(SEC321) Implementing Policy, Governance & Security for Enterprises

Amazon Web Services
Amazon Web ServicesAmazon Web Services
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Kyle Falkenhagen, CSC
Erik Winebrenner, CSC
October 2015
SEC321
AWS for the Enterprise
Implementing Policy, Governance, and
Security for Enterprise Workloads
What to Expect from the Session
• Demonstrate enterprise policy, governance, and security capabilities
that support the deployment and management of enterprise and
industry applications on AWS using CSC’s Agility Platform
• Demonstrate the value of blueprinting enterprise applications and
environments
• Demonstrate secure and managed connectivity to AWS
• Present how CSC provides agile and consumption-based endpoint
security for workloads in AWS providing enterprise management and
24x7 monitoring of workload compliance, vulnerabilities, and potential
threats
The Market Is Embracing an Application-Centric, Hybrid Cloud Model
Business execs demand greater IT
agility and innovation
This is fostering greater adoption of
hybrid cloud models
71% say their
organizations need to
embrace new technology or
lose market share
47% of businesses
are making technology and
cloud decisions without getting
the IT department involved
… and sidestepping enterprise governance
controls when central IT doesn’t deliver
… and a shift to cloud platforms and
apps, not just infrastructure
Projected allocation of cloud spend
2013 – 2015
Hybrid
43% Private
25%Public
32%
Forward-Thinking IT Organizations Are Adopting Hybrid Cloud Operating
Models to Provide IT as a Service
Virtualize Automation Hybrid Clouds IT as a Service
Improve
asset
utilization and
ROI
Defer data
center build-
outs
Launch initial
private cloud
Self-service access
and on-demand
provisioning
Policy-driven
cloud
governance
Compressed
SDLC and tool
chain
automation
IaaS and PaaS
standardization
Fully
transparent and
auditable
service usage
Broadly adopt utility
cost model with
chargeback
Redundant service
options with low
switching costs
Optimize
variable-to-
fixed costs by
project
Transparent linkage
of demand,
capacity, and costs
• Accelerate AWS benefits to the enterprise, while ensuring compliance with IT
standards, governance, and security requirements
• Expand cloud service portfolios to enterprise platforms and apps (not just
IaaS), available on a self-service, on-demand basis directly to the end users that
need them
• Rapidly obtain the benefits of hybrid environments using a pay-as-you-go OPEX
model and CSC managed services, rather than attempt to build internally with scarce
skills/capital
+Amazon is the undisputed public
cloud market share leader and is
innovating faster than anyone else in
public cloud.
CSC has the market-leading cloud
management and orchestration platform
and strong expertise in enterprise
application migration to cloud.
CSC Enterprise Cloud Services For AWS
The AWS and CSC Partnership
INCLUDED:
BizCloud
BizCloud HC
INCLUDED:
Public
Clouds
Private
Clouds
Dev Test Prod
IaaS
Platforms
Apps
Store SDLC Tools
CSC Agility Platform as a Service For AWS
Manage/Govern Enterprise IT Services Across Hybrid Environments
• Pay-as-you-go model
• CSC Agility Platform provided as-a-Service
• CSC-managed services including
consolidated billing, helpdesk, and OS-
level services
• Integrated hybrid cyber-security model
• Extensible policy engine for cloud
governance
• Cloud-portable blueprints for applications
and platforms
• Additional public and private cloud
adapters available
CLOUD-PORTABLE
BLUEPRINTS
POLICY-DRIVEN
GOVERNANCE
APPLICATION RELEASE
AUTOMATION (ARA)
Put platforms and apps in
“cloud-portable blueprints.”
Embed IT standards
Use policies to automate
governance/compliance,
right sizing, right placement, etc.
Consume cloud IT services
not just from storefronts, but
directly from SDLC tooling
Accelerating Benefits Using CSC Agility Platform
Others…
BroadCloud
Support
CSC
CSC Managed Hybrid Cloud Service
The CSC Managed Hybrid Cloud service provides secure dedicated access between on-premises
infrastructure and the AWS Cloud. IT organizations easily migrate workloads and take advantage of cost
savings when allocating resources for dynamic projects. The CSC Managed Hybrid Cloud service
integrates technology from AWS, Brocade, AT&T, and Intel:
• AWS: Customers use AWS DirectConnect to establish private connectivity between AWS and data
centers, offices, or colocation environments.
• Brocade vRouter and the Brocade vADC: Provides additional secure access, reliability, advanced
networking, and application performance across on-premises infrastructure into an AWS VPC using
IPsec, vRouting, and application load balancing. Brocade leverages Data Plane Development Kit
(DPDK) to deliver performance, boosting packet processing and throughput.
• AT&T Netbond: Allows direct provisioning of 1G and 10G high-speed connections to an AWS VPC
within the AWS cloud infrastructure and global availability zones.
• Intel® Xeon® E5 processor: Enables Amazon EC2 to increase networking capabilities.
CSC Hybrid Cloud Service – A Cloud
Networking Strategy Foundation
• Low-latency, on-net, fully
redundant
• Any-to-any, instant-on
connectivity
• Eliminate data center hairpin
PERFORMANCE
• Private IP address space avoids
Internet/DDoS threats
SECURITY
• API controlled for on-demand
adds and bandwidth changes
AGILITY
• Scales dynamically with cloud
usage; elasticity creates added
pricing value
ELASTICITY
• Save as much as 60% on
networking
• Cost model aligns with cloud
usage
COST-EFFECTIVENESS
A network-enabled cloud solution with performance and security
Big Data Platform as a Service
APP 3
Flexible Deployment
OptionsPublic
Cloud
Virtual
Private Cloud
Dedicated
Cluster
Enterprise
Private Cloud
CSC Big Data Platform as a Service
APP 1
APP 2
REAL
TIMEBATCH
AD HOC
Fully Managed as a Service
Comprehensive, proactive infrastructure, and software
management eliminates the most frustrating reason open source
big data solutions fail: operational complexity.
Big Data Expertise and Experience
We have been working with Hadoop, Cassandra, and Mongo since
2011 and have implemented and managed more than 150 big data
clusters.
The Only PCI & HIPAA Compliance Certified SI Solution
CSC is the first and only solutions integrator to meet stringent PCI
and HIPAA certification standards with an open big data solution.
Integrated Audit Monitoring and Comprehensive Security
Every solution has comprehensive security activity and audit
capabilities out of the box, and can be fully configured with the
latest security features, from infrastructure to application.
Real-Time, Streaming, and In-Memory Capabilities
We have the broadest set of capabilities in the market, including
deep expertise in installing, managing, and developing big and fast
data analytics.
Demo
CSC Cybersecurity
On-Demand Workload Protection
Powered by CloudPassage
Top Challenges Facing Cloud Customers:
Why Should CSC’s Customers Care?
• Increased scrutiny and responsibility following
high-profile cloud breaches
• New regulatory demands to better protect
cloud-hosted data
• Existing regulations increasingly applied to cloud
environments
• Require consistent security across workloads in
an agile environment
• Increased criminal attention on cloud assets due
to their increased adoption
• Greater threat to intellectual property as
enterprises host off-premises
• “Need to protect my cloud workloads at same
level as my traditional systems”
• Costs growing as internal IT security
infrastructure expands
• Expanding skilled resources required to manage
security of cloud assets
OPERATIONS
ADVANCED
THREATS
RISK AND COMPLIANCE
NEXT-GEN TECHNOLOGIES
• Require visibility of all assets, regardless of
location or cloud provider
• Cloud expected to be cheaper than traditional —
in reality, security bogs down cost, eliminates
savings
• Growing risk exposure as virtual workloads
increase
SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Client Cost Implications in As-Is Model
Cost of traditional cybersecurity solution relative to overall workload cost
COST OF SECURITY
IS OVERWHELMING
PAY 100%
REGARDLESS OF USAGE
PAY FOR MULTIPLE
SECURITY CONTROLS
Self-Managed Cloud Workload Security
Company A
Public
Private
HR Payroll
HIPAA
Big Data Germany
Production
Dev/Test
Production PCI
Amazon Web Services
Traditional IT
Endpoint
Security
SIEM
Vuln.
Scanning
Payroll
HR
HIPAASales
Dev/Test
Managed
Workloads
Rogue
Systems
Security
Policies
CSC Cloud Security Services
On-Demand Workload Protection—Powered by CloudPassage
Security Information and Event Management (SIEM)
Pulse Advanced Reporting
Policy Creation, Configuration, and Management
Email-Based Alerting
Account Setup and Management
Complete Management of Cloud Workload Security
Monitored
(Optional)
Consulting
(Optional)
Managed
CSC CLOUD SECURITY SERVICES
Configuration
Security Monitoring
Software
Vulnerability
Assessment
Log-Based Intrusion
Detection
Workload Firewall
Management
System Account
Management
File Integrity
Monitoring
Meet All Critical Control Objectives
Gain visibility into enterprise and individual asset security posture
Uncover and manage vulnerabilities and configuration issues
Get immediate reports showing open issues against CIS benchmarks
Do this across an entire account or department, or by type of system
Data Protection
Compromise
Management
Operational
Automation
Visibility
Strong Access
Control
Vulnerability
Management
Ultra-
lightweight
SaaS Based
Workload-Level
Security
Micro-
segmentation
Instant On
BENEFITS
FEATURES
Consumption-Based Pricing Lowers Operating Costs
Cost of traditional cybersecurity solution relative to overall workload cost
SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
SUN MON TUE WED THU FRI SAT
On-Demand Workload
Protection (3 days)
OFF OFF OFF
PROTECT PROTECT PROTECT
OFF
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
Cost of On-Demand Workload Protection (OWP)
ConsolidationbyOWP
CSC-Managed Cloud Workload Security with OWP
CSC Proprietary Pulse
Portal
Company A
CSC Risk Management Center (RMC)
Managed
Workloads
Rogue
Systems
Security
Policies
Public
Private
PayrollHR
Dev / Test
Germany
PCI
HIPAA
Production
Big Data Nodes
Digital Trust: Your Future State
CSC ON-DEMAND WORKLOAD
PROTECTION
Reduce cost and complexity
Enable secure adoption of
virtual technologies
Evaluate compliance with
regulatory requirements
Provide full visibility across
cloud workloads
Securely harness cloud’s flexibility
and consumption-based model
Monitor and respond to threats
24x7x365
Why CSC for On-Demand Workload Protection
Global scale
Threat intelligence
24x7 Global SOCs
1,000s of experts
CSC named a Leader in IDC MarketScape
Asia/Pacific Managed Security Services 2015
Vendor Assessment
Consumption-based pricing —
not just in technology, but for services
Enterprise-grade management
and scalability
Customer/App/Regulation-specific
policies
24x7x365 SIEM — monitoring
and investigation
Pulse Customer Portal
We Understand Cybersecurity
GLOBAL CYBERSECURITY
PROFESSIONALS
2,000+
INTEGRATED
GLOBAL RISK
MANAGEMENT
CENTERS
5+
YEARS PROVIDING
CYBERSECURITY
SERVICES
35+
GLOBAL ALLIANCE
PARTNERS PROVIDING
SECURITY EXPERTISE
15+
PUBLIC &
PRIVATE
SECTOR
EXPERTISE
Nearly 40 years of experience in delivering
secure, managed enterprise services
Successfully supporting the world’s most security-
conscious clients, including aerospace and
defense, and banking and financial institutions
worldwide
Helping 250+ clients manage risk and overcome
the most extreme threats
Integrated global Risk Management Centers
IT security experts with in-depth experience
End-to-end visibility of customer’s enterprise
governance and compliance posture
UK
Noida
Kuala
Lumpur
Sydney
Newark
CSC Proprietary Pulse Portal
 24x7x365 visibility
 Immediate access to detailed logs and
incident data
 Executive-oriented dashboard
 Performance metrics
 Simple user-querying methods
 Correlation of incident and vulnerability
data to provide enterprise-wide
“Situational Awareness”
EXAMPLE VIEWSPORTAL FEATURES
Thank You!
Stop by the CSC Booth (424)
Remember to complete
your evaluations!
Thank you!
For longer demos please visit the CSC
(Booth 424) on the expo floor
1 de 26

Más contenido relacionado

La actualidad más candente(20)

 Getting Started with Amazon WorkSpaces Getting Started with Amazon WorkSpaces
Getting Started with Amazon WorkSpaces
Amazon Web Services1.1K vistas
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services1.2K vistas
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
Amazon Web Services989 vistas
Being Well Architected in the CloudBeing Well Architected in the Cloud
Being Well Architected in the Cloud
Adrian Hornsby781 vistas
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services813 vistas
The Best of re:invent 2016The Best of re:invent 2016
The Best of re:invent 2016
Amazon Web Services2.8K vistas
Maximizing Business Value as You Migrate to AWSMaximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWS
Amazon Web Services614 vistas
Vancouver keynote - AWS Innovate - Sam ElmalakVancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam Elmalak
Amazon Web Services923 vistas
Build a Serverless Web Application in One DayBuild a Serverless Web Application in One Day
Build a Serverless Web Application in One Day
Amazon Web Services2.5K vistas
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services667 vistas
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
Amazon Web Services1.3K vistas

Destacado(20)

(SEC324) NEW! Introducing Amazon Inspector(SEC324) NEW! Introducing Amazon Inspector
(SEC324) NEW! Introducing Amazon Inspector
Amazon Web Services9K vistas
(BDT402) Delivering Business Agility Using AWS(BDT402) Delivering Business Agility Using AWS
(BDT402) Delivering Business Agility Using AWS
Amazon Web Services1.6K vistas
Mini curso - Ionic FrameworkMini curso - Ionic Framework
Mini curso - Ionic Framework
juniorschroder767 vistas
Introduction to AWS Enterprise SupportIntroduction to AWS Enterprise Support
Introduction to AWS Enterprise Support
Amazon Web Services4.7K vistas
Amazon InspectorAmazon Inspector
Amazon Inspector
Julien SIMON896 vistas
Security architectureSecurity architecture
Security architecture
Duncan Unwin8.9K vistas
Social Media StrategySocial Media Strategy
Social Media Strategy
Justin Kistner651 vistas

Similar a (SEC321) Implementing Policy, Governance & Security for Enterprises

Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
12.8K vistas27 diapositivas

Similar a (SEC321) Implementing Policy, Governance & Security for Enterprises(20)

ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
BabatundeAbioye21 vista
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga2 vistas
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
Chindala Murali384 vistas
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
Anjoum .12.8K vistas
Cloud Computing Cloud Computing
Cloud Computing
MUFIX Community352 vistas
Cloud Migration - CCS Technologies (P) Ltd.Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.
CCS Technologies (P) Ltd.213 vistas
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
Bhavesh Khandelwal1.2K vistas
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
Accenture Italia4.3K vistas
Cloud computing Cloud computing
Cloud computing
ananyaakk2.6K vistas
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud Management
HCLSoftware37 vistas
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
Vikas Sahni801 vistas
CloudCloud
Cloud
Pradeep Chandrasekharan307 vistas

Más de Amazon Web Services(20)

Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services2.8K vistas
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services7K vistas
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services3.1K vistas
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services2.4K vistas
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services1.4K vistas
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services1.4K vistas
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services887 vistas
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services2.7K vistas

