SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Protecting the Software-Defined Data Center
from Data Breach
Mordecai Rosen
Security
CA Technologies
Vice President, Product Management and Strategy
SCT33S
Jeremiah Cornelius
VMware
Security Architect and Partner Product Strategist
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Session Abstract:
Protecting the Software Defined Data Center
from Breach
In this session, we will discuss:
 Security Requirements for our next generation software defined
data centers
 VMware NSX™, VMware’s network virtualization platform, and how
it protects the software defined data center
 CA Privileged Access Manager for VMware NSX™, and how it
protects the management plane of VMware NSX™
Mordecai
Rosen
CA Technologies
VP Product Mgmt.
Jeremiah
Cornelius
VMware
Security Architect
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Existing security layers have been breached
1
5 6
Possibly after months of
reconnaissance, the infiltration
relays secret data to the attacker.
Today’s data centers are protected by
strong perimeter defense…
But threats and exploits still infect servers.
Low-priority systems are often the target, and
SSL is no guarantee of protection.
Targeted
system
Attacks spread inside the data center,
where internal controls are often weak.
Critical systems are targeted.
Attackers follow a predictable pattern
of actions, called a kill chain, in
attempting their attacks.
Compromised identities and privileged
accounts are at the core of the kill chain..
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Problem: 25 years of perimeter security has failed
Internet
Series1 Series2 Series3
Today’s security model
focuses on perimeter defense
But continued security breaches
show this model is not enough
Service
providers
Partners
Auditors
Customers
Hacker
Employees
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Repurposing existing tools doesn’t work
…
2 firewalls
1000 workloads
vs
A typical data center has:
Directing all traffic (virtual + physical)
through chokepoint firewalls is inefficient
And a physical firewall per workload
is cost prohibitive and unmanageable
Internet
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The Solution: New software defined data center model
Integrating identity, security, & manageability into the fabric
STARTING ASSUMPTIONS DESIGN PRINCIPLES
Assume everything is a threat
and act accordingly
1
2
Identity centric micro-segmentation
Secure policy based management plane
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
How do you:
move as fast as the business needs you to move
while securing an ever-growing and changing environment—
without having to start over?
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
You need a new approach to networking
and security that gives you:
the agility and speed you need to support the business, while
providing an inherently more secure infrastructure
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Security is needed everywhere, but we can’t have our
controls everywhere
Why can’t we have individual firewalls for every VM?
Data Center
Perimeter
Internet
Expensive and complex
Physical firewalls
With traditional technology,
this is operationally infeasible.
Slow, costly, and complicated
Virtual firewalls
NSX value proposition
Network Virtualization is at
the core of an SDDC
approach
Network, storage, compute
Virtualization layer
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The next-generation networking model
Switching
Routing
Firewalling/ACLs
Load Balancing
Network and security services
now in the hypervisor
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Switching
Routing
Firewalling/ACLs
Load Balancing
High throughput rates
East-west firewalling
Native platform capability
The next-generation networking model
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
The next-generation networking model
NSX value proposition
Network Virtualization is at
the core of an SDDC
approach
Network, storage, compute
Virtualization layer
“Network hypervisor”
Virtual networks
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Business value
More secure and 1/3 the cost of
less secure infrastructure
Security
Delivering inherently secure infrastructure
Data Center Perimeter
Internet
DMZ
Secure User
Environments
Security policies simplified
Logical groups enabled
Threats contained
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Intelligent grouping
Groups defined by customized criteria
Operating System Machine Name
Application Tier
Services
Security PostureRegulatory
Requirements
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
NSX: at the “Goldilocks Zone” of security
UbiquityIsolation Context
Ecosystem of
Distributed Services
Core Services Built Into
Hypervisor Kernel
better security
through insight
fine-grained containment
Switching Routing Firewalling
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
VMware Partners with CA for Privileged Access
Management
1
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Technologies Announce CA Privileged Access
Manager for VMware NSX
CA Technologies Collaborates with VMware®
on Comprehensive Privileged Access Management
Solution for VMware NSX
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Privileged Access Manager
Privileged Identity and Access Management for the Hybrid Enterprise
HYBRID ENTERPRISE
Hardware Appliance AWS AMIOVF Virtual Appliance
Identity Integration Enterprise-Class Core
 Vault Credentials
 Centralized Authentication
 Federated Identity
 Privileged Single Sign-on
 Role-Based Access Control
 Monitor and Enforce Policy
 Record Sessions and Metadata
 Full Attribution
Control and Audit All Privileged Access
Unified Policy Management
Traditional Data Center
Mainframe, Windows, Linux, Unix, Networking
Enterprise Admin Tools
Software Defined Data Center
SDDC Console and APIs
Public Cloud - IaaS
Cloud Console and APIs
SaaS Applications
SaaS Consoles and APIs
CA Privileged Access Manager
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Privileged Access Manager
Privileged Identity and Access Management for the Hybrid Enterprise
HYBRID ENTERPRISE
Hardware Appliance AWS AMIOVF Virtual Appliance
Identity Integration Enterprise-Class Core
 Vault Credentials
 Centralized Authentication
 Federated Identity
 Privileged Single Sign-on
 Role-Based Access Control
 Monitor and Enforce Policy
 Record Sessions and Metadata
 Full Attribution
A New Security Layer - Control and Audit All Privileged Access
Unified Policy Management
Traditional Data Center
Mainframe, Windows, Linux, Unix, Networking
Enterprise Admin Tools
Software Defined Data Center
SDDC Console and APIs
Public Cloud - IaaS
Cloud Console and APIs
SaaS Applications
SaaS Consoles and APIs
CA Privileged Access Manager
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Challenges
Fully manual process with
potential for human error.
No visibility into what the
admin did during the session.
