SlideShare una empresa de Scribd logo
1 de 29
ShieldX Overview
Dr. Ratinder Paul Singh Ahuja,
Founder, Chief R&D Officer,
ShieldX Networks Inc.
Agenda
ShieldX Solution
Introduction What Problem are we trying to
solve
ShieldX Solution
How is ShieldX Different Benefits Demo
About ShieldX
Founded in 2016 - Headquarters in San Jose, CA
• Venture Funding:
• Industry Recognition:
• Notable Customers:
Equifax Breach: Perception vs Reality
Perception
Cause was a vulnerability in
Apache Struts
Reality
1. Failure of the chokepoint
approach
2. Lack of E/W visibility,
security policies & control
“…key factors that led to the breach were in the areas of identification, detection,
segmentation, and data governance….”
3 Databases
48 Databases
Lateral
Movement
WebApp Server
Firewall,
IDPS,
DLP,
WAF,
WSG
Impact of Ransomware
Source: Ponemon Institute LLC
Source: Gartner 2019
Security zone cleanup
Security zones have proliferated in
many organizations
Microsegmentation can bring order to
the security zone chaos
Risk of Flat Networks & Vulnerable Systems in Data Centers
Lack of Application Tiering
Lack of Tier Isolation
Lack of Application Isolation
Lack of Microsegmentation within tiers
Multi-Cloud Security Challenges
MORE
VULNERABLE
LACK OF
VISIBILITY &
CONTROL
LACK OF
AUTOMATION
ShieldX : Protecting the multi-cloud data center
WHAT
WHY
HOW
ShieldX protects multi cloud data centers from the risk of lateral movement
which lead to attacks such as ransomware, data loss and service disruption.
Most multi-cloud data centers are designed without proper network segmentation,
application tier isolation and have vulnerable systems. These flat networks and
vulnerable systems create a compliance dilema and allow for cyber attacks to
propagate.
ShieldX Elastic Security Platform automates network and threat prevention
security policy generation and security control deployment.
WHO
ShieldX is acquired by CIO & CISO teams that are responsible for multi-cloud
datacenter network security policies & controls, threat prevention and
compliance.
Compliance
in multi cloud environments
Key Challenges
Risk of flat networks and
vulnerable systems in data centers
and cloud environments
Digital transformation
ShieldX Capabilities
AI enabled-fine grained
automated policy
discovery and
enforcement
ElasticDPI-enabled
microsegmentation Agentless
What happens when the auditor calls?
Regulation Requirement Impact
PCI Install and maintain firewall to
protect cardholder data.
Use microsegmentation to
support operational effectiveness
of maintaining firewall
configuration/auditing.
SWIFT Generate real-time application
dependency map, impose
segmentation and provide
validation.
Use microsegmentation mapping
to generate dependency map,
automate segmentation and
automate validation.
HIPPA Implement means of access
control including username and
PIN.
Prevent users from even
accessing the network where
sensitive data is stored.
GDPR Prevent access to
communications networks.
Use microsegmentation to
prevent unauthorized users from
accessing GDPR records.
The move to hybrid/multi-cloud increases sensitive data risk
The walled garden
Application zones with
infrastructure protection
Internet
Firewall
Firewall
Firewall
Firewall
DMZ
Business
Tier
Web
Tier
Data
Tier
CLOUD
Moving to the cloud dissolves boundaries
Traditional infrastructure protection is not viable
WebTier Data TierDMZ
Business
Tier
Challenges
Ephemeral workloads
Lack of visibility
Impossible to set policy
Can’t orchestrate
Flat networks and vulnerable
systems
Virtual firewall
Physical hair pinning
Manual segmentation
Agents
Native controls
Market Options
Source: Gartner 2019
Security zone cleanup
Security zones have proliferated in
many organizations
Microsegmentation can bring order to
the security zone chaos
Microsegmentation is the foundation
Source: Gartner 2019
Segmentation decisions must not be isolated from other security layers. Setup rules
for balancing segmentation and complementary controls requirements.
ShieldX Architecture
ShieldX
Management
Plane
ShieldX
Data Planes
Inspect and
secure traffic
Management Network
Adaptive
Intention Engine
Infrastructure
Controller
Visibility
Controls
Service Chain
Microservices
Backplane
Network
Segment interface
microservices
(SI) connect
to networks
Networks to
Monitor
Automating Network Security & Threat Prevention
Mathematically Precise
Policy Automation
Asset Visibility / Application Visibility Control Automation
Works in Multi-cloud
Continuous
asset discovery
Multi-tiered
application view
Network
Security
Policy
Automated
Control
Deployment
TransformSecurity Policy
TransformSecurity Policy
Layer 3-4
• Tier Generation
• Micro-segmentation
• Tier isolation
• Zoning
Threat
Prevention
Security
Policy
Layer 7
• Lateral movement
prevention
• Virtual patching
Compliance
• PCI
• SWIFT
• GDPR
• HIPAA
Risk Reduction
• Eliminate risk of
flat networks and
vulnerable
systems
Traffic Evidence / Tags
Discover
Agentless Discovery. Multi-Cloud visibility. Continuously updated.
Autogenerated multi-tiered
application view
Auto generated Network & Threat prevention policy
Automated tier generation; automated network security policies generation, forward
testing and automated control deployment
Agentless workload security
Any workload, any cloud—secured at the most granular Level
Discover Automate Secure
• Workloads, data and
infrastructure
• How do they communicate?
• Automate security policies and
controls
• Update instantly and perpetually
• Instrument policies across
clouds
• Alert when attempted
breaches
Consolidation Deploys quickly
Visibility
Elastically
scalable
ShieldX security controls
Virtual Patching
Visibility
DPI-enabled
Microsegmentation
Lateral Movement Prevention
TLS traffic decryption and termination
Microsegmentation and Application based ACLs
Data Discovery in Motion
Anomaly detection
Attack Tracking via Indicator of Pivot
Threat detection and prevention
Network-based malware detection, blocking and
detonation with ShieldX Cloud or FireEye
URL classification and reputation based detection
and blocking
Attack packet logging
The ShieldX Advantage
Cloud Readiness
Traditional Vendors
Checkpoint
Cisco
Fortinet
Palo Alto
Juniper
Infrastructure Vendors
AWS+VFW
ACI+VFW
NSX+VFW
Azure
AWS
NSX
New Entrants
vArmour
Illumio
CloudPassage
Manual Automation/Scalability
“[ShieldX] gives us a lower dollar-per-protected-megabyte than a traditional firewall...”
—Alaska Airlines
Life After
Deploying
ShieldX
Lower Cost to
Deliver Security
Improved efficiency
Risk Reduction
• Reduce firewall footprint
• Consume fewer network resources
• Reduce maintenance costs
• Automated policy and control setup as well as ongoing management
• Accelerated network investigations while reducing spend on network
analytics, e.g., NextHop
• Real time policy and configuration updates
• Threat detection with DPI
• Automated fine grain control
U N C O M P R O M I S E D
U N L I M I T E D
U N P A R A L L E L E D
www.shieldx.com
Automating Zero Trust Networking
1 1 100 010011 10
1 0011 100 011 100 1
1 1 100 010011 100
10010001 1 1 100 010011
011 100 10010001
1 1 100 010011
1 0011 100 011 100 1
1 1 100 010011 100
10010001 1 1 100 010011
011 100 10010001
1 1 100 010011 100 10010001 1 1 100 010011 100 11
1 0011 100 011 100 110101 1 100 011 100 10010001
Analysis via logs, tap,
and packet inspection
to derive threats
Predictive Policy
11 001 100 010011 100 10010001 100110
11 1 110 10 110
00 1001 100110 100 010011 11 100 1
110 10 010011 001 100 110
001 100 010011 100 10010001 100110
11 1 110 10 110
Eliminate risk of flat
networks
Create logical separation
of applications
Adaptive policy to
maintain compliance
Real-time controls to
protect elastic
environments
Automated tiering,
grouping, zoning,
microsegmentation
ShieldX Security Use Cases
Datacenter Multi-Cloud SCADA ISP/Telco MSSP
East/West risk
visibility, threat
prevention &
micro-
segmentation
Multi-cloud risk
visibility, threat
prevention &
micro-
segmentation
Isolation and
exploit prevention
of critical networks
and assets.
Critical
infrastructure
protection
Malware and
threat prevention
for subscribers
Highly virtualized
and orchestrated
solution allows
MSSPs to offer
security services
with economics 7
scale
Public Case Studies & Reviews
Alaska Airlines: https://www.itcentralstation.com/product_reviews/shieldx-review-53633-by-brian-
talbert
My favorite quote:
“The Adaptive Intention Engine is fantastic. It allows us to develop security policies using the language of
our internal customers. It's machine-learning applied to security workflows. That allows us to much more
easily construct the policies that will protect those workflows.”
IDT: https://www.itcentralstation.com/product_reviews/shieldx-review-53190-by-cio0ee7
My favorite quote:
“ShieldX has been designed from the very beginning to work well in cloud environments. It understands
autoscaling, automation,and auto-configuration.These are the things which are important in today's
operating environment.”
LHM: https://www.itcentralstation.com/product_reviews/shieldx-review-60870-by-branden-emia
Highlights:
Before ShieldX, we didn't have much of a security posture. We were trying to get there. We tried Illumio
and bought the product, but it just seemed very difficult at the time. So, we decided to transition to
ShieldX.
Notable POCs & Use Cases
Enterprise Industry Use Case
NTT Telcom VMWare ESXi risk visibility, threat prevention, micro segmentation
ATT Telcom Multi-Cloud risk visibility, threat prevention, micro segmenation
Scotia Bank Financials Azure cloud threat prevention
State Farm Insurance VMWare ESXi threat prevention and microsegmentation
Flextronics Manufacturing Multi-cloud threat prevention and micro segmentation
NASDAQ Financials Multi-cloud threat preventon and micro segmetation
US Bank Financials Azure cloud threat prevention
Fresenius Medical Medical Services VMWare ESXi
Amerisource Bergen Pharmaceutical service Azure risk visibility and threat detection
Lumentum Manufacturing Multi-cloud risk visibility, threat prevention and micro segmentation
BSNL India ISP/Telco Prevent malware and threat propagation for subscribers. Critical infrastructure protection
DEN Networks Cable ISP Prevent malware and threat propagation for subscribers. Critical infrastructure protection
Risk of Flat Networks & Unpatched systems
• Optimal Segmentation & Virtual Patching
DPI
X
Virtual Patch
Segmentation
Logical segmentation and virtual patching become the
compensating controls for the risk introduced by flat
networks and residual vulnerabilities of unpatched systems
that typically lead to lateral movement.
LateralMovement

