SlideShare a Scribd company logo
1 of 15
SECURITY: EVOLVING THE DATA CENTER
21 October 2016
Rasool Kareem Irfan
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
AGENDA
2
1. TCTS - Introduction
2. Data Center Trends and Security Challenges
3. Strategic Priorities to Secure Data Center
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
TATA COMMUNICATION TRANSFORMATION SERVICES (TCTS)
Managed services for network and business operations across Telco lifecycle areas, as well as consultancy and business
enablement services, to global enterprises and telecommunications companies, via a global delivery model
7000+
Multi domain/ vendor agnostic network
specialist across multiple technologies 6 Global delivery centers including
on-site customer delivery centers
Business process management
Operational performance improvement
Transformation
Network audit and consultancy
Security audit and consultancy
Business consulting
Fulfillment
Assurance
Network engineering and planning
B2B enablement
Service monetisation
Customer experience management
Business
enablement
Network and
services
Business
excellence
Audit and
consultancy
3
Simplify complexity
by improving process efficiency
Accelerate
time-to-market
with proven experience and expertise
Improve end customer
experience
by enhancing service availability
Reduce costs
by optimising
people, processes and technology
3
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATACENTER TECHNOLOGY TRENDS
4
• DCIM Will Move Further Up the IT Stack
• Prefabricated Datacenters Will Come of Age
• Hyperscales and the Open Compute Project Will Disrupt Suppliers’ Status Quo
• Cloud Will Drive Technical and Business Change
• Datacenters Will Evolve from Consumers to Active Energy Players
The data center has evolved faster than everyone imagined and many are
encountering challenges because their approach to security did not evolve
Source: 451 Research
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
Evolving Threats Security Operations Compliance
• Manual process
• Short on resources
• Long provisioning times
• Costly
• Complex validation process
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
• Detect, understand,
and block
5
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
• Detect, understand,
and block
• Manual process
• Short on resources
• Long provisioning
times
• Costly
• Complex validation
process
Evolving Threats Security Operations Compliance
LISTENER POLL
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
What challenges does your organization face when planning and
implementing data center security?
6
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
BIGGER TRUTH
How secure is your data center?
74%
57%
68%
68%
Of organizations
reports that on
average security
change requests takes
days or weeks
to complete
Of organizations
experienced a security
incident that resulted
in the compromise
of one or more
data center services
in the past 2 years
Of organizations that
have suffered lateral
data center server
attacks have confidence
that additional network
segmentation could
definitely prevent
future compromises
Of organizations with
a method for removing
out-of-date firewall
rules says this process
is difficult and
time consuming
Source: Cisco 7
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
STRATEGIC PRIORITIES TO SECURE DATA CENTER
• Provide transparency
to usage
• Apply business
context to network
activity
• Simplify operations
and compliance
reporting
Segmentation Threat Control Visibility
• Establish boundaries:
network, compute,
virtual
• Enforce policy by
functions, devices,
organizations
• Control access to
networks, resources,
applications
• Stop internal and
external attacks
• Patrol zone and edge
boundaries
• Control information
access and usage
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
8
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
SEGMENTATION
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Firewall
Segmentation
Context Aware
Segmentation
Fabric
Segmentation
Network
Segmentation
9
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
THREAT CONTROL
10
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Device DeviceDevice
Thousands of network elements
Multi-vendor
technologies
Collect data
Tens of incidents,
problems, and issues
Analyze and correlate data
Millions of traps,
syslogs, events
Aggregate data
Few root causes
Isolate, resolve, restore,
and optimize the network
VISIBILITY
11
www.tatacommunications-ts.com
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
DATA CENTER SECURITY CHALLENGES
• Detect, understand,
and block
• Manual process
• Short on resources
• Long provisioning
times
• Costly
• Complex validation
process
Evolving Threats Security Operations Compliance
LISTENER POLL
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Are data centers doing enough to train their employees for new security threats in
the age of virtualization? Or is there still a lot of room for improvement?
12
HOW TATA COMMUNICATIONS
TRANSFORMATION SERVICES CAN HELP
CUSTOMERS
13
www.tatacommunications-ts.com | tata_tctsl
© 2016 Tata Communications Transformation Services. All Rights Reserved.
TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
Security Consulting SecurityAssessments Managed Security
• Regulatory Compliance
Assessment
• Security Governance
Assessment
• Technical Security
Assessment
• Security Monitoring &
Management Services
• Security Design &
Implementation
• Solution & Platform
Engineering
• Security Architecture
Review
• Security Migration
Services
• Solution Optimization
Services
TCTS SECURITY OFFERINGS
Transformation methodologies to mitigate cyber security concerns
14
THANK YOU
Tatacommunications-ts.com
© 2016 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS and TATA are
trademarks of Tata Sons Limited in certain countries.
15