An overly broad rule permits
bad actors.
Problem
You have a requirement that all
management ports on
production resources be closed
when not in use, and you must
demonstrate this to an auditor
on-demand.
Traditional Solution
Admin opens a ticket with SOC
who adds a firewall rule which
permits the admin to do their
work.
When admin is done he
resolves the ticket, SOC
removes the rule, then closes
the ticket.
Use Case 1: Firewall Administration
Addressing a traditional problem with a more secure and agile solution
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA PAM for VMware NSX – Access Restrictor
DFW Rules added and removed on-demand
 Rules added when connections are opened and removed when closed
 Removes the human element and potential for error
 Enables a highly-secure “deny all” environment where exceptions are forced through CA
PAM and only CA PAM may access protected resources
Automatic, runtime, ephemeral Distributed Firewall Rules maintained by CA PAM
Client
User
Target VM
NSX Manager
DFWCA Privileged
Access Manager
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Challenges
In the manual case, more
human error and opportunity
for insider threat.
In the custom code case you
must hire somebody to write it
and keep code it up to date.
Problem
You want to synchronize your
security policies across
products from different
vendors.
For example, when your A/V
vendor detects a virus, you
want the VM placed into a
quarantine.
Traditional Solution
Hire somebody to keep them in
sync, or write custom code to
keep them in sync by
leveraging different APIs from
different vendors.
Use Case 2: Policy Synchronization
Different products, different data, and different policy models
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA PAM for VMware NSX – Dynamic Tagging and Grouping
CA PAM Policy in lockstep with NSX Security Tags and Groups
 NSX Security Tags and Groups synced with CA PAM and tied to Policies
 As VMs enter/leave NSX Security Groups, CA PAM Access is provisioned/removed
Synchronize CA PAM policies with changes in the NSX security posture
VMware vCenter
VM Network
NSX Manager
Sync
CA Privileged
Access Manager
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Challenges
Seeing a trend? This too relies
on a manual step – and if your
SOC is distracted, suffering
“false positive fatigue,” or
malicious, you miss a critical
opportunity to break the kill
chain.
Problem
When your security products
detect anomalies, you want
them to coordinate with other
products.
For example, when threat intel
detects an event, you want it
to terminate or begin recording
all traffic on affected VMs.
Traditional Solution
Have your SOC monitor logs
and SEIM data and take action
manually.
Use Case 3: Workflow Automation
Making different products from different vendors talk to each other
27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA PAM for VMware NSX – Service Composer Integration
Deep integration with Service Composer
 As VMs enter or leave NSX Security Groups, CA PAM will:
- Enable or disable session recording
- Terminate sessions
- Force CA PAM session re-authentication
Trigger events in CA PAM via NSX Service Composer workflows
User
Session
NSX Partner
Ecosystem
Product
NSX Manager
Vmware
vCenter
Admin
Apply Tag
Apply Tag
Enable/Disable Session Recording
Terminate Sessions
Xsuite Re-Authentication
CA Privileged
Access Manager
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Challenges
API access is like leaving the
back door open – no matter
how many controls you have
on the front door, if you don’t
protect the API you expose a
very attractive target.
Credentials within scripts are
the ultimate target.
Problem
You have a plethora of scripts
and power users who interact
with management tools via
well-defined APIs, and you lack
any controls into who uses
them and visibility into what
they do.
Traditional Solution
Attempt to limit API sprawl and
hope that the users and scripts
that are using these interfaces
are trusted and kind.
Use Case 4: Programmatic/API Access
Controls for your APIs
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA PAM for VMware NSX – NSX Manager REST API Proxy
The last mile for full NSX Manager administration visibility
 Users and scripts talk to the Proxy, not to NSX Manager, with different credentials, which
may rotate on a policy or schedule
 CA PAM vaults – and rotates – the NSX Manager credentials
 Integrates with Application to Application (A2A)
Closing the “API Loop” to the NSX management plane
Consumer NSX Manager
NAP
NSX Manager API Proxy
Logs A2A Requests Change Password
Z-side Request/ResponseA-side Request/Response
CA Privileged
Access Manager
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Privileged Access Manager for VMware NSX
Capability Summary
 Vaulting and full lifecycle management of passwords and SSH access keys
 NSX-based resources, NSX Manager and API, other enterprise resources
Credentials
Management
 TACACS+, AD/LDAP, RADIUS, RSA, SMS Mobile Token, SAML, PIV/CAC
 VMware vSphere®, NSX APIs, VMware® NSX Manager™, other
physical/virtual resources across enterprise
Federated SSO
 Integrated with NSX Manager; Service Composer service insertion
 Dynamic application of access control policies based on NSX security policies
 Enforced via NSX micro-segmentation
Access Policy
Enforcement
 Complete logs and full session recording
 All access to NSX resources including NSX Manager and API
Audit Trail &
Session Recording
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Customer
Testimonial
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Conclusions and Recommendations
• Existing security layers have been breached
• Next generation Software Defined Data Centers models like VMware NSX are inherently more secure
• Protecting the management plane of the hybrid enterprise is required to break the data breach kill chain
• Security has now become a business enabler versus an operational cost or tax
Summary
A Few Words to Review
34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCT19T
Defend Against Data Breaches With CA Privileged Access
Management
11/18/2015 at 3:00 pm
SCT07S Roadmap: Privileged Identity Management 11/19/15 at 4:30 pm
SCT32T
Privileged Access Management for the Software-Defined
Network
11/19/2015 at 11:30 am
35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Positive Privileged
User Authentication
CA Privileged Access
Manager
Security Theater
Fine-Grained Access
Control for Servers
CA Privileged Access
Manager Server
Control
Security Theater
Privileged Access
Control
CA Privileged Access
Manager
Security Theater
Record and Analyze
User Sessions
CA Privileged Access
Manager
Security Theater
36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow On Conversations At…
Smart Bar
CA Privileged Access
Manager
Theater # location
Tech Talks
PAM for the
Software-Defined
Network
SCT32T
37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