Más contenido relacionado

La actualidad más candente

Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Oscar Ferreira
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree Ltd.
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security ProfessionalHatem ElSahhar
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Positive Hack Days
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingClinton DSouza
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentationRasool Irfan
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 

La actualidad más candente (20)

Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computing
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 

Similar a Crush Cloud Complexity, Simplify Security - Shield X

CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Markit
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CloudIDSummit
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayDotha Keller
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & ComplianceAmazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 

Similar a Crush Cloud Complexity, Simplify Security - Shield X (20)

Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
nsx overview with use cases 1.0
nsx overview with use cases 1.0nsx overview with use cases 1.0
nsx overview with use cases 1.0
 
Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences Cyber security providers adopt strategic defences
Cyber security providers adopt strategic defences
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
CIS 2015 Identity and Data Security : Breaking the Boundaries - Nathanael Cof...
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Palo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & CompliancePalo Alto Networks: Protection for Security & Compliance
Palo Alto Networks: Protection for Security & Compliance
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 

Más de Prime Infoserv

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contractingPrime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaPrime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marPrime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilientPrime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsPrime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - NetmagicPrime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft TeamsPrime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a TargetPrime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentationPrime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePrime Infoserv
 

Más de Prime Infoserv (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Crush Cloud Complexity, Simplify Security - Shield X

