Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Managed Security: Evolving the Data Center

As service providers become reliant on new virtualized network architectures, virtualization, fabrics and clouds, data centers have taken center stage as key elements in network transformation and are more important than ever before.
TCTS' Managed Security expert engaged in a session with Light Reading's UpSkill University to share perspective on how data center security can evolve alongside network transformation and meet stringent security compliance and audits.

Know more about TCTS Managed Security services at: http://www.tatacommunications-ts.com/security.php

  • Be the first to comment

Managed Security: Evolving the Data Center

  1. 1. SECURITY: EVOLVING THE DATA CENTER 21 October 2016 Rasool Kareem Irfan
  2. 2. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. AGENDA 2 1. TCTS - Introduction 2. Data Center Trends and Security Challenges 3. Strategic Priorities to Secure Data Center www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
  3. 3. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. TATA COMMUNICATION TRANSFORMATION SERVICES (TCTS) Managed services for network and business operations across Telco lifecycle areas, as well as consultancy and business enablement services, to global enterprises and telecommunications companies, via a global delivery model 7000+ Multi domain/ vendor agnostic network specialist across multiple technologies 6 Global delivery centers including on-site customer delivery centers Business process management Operational performance improvement Transformation Network audit and consultancy Security audit and consultancy Business consulting Fulfillment Assurance Network engineering and planning B2B enablement Service monetisation Customer experience management Business enablement Network and services Business excellence Audit and consultancy 3 Simplify complexity by improving process efficiency Accelerate time-to-market with proven experience and expertise Improve end customer experience by enhancing service availability Reduce costs by optimising people, processes and technology 3
  4. 4. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATACENTER TECHNOLOGY TRENDS 4 • DCIM Will Move Further Up the IT Stack • Prefabricated Datacenters Will Come of Age • Hyperscales and the Open Compute Project Will Disrupt Suppliers’ Status Quo • Cloud Will Drive Technical and Business Change • Datacenters Will Evolve from Consumers to Active Energy Players The data center has evolved faster than everyone imagined and many are encountering challenges because their approach to security did not evolve Source: 451 Research
  5. 5. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES Evolving Threats Security Operations Compliance • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. • Detect, understand, and block 5
  6. 6. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES • Detect, understand, and block • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process Evolving Threats Security Operations Compliance LISTENER POLL www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. What challenges does your organization face when planning and implementing data center security? 6
  7. 7. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. BIGGER TRUTH How secure is your data center? 74% 57% 68% 68% Of organizations reports that on average security change requests takes days or weeks to complete Of organizations experienced a security incident that resulted in the compromise of one or more data center services in the past 2 years Of organizations that have suffered lateral data center server attacks have confidence that additional network segmentation could definitely prevent future compromises Of organizations with a method for removing out-of-date firewall rules says this process is difficult and time consuming Source: Cisco 7
  8. 8. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. STRATEGIC PRIORITIES TO SECURE DATA CENTER • Provide transparency to usage • Apply business context to network activity • Simplify operations and compliance reporting Segmentation Threat Control Visibility • Establish boundaries: network, compute, virtual • Enforce policy by functions, devices, organizations • Control access to networks, resources, applications • Stop internal and external attacks • Patrol zone and edge boundaries • Control information access and usage www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. 8
  9. 9. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. SEGMENTATION www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Firewall Segmentation Context Aware Segmentation Fabric Segmentation Network Segmentation 9
  10. 10. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. THREAT CONTROL 10
  11. 11. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Device DeviceDevice Thousands of network elements Multi-vendor technologies Collect data Tens of incidents, problems, and issues Analyze and correlate data Millions of traps, syslogs, events Aggregate data Few root causes Isolate, resolve, restore, and optimize the network VISIBILITY 11
  12. 12. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES • Detect, understand, and block • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process Evolving Threats Security Operations Compliance LISTENER POLL www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Are data centers doing enough to train their employees for new security threats in the age of virtualization? Or is there still a lot of room for improvement? 12
  13. 13. HOW TATA COMMUNICATIONS TRANSFORMATION SERVICES CAN HELP CUSTOMERS 13
  14. 14. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Security Consulting SecurityAssessments Managed Security • Regulatory Compliance Assessment • Security Governance Assessment • Technical Security Assessment • Security Monitoring & Management Services • Security Design & Implementation • Solution & Platform Engineering • Security Architecture Review • Security Migration Services • Solution Optimization Services TCTS SECURITY OFFERINGS Transformation methodologies to mitigate cyber security concerns 14
  15. 15. THANK YOU Tatacommunications-ts.com © 2016 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. 15

×