(SEC321) Implementing Policy, Governance & Security for Enterprises

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Kyle Falkenhagen, CSC Erik Winebrenner, CSC October 2015 SEC321 AWS for the Enterprise Implementing Policy, Governance, and Security for Enterprise Workloads
  • 2. What to Expect from the Session • Demonstrate enterprise policy, governance, and security capabilities that support the deployment and management of enterprise and industry applications on AWS using CSC’s Agility Platform • Demonstrate the value of blueprinting enterprise applications and environments • Demonstrate secure and managed connectivity to AWS • Present how CSC provides agile and consumption-based endpoint security for workloads in AWS providing enterprise management and 24x7 monitoring of workload compliance, vulnerabilities, and potential threats
  • 3. The Market Is Embracing an Application-Centric, Hybrid Cloud Model Business execs demand greater IT agility and innovation This is fostering greater adoption of hybrid cloud models 71% say their organizations need to embrace new technology or lose market share 47% of businesses are making technology and cloud decisions without getting the IT department involved … and sidestepping enterprise governance controls when central IT doesn’t deliver … and a shift to cloud platforms and apps, not just infrastructure Projected allocation of cloud spend 2013 – 2015 Hybrid 43% Private 25%Public 32%
  • 4. Forward-Thinking IT Organizations Are Adopting Hybrid Cloud Operating Models to Provide IT as a Service Virtualize Automation Hybrid Clouds IT as a Service Improve asset utilization and ROI Defer data center build- outs Launch initial private cloud Self-service access and on-demand provisioning Policy-driven cloud governance Compressed SDLC and tool chain automation IaaS and PaaS standardization Fully transparent and auditable service usage Broadly adopt utility cost model with chargeback Redundant service options with low switching costs Optimize variable-to- fixed costs by project Transparent linkage of demand, capacity, and costs
  • 5. • Accelerate AWS benefits to the enterprise, while ensuring compliance with IT standards, governance, and security requirements • Expand cloud service portfolios to enterprise platforms and apps (not just IaaS), available on a self-service, on-demand basis directly to the end users that need them • Rapidly obtain the benefits of hybrid environments using a pay-as-you-go OPEX model and CSC managed services, rather than attempt to build internally with scarce skills/capital +Amazon is the undisputed public cloud market share leader and is innovating faster than anyone else in public cloud. CSC has the market-leading cloud management and orchestration platform and strong expertise in enterprise application migration to cloud. CSC Enterprise Cloud Services For AWS The AWS and CSC Partnership
  • 6. INCLUDED: BizCloud BizCloud HC INCLUDED: Public Clouds Private Clouds Dev Test Prod IaaS Platforms Apps Store SDLC Tools CSC Agility Platform as a Service For AWS Manage/Govern Enterprise IT Services Across Hybrid Environments • Pay-as-you-go model • CSC Agility Platform provided as-a-Service • CSC-managed services including consolidated billing, helpdesk, and OS- level services • Integrated hybrid cyber-security model • Extensible policy engine for cloud governance • Cloud-portable blueprints for applications and platforms • Additional public and private cloud adapters available
  • 7. CLOUD-PORTABLE BLUEPRINTS POLICY-DRIVEN GOVERNANCE APPLICATION RELEASE AUTOMATION (ARA) Put platforms and apps in “cloud-portable blueprints.” Embed IT standards Use policies to automate governance/compliance, right sizing, right placement, etc. Consume cloud IT services not just from storefronts, but directly from SDLC tooling Accelerating Benefits Using CSC Agility Platform Others… BroadCloud Support CSC