  • 1. ShieldX Overview Dr. Ratinder Paul Singh Ahuja, Founder, Chief R&D Officer, ShieldX Networks Inc.
  • 2. Agenda ShieldX Solution Introduction What Problem are we trying to solve ShieldX Solution How is ShieldX Different Benefits Demo
  • 3. About ShieldX Founded in 2016 - Headquarters in San Jose, CA • Venture Funding: • Industry Recognition: • Notable Customers:
  • 4. Equifax Breach: Perception vs Reality Perception Cause was a vulnerability in Apache Struts Reality 1. Failure of the chokepoint approach 2. Lack of E/W visibility, security policies & control “…key factors that led to the breach were in the areas of identification, detection, segmentation, and data governance….” 3 Databases 48 Databases Lateral Movement WebApp Server Firewall, IDPS, DLP, WAF, WSG
  • 5. Impact of Ransomware Source: Ponemon Institute LLC
  • 6.
  • 7. Source: Gartner 2019 Security zone cleanup Security zones have proliferated in many organizations Microsegmentation can bring order to the security zone chaos Risk of Flat Networks & Vulnerable Systems in Data Centers Lack of Application Tiering Lack of Tier Isolation Lack of Application Isolation Lack of Microsegmentation within tiers
  • 8. Multi-Cloud Security Challenges MORE VULNERABLE LACK OF VISIBILITY & CONTROL LACK OF AUTOMATION
  • 9. ShieldX : Protecting the multi-cloud data center WHAT WHY HOW ShieldX protects multi cloud data centers from the risk of lateral movement which lead to attacks such as ransomware, data loss and service disruption. Most multi-cloud data centers are designed without proper network segmentation, application tier isolation and have vulnerable systems. These flat networks and vulnerable systems create a compliance dilema and allow for cyber attacks to propagate. ShieldX Elastic Security Platform automates network and threat prevention security policy generation and security control deployment. WHO ShieldX is acquired by CIO & CISO teams that are responsible for multi-cloud datacenter network security policies & controls, threat prevention and compliance.
  • 10. Compliance in multi cloud environments Key Challenges Risk of flat networks and vulnerable systems in data centers and cloud environments Digital transformation ShieldX Capabilities AI enabled-fine grained automated policy discovery and enforcement ElasticDPI-enabled microsegmentation Agentless
  • 11. What happens when the auditor calls? Regulation Requirement Impact PCI Install and maintain firewall to protect cardholder data. Use microsegmentation to support operational effectiveness of maintaining firewall configuration/auditing. SWIFT Generate real-time application dependency map, impose segmentation and provide validation. Use microsegmentation mapping to generate dependency map, automate segmentation and automate validation. HIPPA Implement means of access control including username and PIN. Prevent users from even accessing the network where sensitive data is stored. GDPR Prevent access to communications networks. Use microsegmentation to prevent unauthorized users from accessing GDPR records.
  • 12. The move to hybrid/multi-cloud increases sensitive data risk The walled garden Application zones with infrastructure protection Internet Firewall Firewall Firewall Firewall DMZ Business Tier Web Tier Data Tier CLOUD Moving to the cloud dissolves boundaries Traditional infrastructure protection is not viable WebTier Data TierDMZ Business Tier Challenges Ephemeral workloads Lack of visibility Impossible to set policy Can’t orchestrate Flat networks and vulnerable systems Virtual firewall Physical hair pinning Manual segmentation Agents Native controls Market Options
  • 13. Source: Gartner 2019 Security zone cleanup Security zones have proliferated in many organizations Microsegmentation can bring order to the security zone chaos
  • 14. Microsegmentation is the foundation Source: Gartner 2019 Segmentation decisions must not be isolated from other security layers. Setup rules for balancing segmentation and complementary controls requirements.
  • 15.
  • 16. ShieldX Architecture ShieldX Management Plane ShieldX Data Planes Inspect and secure traffic Management Network Adaptive Intention Engine Infrastructure Controller Visibility Controls Service Chain Microservices Backplane Network Segment interface microservices (SI) connect to networks Networks to Monitor
  • 17. Automating Network Security & Threat Prevention Mathematically Precise Policy Automation Asset Visibility / Application Visibility Control Automation Works in Multi-cloud Continuous asset discovery Multi-tiered application view Network Security Policy Automated Control Deployment TransformSecurity Policy TransformSecurity Policy Layer 3-4 • Tier Generation • Micro-segmentation • Tier isolation • Zoning Threat Prevention Security Policy Layer 7 • Lateral movement prevention • Virtual patching Compliance • PCI • SWIFT • GDPR • HIPAA Risk Reduction • Eliminate risk of flat networks and vulnerable systems Traffic Evidence / Tags
  • 18. Discover Agentless Discovery. Multi-Cloud visibility. Continuously updated.
  • 19. Autogenerated multi-tiered application view Auto generated Network & Threat prevention policy Automated tier generation; automated network security policies generation, forward testing and automated control deployment