Más contenido relacionado

La actualidad más candente

Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...CA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...CA Technologies
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsCA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...CA Technologies
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring BattlesCA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCA Technologies
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCA Technologies
 
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...CA Technologies
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...CA Technologies
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI CA Technologies
 

La actualidad más candente (20)

Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Business Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIsBusiness Transformation: Reframing Strategic Advantage through APIs
Business Transformation: Reframing Strategic Advantage through APIs
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
Technology Primer: New Cloud Monitoring Capabilities in CA Unified Infrastruc...
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team GameCase Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
Case Study: Marsh and McLennan Wins Big in ITSM by Playing a Team Game
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service Virtualization
 
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
 
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
Mainframe Software Management: Get the Scoop on New Architecture and Modern UI
 

Destacado

Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerCA Technologies
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesCA Technologies
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterAlgoSec
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerCloudPassage
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
VMware SDDC on IBM SoftLayer Cloud
VMware SDDC on IBM SoftLayer CloudVMware SDDC on IBM SoftLayer Cloud
VMware SDDC on IBM SoftLayer Cloudwatarukatsurashima
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Secure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudSecure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudRoger Xia
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4CA Technologies
 
SDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamSDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamJason Lackey
 
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...DialogueScience
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?BeyondTrust
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware
 
Control the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the WorkloadControl the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the Workloadaregnerus
 

Destacado (20)

Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
Simplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data CenterSimplifying Security Management in the Virtual Data Center
Simplifying Security Management in the Virtual Data Center
 
