,
technologies and skills are more mature than those for cloud applications” Source: The
Evolution of Cloud Security Group
“A study by IBMSecurity found that the number of ransomware-infected emails
increased 6,000 percent compared to 2015” Source: Ransomware: how consumers and businesses value there data (IBM Security)
“95%of all attacks on enterprise networks are the result of successful spear phishing”
Source: Allen Paller, Director of Research
5. v
GDPR – KEY ARTICLES REGARDING DATA SECURITY
• Privacy by Design
• Privacy by Default
• Organisational &
Technical Strategies
Article 25
• Security of Data
Processing
• Organisational &
Technical Strategies
Article 32
• Notification of
Personal Breach
within 72 Hours
Article 33
• Communication of
Personal Data Breach
to the data subject
Article 34
• Data Protection
Impact Assessment
• Include a description
of measures to
mitigate risks
Article 35
6. v
GDPR – ARTICLE 32 – MINIMUM MEASURES
Pseudonymizingor
encryptingpersonal data
MaintainOngoing
Confidentiality
RestoreAvailabilityand
Access toPersonal Data
Testing&Evaluating
7. v
GDPR – ARTICLE 32 – TECHNICAL STRATEGIES
Data Discovery &
Classification
Data Loss
Prevention
Privileged User
Monitoring
Secure Audit Trail
Sensitive Data
Access Audit
User rights
management
8. v
THE SHADOW IT CHALLENGE
88
30 %
95% of the apps are unknown by IT
Most apps are not enterprise-ready
End user is the new perimeter
There are 22,000+
enterprise cloud apps today (and growing)
% of data moving to Unsanctioned cloud apps
1,000 apps discovered – on average
5%
75%
20%
10. Cloud Usage Overview
• 1,378 Number of Cloud Based Applications
• Across 39 Application Categories
• 26% of your data moving to unsanctioned Applications
PCI Compliance
• 512 PCI Incidents
• 3 High severity incidents with files containing over 100 PCI Violations
Personal Information / EUGDPR
• 939 Apps that cannot erase your data
• 813 Apps with unclear data ownership
• 68% of Apps violating GDPR
Malware &Compromised Accounts
• 184 Compromised User Accounts
• 692 Malicious Sites Accessed by 138 Users
EXECUTIVE SUMMARY
11. % of all Data uploaded goes
to unsanctioned cloud apps.
Number Of Cloud Apps
Discovered – 40% higher than
industry average
App’s With Unclear Data Ownership –
no longer owns the data
% Apps Non Enterprise Ready Not
meeting basic standards
Percentage Of Apps
violating GDPR
Number Of Apps that cannot
erase your data when you leave
the service
1,378 813 30%
68% 94.8% 939
KEY FINDINGS FROM CLOUD RISK ASSESSMENT
12. EXECUTIVE SUMMARY
1,378 2,350
173 29
Apps Discovered Users
High Risk Apps High Risk Users
App Total
Bytes Risk
WeTransfer 135GB H
iCloud 28GB H
Office365OneDrive 25GB L
GoogleDrive 3GB L
LiveOneDrive 1GB L
94% Of Apps Are Not Enterprise Ready
APPS BY Cloud Confidence Level
TOP STORAGE BY TOTAL BYTES
CLOUD APP USAGE SUMMARY
TOP EXPOSURES
UsageSummary
Number of AppCategories 39
Total DataMovement 1.6TB
Total Uploads 350GB
Total Downloads 1.3TB
DataMovement inHighRisk Apps 365GB
Exposureor RiskItem
Potentially Compromised
Accounts
184
Dateof Last Compromise 09/02/16
NonEnterpriseReady Apps 1,335
CONCERNS AND RECOMMENDATIONS
Concern Recommendation
PII GDPR
Evaluatedatabeingstoredin
apps that donot meet GDPR
requirements for data
ownership
Unsanctioned
Apps
Adopt policy toevaluate
unsanctionedapps and
monitor datamovement
DataLeakage
Implement DLPpolicy across
all applications toprotect
sensitivedata
CLOUD APP USAGE SUMMARY
1855
141
126
855
exce llent
high
low
medium
poor
13. Unsanctionedand
blocked
DISCOVERY IS ONE OF THE FOUR KEY STAGES OF AN OVERALL
CLOUD SECURITY STRATEGY
1
Continuously discover
cloud services and assess
risk
2
Block the most risky
services and coach users
to use alternatives
Block risky services
Coach users
3
Safely enable cloud services
you have sanctioned
Apply adaptive access
control
Implement
granular policies
Prevent data loss
Protect against threats
Encrypt when necessary
4
Safely permit unsanctioned,
yet necessary, cloud
services
Identify ecosystems,
non-corporate
instances, and create
category-level and
context-based policies
Block risky activities
Skipping this step may
lead to user revolt and a
decrease in productivity
Unsanctioned
andpermitted
Sanctioned
Discovered Blocked Sanctioned SafelyPermitted
15. THE COST OF FAILING TO SECURE YOUR CLOUD
DATABREACHES
FAILEDAUDITS
LOSS/THEFT OF INTELLECTUAL
PROPERTY, SENSITIVE DATA
§ Reputational damage
§ Regulatory breaches
§ Fines and penalties
§ Business disruption
§ Lost profits
§ Customer confidence
MAX FINE UNDER NEW EU DATA RULES:
4% of global turnover or €20m - whichever is greater
16. v
ALIGNED TO GARTNER’S DEFINITION OF A CASB
VISIBILITY Discover 100% coverage for all cloud traffic
COMPLIANCE Aware
Understand, report and control
app usage
DATASECURITY Comply
Enterprise-class DLP enforced
with context for all apps
THREATPROTECTION Confidence
Advanced threat protection built
for the cloud
By 2020 85% of Enterprises will deploy the services of a Cloud Access Security Broker.
Gartner define a CASB as being able to provide the following: