SlideShare una empresa de Scribd logo
1 de 24
Webinar: Securing the
Frictionless Enterprise
Welcome
Our Speakers
2
Jason Bloomberg, President of Intellyx & contributor
to Forbes - Presenter
Satyam Tyagi, CTO of Certes Networks - Presenter
Adam Boone, CMO of Certes Networks - Moderator
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
Root of the Hacking Crisis
3
“Trusted”
Network
No encryption
IPsec
HTTPS
SSL#3
Access
Attacks
SSL#4
No encryption
SSL#1
SSL#2
Yippee! Oh no!We digitized everything! We digitized everything!
Yippee!
Yippee!
Oh no!
Oh no!
We can share everything!
Everybody’s
mobile!
We can share everything!
Everybody’s
mobile!
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
The Common Vector
4
“Trusted”
Network
No encryption
IPsec
HTTPS
SSL#3
Access
Attacks
SSL#4
No encryption
SSL#1
SSL#2
Every major data breach in the hacking headlines
has a fundamental architecture exploit in common
Failure of proper segmentation and isolation
of networks and applications
Once a single user or resource was compromised, hackers could move
laterally to the most sensitive applications
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
The New Risk
5
We are only as secure as the least
secure of …
Employees
Partners
Supply chain members
Contractors
… who have app access
Opening applications for sharing
means opening for potential hacking
We put locks on the external doors,
but anyone can go anywhere inside
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
Copyright © 2015, Intellyx, LLC
6
Securing the
Frictionless Enterprise
Jason Bloomberg
President
jason@intellyx.com
@theebizwizard
About Jason Bloomberg
• President of industry analyst firm
Intellyx
• Agile digital transformation thought
leader
• Write for Forbes, several blogs, biweekly
newsletter the Cortex
• Buy my latest book,
The Agile Architecture
Revolution
Copyright © 2015, Intellyx, LLC7
The Frictionless
Enterprise
• Technology extends beyond
the corporate perimeter
• Customers demand high-
performance, end-to-end
capabilities
• Business and technology
ecosystems become central
organizing principle
Copyright © 2015, Intellyx, LLC8
Reducing friction for
borderless enterprises
PhotoCredit:RyAwesomehttps://www.flickr.com/photos/ryawesome/
The Dark Side of the
Frictionless Enterprise
• Sharing applications
means exposing them to
hackers
• Securing systems and data
isn’t enough
• Security for end-to-end
digital applications
requires new approaches
to cybersecurity
Copyright © 2015, Intellyx, LLC9
More open means less secure
PhotoCredit:AbulicMonkeyhttps://www.flickr.com/photos/abulic_monkey/
The Limitations of
Network Segmentation
• There are no more “safe
zones”
• Perimeter security woefully
inadequate
• Network segmentation is part
of the solution
– Leads to fragmented
patchwork
– Doesn’t work well with
borderless apps
– Infrastructure-centric, not
business-centric
Copyright © 2015, Intellyx, LLC10
PhotoCredit:PaulArpshttps://www.flickr.com/photos/slapers/
Anatomy of the Target
Breach
• Attack compromised
credentials of HVAC
contractor
• Hackers moved laterally,
installed malware
• Attack took months,
went undetected
• Stole millions of credit
card numbers
Copyright © 2015, Intellyx, LLC11
PhotoCredit:MikeMozarthttps://www.flickr.com/photos/jeepersmedia/
Firewalls didn’t help
Borderless Enterprises
Require Borderless Security
• Application security must
be decoupled from
network infrastructure
• Secure applications
across clouds, third
party components, etc.
• Threat mitigation
becomes business
concern
– Business establishes
security policies
Copyright © 2015, Intellyx, LLC12
PhotoCredit:MarcMajcherhttps://www.flickr.com/photos/majcher/
Security in a Post-Trust
World
• Can’t trust any network or any
user
• Breaches have already occurred
– How to contain damage
immediately
– Even before you detect & repair it
• Business-centric segmentation
– Cryptographically isolated
– Driven by business policy
Copyright © 2015, Intellyx, LLC13
Software-defined compartmentalization for
the frictionless enterprise
PhotoCredit:LyndsayEssonhttps://www.flickr.com/photos/98198789@N02/
Jason Bloomberg
President, Intellyx
jason@intellyx.com
@theebizwizard
Send email NOW to certes@intellyx.com to
download this presentation
Thank You!
Copyright © 2015, Intellyx, LLC
CryptoFlows
Securing The Frictionless Enterprise
Satyam Tyagi, CTO
CertesNetworks.com
Current State: Industry Response
More of the Same
The Truth is it will never
be Zero
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs 16
“Entry is often extremely quick, as one would
expect when exploiting stolen or weak
passwords. Most often it takes weeks to
discover, and that’s based entirely on when the
criminals want to start cashing in on their
bounty.”
– Verizon DBIR 2014
Security Industry is trying to address this
“Discrepancy” by trying to “reduce this gap”
• Traditional Security
Strong Perimeter: Threat prevention
via firewalls
• Current Generation of Security
Threat Detection and Response: Monitoring and Analysis of signatures,
behavior, sandbox
• Next Generation of Security
Threat Containment: Crypto-Segmentation
• Cryptographic segmentation of sensitive applications
• Role based controlled access
Minimizing breach damage by blocking
lateral movement
Threat Containment: Crypto-Segmentation
CertesNetworks.com
Threats
Contained
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs 17
Principles of Segmentation
• Where do you draw the
lines to segment?
 What is it that you are
segmenting?
 Networks Infrastructure or
Business Applications
• Who is granted access
inside the segments?
 What checks, verification and
criteria are used to allow access?
 Trusted Networks, Trusted
Device serial numbers or User
identity and role
• Who defines the segments
and access policy?
 In or outside the organization,
which teams define policies?
 Field network engineers, service
providers and contractors or
Security officers
18
Internet DMZ LAN WAN
CRM Code Billing
Sales
Engineering
Contractor
Trusted
Network
Trusted
Device
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
CryptoFlow
Role-based Access to App Crypto-Segments
19
Crypto-Segmentation Architecture
Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
CryptoFlows in Action
20Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
• Apps are individually,
cryptographically isolated in
their own crypto-segments
• Users are granted access
based on their roles and
authorization policy
• The Possibility of Lateral
Movement is eliminated
• A compromise of one user
is contained to only what
the user has access to, and
does not spread to
everything
CryptoFlow: Crypto-Segmentation
• Where do you draw the lines to
segment?
 Lines are drawn around business
applications
• Who is granted access inside the
segments?
 Only users with their business role
authorization get access to
applications that they need
• Who defines the segments and
access policy?
 Security officer manages all policies
 Enforcement is with cryptography
(keys)
• Why it succeeds?
 Business centric end to end
security, enforced with strong
cryptography, under control of
security office
21Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
Start: Question the Status Quo
 What are your business-driven security
requirements?
 What happens when they change/evolve?
 Does the current security architecture help
or hinder?
 How does it hold in the BYOD, Mobile,
Cloud?
What happens when a breach takes place?
22Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
How to Apply Crypto-Segmentation
 Make a list of your current applications
 Prioritize most sensitive applications
 Determine which user roles need access
to what
 Crypto-segment along these dimensions
You have to start with business needs and
work backwards towards security, and not let
security infrastructure deficiencies force
business practices.
23Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
CLICK TO EDIT MASTER
TITLE STYLE
Thank you!
The white paper and slides will be
emailed to you within 24 hours.
Watch CryptoFlow Solutions in Action:
https://youtu.be/RUIWhTgCNCs

Más contenido relacionado

La actualidad más candente

Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxAccuKnox
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeCore Security
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!centralohioissa
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to PracticeAlgoSec
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?centralohioissa
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Cristian Garcia G.
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
 

La actualidad más candente (20)

Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnoxZero Trust Run-time Kubernetes Security made easy with AccuKnox
Zero Trust Run-time Kubernetes Security made easy with AccuKnox
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 

Similar a Certes webinar securing the frictionless enterprise

Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021lior mazor
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Michele Chubirka
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopMichele Chubirka
 
Zero Trust Best Practices for Kubernetes
Zero Trust Best Practices for KubernetesZero Trust Best Practices for Kubernetes
Zero Trust Best Practices for KubernetesNGINX, Inc.
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to RealityPriyanka Aash
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 

Similar a Certes webinar securing the frictionless enterprise (20)

Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021Application security meetup k8_s security with zero trust_29072021
Application security meetup k8_s security with zero trust_29072021
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Zero Trust Best Practices for Kubernetes
Zero Trust Best Practices for KubernetesZero Trust Best Practices for Kubernetes
Zero Trust Best Practices for Kubernetes
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 

Más de Jason Bloomberg

PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIsJason Bloomberg
 
The customer journey, digital transformation, and you
The customer journey, digital transformation, and youThe customer journey, digital transformation, and you
The customer journey, digital transformation, and youJason Bloomberg
 
Effective Management of Docker Containers
Effective Management of Docker ContainersEffective Management of Docker Containers
Effective Management of Docker ContainersJason Bloomberg
 
Avoiding the Bimodal Disaster - New Life for Enterprise Architecture
Avoiding the Bimodal Disaster - New Life for Enterprise ArchitectureAvoiding the Bimodal Disaster - New Life for Enterprise Architecture
Avoiding the Bimodal Disaster - New Life for Enterprise ArchitectureJason Bloomberg
 
How the Cloud Fixes Bimodal IT
How the Cloud Fixes Bimodal ITHow the Cloud Fixes Bimodal IT
How the Cloud Fixes Bimodal ITJason Bloomberg
 
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?
DevOps, Digital, and Cloud -  Two's Company, Three's a Crowd?DevOps, Digital, and Cloud -  Two's Company, Three's a Crowd?
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?Jason Bloomberg
 
The Rise of the Open Source ESB
The Rise of the Open Source ESBThe Rise of the Open Source ESB
The Rise of the Open Source ESBJason Bloomberg
 
Removing roadblocks to digital transformation
Removing roadblocks to digital transformationRemoving roadblocks to digital transformation
Removing roadblocks to digital transformationJason Bloomberg
 
Restarting enterprise architecture in the age of digital transformation
Restarting enterprise architecture in the age of digital transformationRestarting enterprise architecture in the age of digital transformation
Restarting enterprise architecture in the age of digital transformationJason Bloomberg
 
Open source containers built for real time interactions
Open source containers built for real time interactionsOpen source containers built for real time interactions
Open source containers built for real time interactionsJason Bloomberg
 
Unleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops managementUnleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops managementJason Bloomberg
 
WEBINAR: API Clouds for Faster APIs: Leveraging Existing Assets for the API ...
WEBINAR: API Clouds for Faster APIs:  Leveraging Existing Assets for the API ...WEBINAR: API Clouds for Faster APIs:  Leveraging Existing Assets for the API ...
WEBINAR: API Clouds for Faster APIs: Leveraging Existing Assets for the API ...Jason Bloomberg
 
Innovation processes in the age of digital transformation
Innovation processes in the age of digital transformationInnovation processes in the age of digital transformation
Innovation processes in the age of digital transformationJason Bloomberg
 
Are microservices 'soa done right'?
Are microservices 'soa done right'?Are microservices 'soa done right'?
Are microservices 'soa done right'?Jason Bloomberg
 
Innovation in the age of digital transformation
Innovation in the age of digital transformationInnovation in the age of digital transformation
Innovation in the age of digital transformationJason Bloomberg
 
Digital and the api economy - don't forget your systems of record
Digital and the api economy - don't forget your systems of recordDigital and the api economy - don't forget your systems of record
Digital and the api economy - don't forget your systems of recordJason Bloomberg
 
Four considerations when monitoring microservices
Four considerations when monitoring microservicesFour considerations when monitoring microservices
Four considerations when monitoring microservicesJason Bloomberg
 
Avoiding the perils and pitfalls of cloud based integration
Avoiding the perils and pitfalls of cloud based integrationAvoiding the perils and pitfalls of cloud based integration
Avoiding the perils and pitfalls of cloud based integrationJason Bloomberg
 
Digital transformation & dev ops - two sides of same revolution
Digital transformation & dev ops  - two sides of same revolutionDigital transformation & dev ops  - two sides of same revolution
Digital transformation & dev ops - two sides of same revolutionJason Bloomberg
 
Streaming Analytics and Cognitive Computing - Changing the Game
Streaming Analytics and Cognitive Computing - Changing the GameStreaming Analytics and Cognitive Computing - Changing the Game
Streaming Analytics and Cognitive Computing - Changing the GameJason Bloomberg
 

Más de Jason Bloomberg (20)

PSD2: Open Banking with APIs
PSD2: Open Banking with APIsPSD2: Open Banking with APIs
PSD2: Open Banking with APIs
 
The customer journey, digital transformation, and you
The customer journey, digital transformation, and youThe customer journey, digital transformation, and you
The customer journey, digital transformation, and you
 
Effective Management of Docker Containers
Effective Management of Docker ContainersEffective Management of Docker Containers
Effective Management of Docker Containers
 
Avoiding the Bimodal Disaster - New Life for Enterprise Architecture
Avoiding the Bimodal Disaster - New Life for Enterprise ArchitectureAvoiding the Bimodal Disaster - New Life for Enterprise Architecture
Avoiding the Bimodal Disaster - New Life for Enterprise Architecture
 
How the Cloud Fixes Bimodal IT
How the Cloud Fixes Bimodal ITHow the Cloud Fixes Bimodal IT
How the Cloud Fixes Bimodal IT
 
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?
DevOps, Digital, and Cloud -  Two's Company, Three's a Crowd?DevOps, Digital, and Cloud -  Two's Company, Three's a Crowd?
DevOps, Digital, and Cloud - Two's Company, Three's a Crowd?
 
The Rise of the Open Source ESB
The Rise of the Open Source ESBThe Rise of the Open Source ESB
The Rise of the Open Source ESB
 
Removing roadblocks to digital transformation
Removing roadblocks to digital transformationRemoving roadblocks to digital transformation
Removing roadblocks to digital transformation
 
Restarting enterprise architecture in the age of digital transformation
Restarting enterprise architecture in the age of digital transformationRestarting enterprise architecture in the age of digital transformation
Restarting enterprise architecture in the age of digital transformation
 
Open source containers built for real time interactions
Open source containers built for real time interactionsOpen source containers built for real time interactions
Open source containers built for real time interactions
 
Unleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops managementUnleashing the power of machine learning for it ops management
Unleashing the power of machine learning for it ops management
 
WEBINAR: API Clouds for Faster APIs: Leveraging Existing Assets for the API ...
WEBINAR: API Clouds for Faster APIs:  Leveraging Existing Assets for the API ...WEBINAR: API Clouds for Faster APIs:  Leveraging Existing Assets for the API ...
WEBINAR: API Clouds for Faster APIs: Leveraging Existing Assets for the API ...
 
Innovation processes in the age of digital transformation
Innovation processes in the age of digital transformationInnovation processes in the age of digital transformation
Innovation processes in the age of digital transformation
 
Are microservices 'soa done right'?
Are microservices 'soa done right'?Are microservices 'soa done right'?
Are microservices 'soa done right'?
 
Innovation in the age of digital transformation
Innovation in the age of digital transformationInnovation in the age of digital transformation
Innovation in the age of digital transformation
 
Digital and the api economy - don't forget your systems of record
Digital and the api economy - don't forget your systems of recordDigital and the api economy - don't forget your systems of record
Digital and the api economy - don't forget your systems of record
 
Four considerations when monitoring microservices
Four considerations when monitoring microservicesFour considerations when monitoring microservices
Four considerations when monitoring microservices
 
Avoiding the perils and pitfalls of cloud based integration
Avoiding the perils and pitfalls of cloud based integrationAvoiding the perils and pitfalls of cloud based integration
Avoiding the perils and pitfalls of cloud based integration
 
Digital transformation & dev ops - two sides of same revolution
Digital transformation & dev ops  - two sides of same revolutionDigital transformation & dev ops  - two sides of same revolution
Digital transformation & dev ops - two sides of same revolution
 
Streaming Analytics and Cognitive Computing - Changing the Game
Streaming Analytics and Cognitive Computing - Changing the GameStreaming Analytics and Cognitive Computing - Changing the Game
Streaming Analytics and Cognitive Computing - Changing the Game
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Certes webinar securing the frictionless enterprise

  • 2. Our Speakers 2 Jason Bloomberg, President of Intellyx & contributor to Forbes - Presenter Satyam Tyagi, CTO of Certes Networks - Presenter Adam Boone, CMO of Certes Networks - Moderator Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 3. Root of the Hacking Crisis 3 “Trusted” Network No encryption IPsec HTTPS SSL#3 Access Attacks SSL#4 No encryption SSL#1 SSL#2 Yippee! Oh no!We digitized everything! We digitized everything! Yippee! Yippee! Oh no! Oh no! We can share everything! Everybody’s mobile! We can share everything! Everybody’s mobile! Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 4. The Common Vector 4 “Trusted” Network No encryption IPsec HTTPS SSL#3 Access Attacks SSL#4 No encryption SSL#1 SSL#2 Every major data breach in the hacking headlines has a fundamental architecture exploit in common Failure of proper segmentation and isolation of networks and applications Once a single user or resource was compromised, hackers could move laterally to the most sensitive applications Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 5. The New Risk 5 We are only as secure as the least secure of … Employees Partners Supply chain members Contractors … who have app access Opening applications for sharing means opening for potential hacking We put locks on the external doors, but anyone can go anywhere inside Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 6. Copyright © 2015, Intellyx, LLC 6 Securing the Frictionless Enterprise Jason Bloomberg President jason@intellyx.com @theebizwizard
  • 7. About Jason Bloomberg • President of industry analyst firm Intellyx • Agile digital transformation thought leader • Write for Forbes, several blogs, biweekly newsletter the Cortex • Buy my latest book, The Agile Architecture Revolution Copyright © 2015, Intellyx, LLC7
  • 8. The Frictionless Enterprise • Technology extends beyond the corporate perimeter • Customers demand high- performance, end-to-end capabilities • Business and technology ecosystems become central organizing principle Copyright © 2015, Intellyx, LLC8 Reducing friction for borderless enterprises PhotoCredit:RyAwesomehttps://www.flickr.com/photos/ryawesome/
  • 9. The Dark Side of the Frictionless Enterprise • Sharing applications means exposing them to hackers • Securing systems and data isn’t enough • Security for end-to-end digital applications requires new approaches to cybersecurity Copyright © 2015, Intellyx, LLC9 More open means less secure PhotoCredit:AbulicMonkeyhttps://www.flickr.com/photos/abulic_monkey/
  • 10. The Limitations of Network Segmentation • There are no more “safe zones” • Perimeter security woefully inadequate • Network segmentation is part of the solution – Leads to fragmented patchwork – Doesn’t work well with borderless apps – Infrastructure-centric, not business-centric Copyright © 2015, Intellyx, LLC10 PhotoCredit:PaulArpshttps://www.flickr.com/photos/slapers/
  • 11. Anatomy of the Target Breach • Attack compromised credentials of HVAC contractor • Hackers moved laterally, installed malware • Attack took months, went undetected • Stole millions of credit card numbers Copyright © 2015, Intellyx, LLC11 PhotoCredit:MikeMozarthttps://www.flickr.com/photos/jeepersmedia/ Firewalls didn’t help