Transforming the CSO Role to Business Enabler
Transforming the CSO Role to Business EnablerTransforming the CSO Role to Business Enabler
Transforming the CSO Role to Business Enabler
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
VMware SDDC on IBM SoftLayer Cloud
VMware SDDC on IBM SoftLayer CloudVMware SDDC on IBM SoftLayer Cloud
VMware SDDC on IBM SoftLayer Cloud
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Secure Multi Tenancy In the Cloud
Secure Multi Tenancy In the CloudSecure Multi Tenancy In the Cloud
Secure Multi Tenancy In the Cloud
 
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
 
SDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes MainstreamSDDC Study: SDDC Goes Mainstream
SDDC Study: SDDC Goes Mainstream
 
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...
CYBERARK - ЗАЩИТА ПРИВИЛЕГИРОВАННЫХ УЧЕТНЫХ ЗАПИСЕЙ ОТ ВНУТРЕННИХ И ВНЕШНИХ К...
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
Outcome of democracy
Outcome of democracyOutcome of democracy
Outcome of democracy
 
VMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the CloudVMware Outlines Its Own Journey to the Cloud
VMware Outlines Its Own Journey to the Cloud
 
Control the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the WorkloadControl the Creep: Streamline Security and Compliance by Sharing the Workload
Control the Creep: Streamline Security and Compliance by Sharing the Workload
 

Similar a Protecting the Software-Defined Data Center from Data Breach

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementCA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCA Technologies
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...CA Technologies
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)CA Technologies
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...CA Technologies
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...CA Technologies
 

Similar a Protecting the Software-Defined Data Center from Data Breach (20)

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session ManagementTech Talk: Preventing Data Breaches with Risk-Aware Session Management
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OSCastle Walls Under Digital Siege: Risk-based Security for z/OS
Castle Walls Under Digital Siege: Risk-based Security for z/OS
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
Tech Talk: Harness the Power of Innovations Like Microservice Architecture an...
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
Tech Talk: Introduction to SDN/NFV Assurance (CA Virtual Network Assurance)
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
Protect Against Security Breaches by Securing Endpoints with Multi-Factor Aut...
 
Clouds And Security
Clouds And SecurityClouds And Security
Clouds And Security
 

Más de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Más de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Protecting the Software-Defined Data Center from Data Breach