  • 8. CSC Managed Hybrid Cloud Service The CSC Managed Hybrid Cloud service provides secure dedicated access between on-premises infrastructure and the AWS Cloud. IT organizations easily migrate workloads and take advantage of cost savings when allocating resources for dynamic projects. The CSC Managed Hybrid Cloud service integrates technology from AWS, Brocade, AT&T, and Intel: • AWS: Customers use AWS DirectConnect to establish private connectivity between AWS and data centers, offices, or colocation environments. • Brocade vRouter and the Brocade vADC: Provides additional secure access, reliability, advanced networking, and application performance across on-premises infrastructure into an AWS VPC using IPsec, vRouting, and application load balancing. Brocade leverages Data Plane Development Kit (DPDK) to deliver performance, boosting packet processing and throughput. • AT&T Netbond: Allows direct provisioning of 1G and 10G high-speed connections to an AWS VPC within the AWS cloud infrastructure and global availability zones. • Intel® Xeon® E5 processor: Enables Amazon EC2 to increase networking capabilities.
  • 9. CSC Hybrid Cloud Service – A Cloud Networking Strategy Foundation • Low-latency, on-net, fully redundant • Any-to-any, instant-on connectivity • Eliminate data center hairpin PERFORMANCE • Private IP address space avoids Internet/DDoS threats SECURITY • API controlled for on-demand adds and bandwidth changes AGILITY • Scales dynamically with cloud usage; elasticity creates added pricing value ELASTICITY • Save as much as 60% on networking • Cost model aligns with cloud usage COST-EFFECTIVENESS A network-enabled cloud solution with performance and security
  • 10. Big Data Platform as a Service APP 3 Flexible Deployment OptionsPublic Cloud Virtual Private Cloud Dedicated Cluster Enterprise Private Cloud CSC Big Data Platform as a Service APP 1 APP 2 REAL TIMEBATCH AD HOC Fully Managed as a Service Comprehensive, proactive infrastructure, and software management eliminates the most frustrating reason open source big data solutions fail: operational complexity. Big Data Expertise and Experience We have been working with Hadoop, Cassandra, and Mongo since 2011 and have implemented and managed more than 150 big data clusters. The Only PCI & HIPAA Compliance Certified SI Solution CSC is the first and only solutions integrator to meet stringent PCI and HIPAA certification standards with an open big data solution. Integrated Audit Monitoring and Comprehensive Security Every solution has comprehensive security activity and audit capabilities out of the box, and can be fully configured with the latest security features, from infrastructure to application. Real-Time, Streaming, and In-Memory Capabilities We have the broadest set of capabilities in the market, including deep expertise in installing, managing, and developing big and fast data analytics.
  • 11. Demo
  • 12. CSC Cybersecurity On-Demand Workload Protection Powered by CloudPassage
  • 13. Top Challenges Facing Cloud Customers: Why Should CSC’s Customers Care? • Increased scrutiny and responsibility following high-profile cloud breaches • New regulatory demands to better protect cloud-hosted data • Existing regulations increasingly applied to cloud environments • Require consistent security across workloads in an agile environment • Increased criminal attention on cloud assets due to their increased adoption • Greater threat to intellectual property as enterprises host off-premises • “Need to protect my cloud workloads at same level as my traditional systems” • Costs growing as internal IT security infrastructure expands • Expanding skilled resources required to manage security of cloud assets OPERATIONS ADVANCED THREATS RISK AND COMPLIANCE NEXT-GEN TECHNOLOGIES • Require visibility of all assets, regardless of location or cloud provider • Cloud expected to be cheaper than traditional — in reality, security bogs down cost, eliminates savings • Growing risk exposure as virtual workloads increase
  • 14. SUN MON TUE WED THU FRI SAT Hosted Intrusion Detection (HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Vulnerability Mgmt. Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Tech. Compliance (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Client Cost Implications in As-Is Model Cost of traditional cybersecurity solution relative to overall workload cost COST OF SECURITY IS OVERWHELMING PAY 100% REGARDLESS OF USAGE PAY FOR MULTIPLE SECURITY CONTROLS