  • 12. Borderless Enterprises Require Borderless Security • Application security must be decoupled from network infrastructure • Secure applications across clouds, third party components, etc. • Threat mitigation becomes business concern – Business establishes security policies Copyright © 2015, Intellyx, LLC12 PhotoCredit:MarcMajcherhttps://www.flickr.com/photos/majcher/
  • 13. Security in a Post-Trust World • Can’t trust any network or any user • Breaches have already occurred – How to contain damage immediately – Even before you detect & repair it • Business-centric segmentation – Cryptographically isolated – Driven by business policy Copyright © 2015, Intellyx, LLC13 Software-defined compartmentalization for the frictionless enterprise PhotoCredit:LyndsayEssonhttps://www.flickr.com/photos/98198789@N02/
  • 14. Jason Bloomberg President, Intellyx jason@intellyx.com @theebizwizard Send email NOW to certes@intellyx.com to download this presentation Thank You! Copyright © 2015, Intellyx, LLC
  • 15. CryptoFlows Securing The Frictionless Enterprise Satyam Tyagi, CTO CertesNetworks.com
  • 16. Current State: Industry Response More of the Same The Truth is it will never be Zero Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs 16 “Entry is often extremely quick, as one would expect when exploiting stolen or weak passwords. Most often it takes weeks to discover, and that’s based entirely on when the criminals want to start cashing in on their bounty.” – Verizon DBIR 2014 Security Industry is trying to address this “Discrepancy” by trying to “reduce this gap”
  • 17. • Traditional Security Strong Perimeter: Threat prevention via firewalls • Current Generation of Security Threat Detection and Response: Monitoring and Analysis of signatures, behavior, sandbox • Next Generation of Security Threat Containment: Crypto-Segmentation • Cryptographic segmentation of sensitive applications • Role based controlled access Minimizing breach damage by blocking lateral movement Threat Containment: Crypto-Segmentation CertesNetworks.com Threats Contained Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs 17
  • 18. Principles of Segmentation • Where do you draw the lines to segment?  What is it that you are segmenting?  Networks Infrastructure or Business Applications • Who is granted access inside the segments?  What checks, verification and criteria are used to allow access?  Trusted Networks, Trusted Device serial numbers or User identity and role • Who defines the segments and access policy?  In or outside the organization, which teams define policies?  Field network engineers, service providers and contractors or Security officers 18 Internet DMZ LAN WAN CRM Code Billing Sales Engineering Contractor Trusted Network Trusted Device Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 19. CryptoFlow Role-based Access to App Crypto-Segments 19 Crypto-Segmentation Architecture Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 20. CryptoFlows in Action 20Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs • Apps are individually, cryptographically isolated in their own crypto-segments • Users are granted access based on their roles and authorization policy • The Possibility of Lateral Movement is eliminated • A compromise of one user is contained to only what the user has access to, and does not spread to everything
  • 21. CryptoFlow: Crypto-Segmentation • Where do you draw the lines to segment?  Lines are drawn around business applications • Who is granted access inside the segments?  Only users with their business role authorization get access to applications that they need • Who defines the segments and access policy?  Security officer manages all policies  Enforcement is with cryptography (keys) • Why it succeeds?  Business centric end to end security, enforced with strong cryptography, under control of security office 21Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 22. Start: Question the Status Quo  What are your business-driven security requirements?  What happens when they change/evolve?  Does the current security architecture help or hinder?  How does it hold in the BYOD, Mobile, Cloud? What happens when a breach takes place? 22Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 23. How to Apply Crypto-Segmentation  Make a list of your current applications  Prioritize most sensitive applications  Determine which user roles need access to what  Crypto-segment along these dimensions You have to start with business needs and work backwards towards security, and not let security infrastructure deficiencies force business practices. 23Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs
  • 24. CLICK TO EDIT MASTER TITLE STYLE Thank you! The white paper and slides will be emailed to you within 24 hours. Watch CryptoFlow Solutions in Action: https://youtu.be/RUIWhTgCNCs