  • 1. Protecting the Software-Defined Data Center from Data Breach Mordecai Rosen Security CA Technologies Vice President, Product Management and Strategy SCT33S Jeremiah Cornelius VMware Security Architect and Partner Product Strategist
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Session Abstract: Protecting the Software Defined Data Center from Breach In this session, we will discuss:  Security Requirements for our next generation software defined data centers  VMware NSX™, VMware’s network virtualization platform, and how it protects the software defined data center  CA Privileged Access Manager for VMware NSX™, and how it protects the management plane of VMware NSX™ Mordecai Rosen CA Technologies VP Product Mgmt. Jeremiah Cornelius VMware Security Architect
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Existing security layers have been breached 1 5 6 Possibly after months of reconnaissance, the infiltration relays secret data to the attacker. Today’s data centers are protected by strong perimeter defense… But threats and exploits still infect servers. Low-priority systems are often the target, and SSL is no guarantee of protection. Targeted system Attacks spread inside the data center, where internal controls are often weak. Critical systems are targeted. Attackers follow a predictable pattern of actions, called a kill chain, in attempting their attacks. Compromised identities and privileged accounts are at the core of the kill chain..
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Problem: 25 years of perimeter security has failed Internet Series1 Series2 Series3 Today’s security model focuses on perimeter defense But continued security breaches show this model is not enough Service providers Partners Auditors Customers Hacker Employees
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Repurposing existing tools doesn’t work … 2 firewalls 1000 workloads vs A typical data center has: Directing all traffic (virtual + physical) through chokepoint firewalls is inefficient And a physical firewall per workload is cost prohibitive and unmanageable Internet
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The Solution: New software defined data center model Integrating identity, security, & manageability into the fabric STARTING ASSUMPTIONS DESIGN PRINCIPLES Assume everything is a threat and act accordingly 1 2 Identity centric micro-segmentation Secure policy based management plane
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD How do you: move as fast as the business needs you to move while securing an ever-growing and changing environment— without having to start over?
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD You need a new approach to networking and security that gives you: the agility and speed you need to support the business, while providing an inherently more secure infrastructure
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security is needed everywhere, but we can’t have our controls everywhere Why can’t we have individual firewalls for every VM? Data Center Perimeter Internet Expensive and complex Physical firewalls With traditional technology, this is operationally infeasible. Slow, costly, and complicated Virtual firewalls
  • 11. NSX value proposition Network Virtualization is at the core of an SDDC approach Network, storage, compute Virtualization layer
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The next-generation networking model Switching Routing Firewalling/ACLs Load Balancing Network and security services now in the hypervisor
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Switching Routing Firewalling/ACLs Load Balancing High throughput rates East-west firewalling Native platform capability The next-generation networking model
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD The next-generation networking model NSX value proposition Network Virtualization is at the core of an SDDC approach Network, storage, compute Virtualization layer “Network hypervisor” Virtual networks
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Business value More secure and 1/3 the cost of less secure infrastructure Security Delivering inherently secure infrastructure Data Center Perimeter Internet DMZ Secure User Environments Security policies simplified Logical groups enabled Threats contained
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Intelligent grouping Groups defined by customized criteria Operating System Machine Name Application Tier Services Security PostureRegulatory Requirements
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD NSX: at the “Goldilocks Zone” of security UbiquityIsolation Context Ecosystem of Distributed Services Core Services Built Into Hypervisor Kernel better security through insight fine-grained containment Switching Routing Firewalling
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD VMware Partners with CA for Privileged Access Management 1
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Technologies Announce CA Privileged Access Manager for VMware NSX CA Technologies Collaborates with VMware® on Comprehensive Privileged Access Management Solution for VMware NSX
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Privileged Access Manager Privileged Identity and Access Management for the Hybrid Enterprise HYBRID ENTERPRISE Hardware Appliance AWS AMIOVF Virtual Appliance Identity Integration Enterprise-Class Core  Vault Credentials  Centralized Authentication  Federated Identity  Privileged Single Sign-on  Role-Based Access Control  Monitor and Enforce Policy  Record Sessions and Metadata  Full Attribution Control and Audit All Privileged Access Unified Policy Management Traditional Data Center Mainframe, Windows, Linux, Unix, Networking Enterprise Admin Tools Software Defined Data Center SDDC Console and APIs Public Cloud - IaaS Cloud Console and APIs SaaS Applications SaaS Consoles and APIs CA Privileged Access Manager
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Privileged Access Manager Privileged Identity and Access Management for the Hybrid Enterprise HYBRID ENTERPRISE Hardware Appliance AWS AMIOVF Virtual Appliance Identity Integration Enterprise-Class Core  Vault Credentials  Centralized Authentication  Federated Identity  Privileged Single Sign-on  Role-Based Access Control  Monitor and Enforce Policy  Record Sessions and Metadata  Full Attribution A New Security Layer - Control and Audit All Privileged Access Unified Policy Management Traditional Data Center Mainframe, Windows, Linux, Unix, Networking Enterprise Admin Tools Software Defined Data Center SDDC Console and APIs Public Cloud - IaaS Cloud Console and APIs SaaS Applications SaaS Consoles and APIs CA Privileged Access Manager