More Related Content

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Managed Security: Evolving the Data Center

  • 1. SECURITY: EVOLVING THE DATA CENTER 21 October 2016 Rasool Kareem Irfan
  • 2. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. AGENDA 2 1. TCTS - Introduction 2. Data Center Trends and Security Challenges 3. Strategic Priorities to Secure Data Center www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries.
  • 3. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. TATA COMMUNICATION TRANSFORMATION SERVICES (TCTS) Managed services for network and business operations across Telco lifecycle areas, as well as consultancy and business enablement services, to global enterprises and telecommunications companies, via a global delivery model 7000+ Multi domain/ vendor agnostic network specialist across multiple technologies 6 Global delivery centers including on-site customer delivery centers Business process management Operational performance improvement Transformation Network audit and consultancy Security audit and consultancy Business consulting Fulfillment Assurance Network engineering and planning B2B enablement Service monetisation Customer experience management Business enablement Network and services Business excellence Audit and consultancy 3 Simplify complexity by improving process efficiency Accelerate time-to-market with proven experience and expertise Improve end customer experience by enhancing service availability Reduce costs by optimising people, processes and technology 3
  • 4. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATACENTER TECHNOLOGY TRENDS 4 • DCIM Will Move Further Up the IT Stack • Prefabricated Datacenters Will Come of Age • Hyperscales and the Open Compute Project Will Disrupt Suppliers’ Status Quo • Cloud Will Drive Technical and Business Change • Datacenters Will Evolve from Consumers to Active Energy Players The data center has evolved faster than everyone imagined and many are encountering challenges because their approach to security did not evolve Source: 451 Research
  • 5. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES Evolving Threats Security Operations Compliance • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. • Detect, understand, and block 5
  • 6. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES • Detect, understand, and block • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process Evolving Threats Security Operations Compliance LISTENER POLL www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. What challenges does your organization face when planning and implementing data center security? 6
  • 7. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. BIGGER TRUTH How secure is your data center? 74% 57% 68% 68% Of organizations reports that on average security change requests takes days or weeks to complete Of organizations experienced a security incident that resulted in the compromise of one or more data center services in the past 2 years Of organizations that have suffered lateral data center server attacks have confidence that additional network segmentation could definitely prevent future compromises Of organizations with a method for removing out-of-date firewall rules says this process is difficult and time consuming Source: Cisco 7
  • 8. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. STRATEGIC PRIORITIES TO SECURE DATA CENTER • Provide transparency to usage • Apply business context to network activity • Simplify operations and compliance reporting Segmentation Threat Control Visibility • Establish boundaries: network, compute, virtual • Enforce policy by functions, devices, organizations • Control access to networks, resources, applications • Stop internal and external attacks • Patrol zone and edge boundaries • Control information access and usage www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. 8
  • 9. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. SEGMENTATION www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Firewall Segmentation Context Aware Segmentation Fabric Segmentation Network Segmentation 9
  • 10. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. THREAT CONTROL 10
  • 11. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Device DeviceDevice Thousands of network elements Multi-vendor technologies Collect data Tens of incidents, problems, and issues Analyze and correlate data Millions of traps, syslogs, events Aggregate data Few root causes Isolate, resolve, restore, and optimize the network VISIBILITY 11
  • 12. www.tatacommunications-ts.com © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. DATA CENTER SECURITY CHALLENGES • Detect, understand, and block • Manual process • Short on resources • Long provisioning times • Costly • Complex validation process Evolving Threats Security Operations Compliance LISTENER POLL www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Are data centers doing enough to train their employees for new security threats in the age of virtualization? Or is there still a lot of room for improvement? 12
  • 13. HOW TATA COMMUNICATIONS TRANSFORMATION SERVICES CAN HELP CUSTOMERS 13
  • 14. www.tatacommunications-ts.com | tata_tctsl © 2016 Tata Communications Transformation Services. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. Security Consulting SecurityAssessments Managed Security • Regulatory Compliance Assessment • Security Governance Assessment • Technical Security Assessment • Security Monitoring & Management Services • Security Design & Implementation • Solution & Platform Engineering • Security Architecture Review • Security Migration Services • Solution Optimization Services TCTS SECURITY OFFERINGS Transformation methodologies to mitigate cyber security concerns 14
  • 15. THANK YOU Tatacommunications-ts.com © 2016 Tata Communications. All Rights Reserved. TATA COMMUNICATIONS and TATA are trademarks of Tata Sons Limited in certain countries. 15