  • 20. Agentless workload security Any workload, any cloud—secured at the most granular Level Discover Automate Secure • Workloads, data and infrastructure • How do they communicate? • Automate security policies and controls • Update instantly and perpetually • Instrument policies across clouds • Alert when attempted breaches Consolidation Deploys quickly Visibility Elastically scalable
  • 21. ShieldX security controls Virtual Patching Visibility DPI-enabled Microsegmentation Lateral Movement Prevention TLS traffic decryption and termination Microsegmentation and Application based ACLs Data Discovery in Motion Anomaly detection Attack Tracking via Indicator of Pivot Threat detection and prevention Network-based malware detection, blocking and detonation with ShieldX Cloud or FireEye URL classification and reputation based detection and blocking Attack packet logging
  • 22. The ShieldX Advantage Cloud Readiness Traditional Vendors Checkpoint Cisco Fortinet Palo Alto Juniper Infrastructure Vendors AWS+VFW ACI+VFW NSX+VFW Azure AWS NSX New Entrants vArmour Illumio CloudPassage Manual Automation/Scalability
  • 23. “[ShieldX] gives us a lower dollar-per-protected-megabyte than a traditional firewall...” —Alaska Airlines Life After Deploying ShieldX Lower Cost to Deliver Security Improved efficiency Risk Reduction • Reduce firewall footprint • Consume fewer network resources • Reduce maintenance costs • Automated policy and control setup as well as ongoing management • Accelerated network investigations while reducing spend on network analytics, e.g., NextHop • Real time policy and configuration updates • Threat detection with DPI • Automated fine grain control
  • 24. U N C O M P R O M I S E D U N L I M I T E D U N P A R A L L E L E D www.shieldx.com
  • 25. Automating Zero Trust Networking 1 1 100 010011 10 1 0011 100 011 100 1 1 1 100 010011 100 10010001 1 1 100 010011 011 100 10010001 1 1 100 010011 1 0011 100 011 100 1 1 1 100 010011 100 10010001 1 1 100 010011 011 100 10010001 1 1 100 010011 100 10010001 1 1 100 010011 100 11 1 0011 100 011 100 110101 1 100 011 100 10010001 Analysis via logs, tap, and packet inspection to derive threats Predictive Policy 11 001 100 010011 100 10010001 100110 11 1 110 10 110 00 1001 100110 100 010011 11 100 1 110 10 010011 001 100 110 001 100 010011 100 10010001 100110 11 1 110 10 110 Eliminate risk of flat networks Create logical separation of applications Adaptive policy to maintain compliance Real-time controls to protect elastic environments Automated tiering, grouping, zoning, microsegmentation
  • 26. ShieldX Security Use Cases Datacenter Multi-Cloud SCADA ISP/Telco MSSP East/West risk visibility, threat prevention & micro- segmentation Multi-cloud risk visibility, threat prevention & micro- segmentation Isolation and exploit prevention of critical networks and assets. Critical infrastructure protection Malware and threat prevention for subscribers Highly virtualized and orchestrated solution allows MSSPs to offer security services with economics 7 scale
  • 27. Public Case Studies & Reviews Alaska Airlines: https://www.itcentralstation.com/product_reviews/shieldx-review-53633-by-brian- talbert My favorite quote: “The Adaptive Intention Engine is fantastic. It allows us to develop security policies using the language of our internal customers. It's machine-learning applied to security workflows. That allows us to much more easily construct the policies that will protect those workflows.” IDT: https://www.itcentralstation.com/product_reviews/shieldx-review-53190-by-cio0ee7 My favorite quote: “ShieldX has been designed from the very beginning to work well in cloud environments. It understands autoscaling, automation,and auto-configuration.These are the things which are important in today's operating environment.” LHM: https://www.itcentralstation.com/product_reviews/shieldx-review-60870-by-branden-emia Highlights: Before ShieldX, we didn't have much of a security posture. We were trying to get there. We tried Illumio and bought the product, but it just seemed very difficult at the time. So, we decided to transition to ShieldX.
  • 28. Notable POCs & Use Cases Enterprise Industry Use Case NTT Telcom VMWare ESXi risk visibility, threat prevention, micro segmentation ATT Telcom Multi-Cloud risk visibility, threat prevention, micro segmenation Scotia Bank Financials Azure cloud threat prevention State Farm Insurance VMWare ESXi threat prevention and microsegmentation Flextronics Manufacturing Multi-cloud threat prevention and micro segmentation NASDAQ Financials Multi-cloud threat preventon and micro segmetation US Bank Financials Azure cloud threat prevention Fresenius Medical Medical Services VMWare ESXi Amerisource Bergen Pharmaceutical service Azure risk visibility and threat detection Lumentum Manufacturing Multi-cloud risk visibility, threat prevention and micro segmentation BSNL India ISP/Telco Prevent malware and threat propagation for subscribers. Critical infrastructure protection DEN Networks Cable ISP Prevent malware and threat propagation for subscribers. Critical infrastructure protection
  • 29. Risk of Flat Networks & Unpatched systems • Optimal Segmentation & Virtual Patching DPI X Virtual Patch Segmentation Logical segmentation and virtual patching become the compensating controls for the risk introduced by flat networks and residual vulnerabilities of unpatched systems that typically lead to lateral movement. LateralMovement