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Challenges Fully manual process with potential for human error. No visibility into what the admin did during the session. An overly broad rule permits bad actors. Problem You have a requirement that all management ports on production resources be closed when not in use, and you must demonstrate this to an auditor on-demand. Traditional Solution Admin opens a ticket with SOC who adds a firewall rule which permits the admin to do their work. When admin is done he resolves the ticket, SOC removes the rule, then closes the ticket. Use Case 1: Firewall Administration Addressing a traditional problem with a more secure and agile solution
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA PAM for VMware NSX – Access Restrictor DFW Rules added and removed on-demand  Rules added when connections are opened and removed when closed  Removes the human element and potential for error  Enables a highly-secure “deny all” environment where exceptions are forced through CA PAM and only CA PAM may access protected resources Automatic, runtime, ephemeral Distributed Firewall Rules maintained by CA PAM Client User Target VM NSX Manager DFWCA Privileged Access Manager
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Challenges In the manual case, more human error and opportunity for insider threat. In the custom code case you must hire somebody to write it and keep code it up to date. Problem You want to synchronize your security policies across products from different vendors. For example, when your A/V vendor detects a virus, you want the VM placed into a quarantine. Traditional Solution Hire somebody to keep them in sync, or write custom code to keep them in sync by leveraging different APIs from different vendors. Use Case 2: Policy Synchronization Different products, different data, and different policy models
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA PAM for VMware NSX – Dynamic Tagging and Grouping CA PAM Policy in lockstep with NSX Security Tags and Groups  NSX Security Tags and Groups synced with CA PAM and tied to Policies  As VMs enter/leave NSX Security Groups, CA PAM Access is provisioned/removed Synchronize CA PAM policies with changes in the NSX security posture VMware vCenter VM Network NSX Manager Sync CA Privileged Access Manager
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Challenges Seeing a trend? This too relies on a manual step – and if your SOC is distracted, suffering “false positive fatigue,” or malicious, you miss a critical opportunity to break the kill chain. Problem When your security products detect anomalies, you want them to coordinate with other products. For example, when threat intel detects an event, you want it to terminate or begin recording all traffic on affected VMs. Traditional Solution Have your SOC monitor logs and SEIM data and take action manually. Use Case 3: Workflow Automation Making different products from different vendors talk to each other
  • 27. 27 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA PAM for VMware NSX – Service Composer Integration Deep integration with Service Composer  As VMs enter or leave NSX Security Groups, CA PAM will: - Enable or disable session recording - Terminate sessions - Force CA PAM session re-authentication Trigger events in CA PAM via NSX Service Composer workflows User Session NSX Partner Ecosystem Product NSX Manager Vmware vCenter Admin Apply Tag Apply Tag Enable/Disable Session Recording Terminate Sessions Xsuite Re-Authentication CA Privileged Access Manager
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Challenges API access is like leaving the back door open – no matter how many controls you have on the front door, if you don’t protect the API you expose a very attractive target. Credentials within scripts are the ultimate target. Problem You have a plethora of scripts and power users who interact with management tools via well-defined APIs, and you lack any controls into who uses them and visibility into what they do. Traditional Solution Attempt to limit API sprawl and hope that the users and scripts that are using these interfaces are trusted and kind. Use Case 4: Programmatic/API Access Controls for your APIs
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA PAM for VMware NSX – NSX Manager REST API Proxy The last mile for full NSX Manager administration visibility  Users and scripts talk to the Proxy, not to NSX Manager, with different credentials, which may rotate on a policy or schedule  CA PAM vaults – and rotates – the NSX Manager credentials  Integrates with Application to Application (A2A) Closing the “API Loop” to the NSX management plane Consumer NSX Manager NAP NSX Manager API Proxy Logs A2A Requests Change Password Z-side Request/ResponseA-side Request/Response CA Privileged Access Manager
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Privileged Access Manager for VMware NSX Capability Summary  Vaulting and full lifecycle management of passwords and SSH access keys  NSX-based resources, NSX Manager and API, other enterprise resources Credentials Management  TACACS+, AD/LDAP, RADIUS, RSA, SMS Mobile Token, SAML, PIV/CAC  VMware vSphere®, NSX APIs, VMware® NSX Manager™, other physical/virtual resources across enterprise Federated SSO  Integrated with NSX Manager; Service Composer service insertion  Dynamic application of access control policies based on NSX security policies  Enforced via NSX micro-segmentation Access Policy Enforcement  Complete logs and full session recording  All access to NSX resources including NSX Manager and API Audit Trail & Session Recording
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Customer Testimonial
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 33. 33 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Conclusions and Recommendations • Existing security layers have been breached • Next generation Software Defined Data Centers models like VMware NSX are inherently more secure • Protecting the management plane of the hybrid enterprise is required to break the data breach kill chain • Security has now become a business enabler versus an operational cost or tax Summary A Few Words to Review
  • 34. 34 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCT19T Defend Against Data Breaches With CA Privileged Access Management 11/18/2015 at 3:00 pm SCT07S Roadmap: Privileged Identity Management 11/19/15 at 4:30 pm SCT32T Privileged Access Management for the Software-Defined Network 11/19/2015 at 11:30 am
  • 35. 35 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Positive Privileged User Authentication CA Privileged Access Manager Security Theater Fine-Grained Access Control for Servers CA Privileged Access Manager Server Control Security Theater Privileged Access Control CA Privileged Access Manager Security Theater Record and Analyze User Sessions CA Privileged Access Manager Security Theater
  • 36. 36 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow On Conversations At… Smart Bar CA Privileged Access Manager Theater # location Tech Talks PAM for the Software-Defined Network SCT32T
  • 37. 37 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 38. 38 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15