  • 15. Self-Managed Cloud Workload Security Company A Public Private HR Payroll HIPAA Big Data Germany Production Dev/Test Production PCI Amazon Web Services Traditional IT Endpoint Security SIEM Vuln. Scanning Payroll HR HIPAASales Dev/Test Managed Workloads Rogue Systems Security Policies
  • 16. CSC Cloud Security Services On-Demand Workload Protection—Powered by CloudPassage Security Information and Event Management (SIEM) Pulse Advanced Reporting Policy Creation, Configuration, and Management Email-Based Alerting Account Setup and Management Complete Management of Cloud Workload Security Monitored (Optional) Consulting (Optional) Managed CSC CLOUD SECURITY SERVICES Configuration Security Monitoring Software Vulnerability Assessment Log-Based Intrusion Detection Workload Firewall Management System Account Management File Integrity Monitoring
  • 17. Meet All Critical Control Objectives Gain visibility into enterprise and individual asset security posture Uncover and manage vulnerabilities and configuration issues Get immediate reports showing open issues against CIS benchmarks Do this across an entire account or department, or by type of system Data Protection Compromise Management Operational Automation Visibility Strong Access Control Vulnerability Management Ultra- lightweight SaaS Based Workload-Level Security Micro- segmentation Instant On BENEFITS FEATURES
  • 18. Consumption-Based Pricing Lowers Operating Costs Cost of traditional cybersecurity solution relative to overall workload cost SUN MON TUE WED THU FRI SAT Hosted Intrusion Detection (HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Vulnerability Mgmt. Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Tech. Compliance (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Customer Workload Costs (3 days) OFF OFF OFF WED THU FRI OFF SUN MON TUE WED THU FRI SAT On-Demand Workload Protection (3 days) OFF OFF OFF PROTECT PROTECT PROTECT OFF Customer Workload Costs (3 days) OFF OFF OFF WED THU FRI OFF Cost of On-Demand Workload Protection (OWP) ConsolidationbyOWP
  • 19. CSC-Managed Cloud Workload Security with OWP CSC Proprietary Pulse Portal Company A CSC Risk Management Center (RMC) Managed Workloads Rogue Systems Security Policies Public Private PayrollHR Dev / Test Germany PCI HIPAA Production Big Data Nodes
  • 20. Digital Trust: Your Future State CSC ON-DEMAND WORKLOAD PROTECTION Reduce cost and complexity Enable secure adoption of virtual technologies Evaluate compliance with regulatory requirements Provide full visibility across cloud workloads Securely harness cloud’s flexibility and consumption-based model Monitor and respond to threats 24x7x365
  • 21. Why CSC for On-Demand Workload Protection Global scale Threat intelligence 24x7 Global SOCs 1,000s of experts CSC named a Leader in IDC MarketScape Asia/Pacific Managed Security Services 2015 Vendor Assessment Consumption-based pricing — not just in technology, but for services Enterprise-grade management and scalability Customer/App/Regulation-specific policies 24x7x365 SIEM — monitoring and investigation Pulse Customer Portal
  • 22. We Understand Cybersecurity GLOBAL CYBERSECURITY PROFESSIONALS 2,000+ INTEGRATED GLOBAL RISK MANAGEMENT CENTERS 5+ YEARS PROVIDING CYBERSECURITY SERVICES 35+ GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE 15+ PUBLIC & PRIVATE SECTOR EXPERTISE Nearly 40 years of experience in delivering secure, managed enterprise services Successfully supporting the world’s most security- conscious clients, including aerospace and defense, and banking and financial institutions worldwide Helping 250+ clients manage risk and overcome the most extreme threats Integrated global Risk Management Centers IT security experts with in-depth experience End-to-end visibility of customer’s enterprise governance and compliance posture UK Noida Kuala Lumpur Sydney Newark
  • 23. CSC Proprietary Pulse Portal  24x7x365 visibility  Immediate access to detailed logs and incident data  Executive-oriented dashboard  Performance metrics  Simple user-querying methods  Correlation of incident and vulnerability data to provide enterprise-wide “Situational Awareness” EXAMPLE VIEWSPORTAL FEATURES
  • 24. Thank You! Stop by the CSC Booth (424)
  • 26. Thank you! For longer demos please visit the CSC (Booth 424) on the expo floor