19
Cloud Security: Focusing on Automation and Thwarting APTs Derek Tumulak VP Product Management June 5 th 2013

Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Cloud Security: Focusing on Automation and

Thwarting APTs

Derek Tumulak VP Product Management

June 5th 2013

Page 2: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Stark Reality of Security Industry Today: Perimeter Security is Failing

Source: mandiant.com/threat-landscape/

100% 94%

416 100%

of victims have up-to-date antivirus software

of breaches are reported by third parties

median number of days advanced attackers are on the network before being detected

of breaches involved stolen credentials

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 2

Page 3: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

“We must accept the fact that no barrier is impenetrable, and detection/ response represents an extremely critical line of defense. Let’s stop treating it like a backup plan if things go w rong, and start making it a core part of the plan.” Verizon Data Breach Report 2013

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 3

Page 4: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

<1%

94%

Servers laptops

Servers

2012 DATA BREACH INVESTIGATION REPORT

Records Compromised

Records Compromised

Data is the Target … Server Data = Biggest Target

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 4

Page 5: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Data is the New Currency … Protect What Matters – Your Sensitive Data

“ i

In the underground market economy, data is money, and much like any other market economy, principles of supply and demand drive it.

Forrester Research, Inc. Measure the Effectiveness of Your Data Privacy Program - January 2013

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 5

Page 6: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Sensitive Data is the Target … and No One is Immune

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 6

Page 7: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Plus There Are Insider Threats

"At the bureau, about 24 percent of the incidents we track on a yearly basis have to do w ith just accidental insiders — people being a knucklehead. We spend about 35 percent of our incident response time [on them].” Patrick Reidy, CISO for the FBI

http://www.darkreading.com/insider-threat/167801100/security/news/240150554/over-privileged-well-meaning-and-dangerous.html?cid=nl_DR_daily_2013-03-12_html

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 7

Page 8: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Market Drivers For Enhancing Security Global Compliance, Cloud Adoption, Big Data, Data Breaches

CLOUD ADOPTION

Enterprise Security #1 Inhibitor1

APTs DATA BREACHES

98% Stolen Records From Large Orgs2

1. Global State of Information Security® Survey by PwC, CIO magazine, and CSO magazine – October 2012 2. Verizon Data Breach Investigation Report – March 2012

BIG DATA

Big Data is a Big Target

GLOBAL COMPLIANCE

Aggressive New Regulations

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 8

Page 9: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

OLD THREATS NEW THREATS

Signature

Random

Moves on

One-Time

Behavioral

Targeted

Patient

Persistent

ADVANCED PERSISTENT

THREATS

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 9

Threats Behave Very Differently Today

Page 10: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Old Model is Weak Against New Threats — A Data-Centric Security Model is Required

Signature-Based Known Old Threats / Old Model

Worms, Virus, Spyware, Bots One-Time Events Web

Gateways Intrusion

Prevention Systems

Firewalls Anti-Virus

Intellectual Property

Financial Data

Personal Information

Advanced Malware

Advanced Persistent Threats APTs/New Threats

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 10

Page 11: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Reducing the Attack Surface by Restricting Access to Data in the Cloud

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 11

Page 12: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Access Policies • Block privileged users like root from viewing data and thwart APTs • Provide fine-grained control to determine who can view specific data

Essential Data-Centric Security Measures

Vormetric Confidential

Encryption & Key Management • Lock down the data using strong industry approved algorithms • Centralized and hardened key management appliance

Security Intelligence • Log all access to what matters the protected data • Provide valuable real-time intelligence on who is accessing protected

data where and when

Automation • Automatic installation, configuration, and dynamic policy

enhancements based on real-time threats • Instant protection during new customer onboarding

Multi-Tenancy • Secure cloud data in commingled and multi-tenant environments • Enable end customers to control policies specific to their own data

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 12

Page 13: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Cloud Service Provider

Virtual Servers Automation

Toolkit Enterprise #1

Key and Policy Manager

Enterprise #2

Enterprise #3

Key Capabilities: • Enterprises rely on cloud service provider to apply security

best practices for encryption and key management

• Demonstrate to end customers that cloud IT admins do not have access to their data via access policies

• Provide rich security intelligence around who/what is accessing protected data in the cloud

(via Secure VPN)

Use Case 1: Security Controls Managed by the Cloud Service Provider

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 13

Page 14: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Cloud Service Provider

Virtual Servers Automation

Toolkit Enterprise Data Center

Key and Policy Manager

Physical or Virtual Servers

Automation Toolkit

(via Secure VPN)

Key Capabilities: • Key and policy management owned and driven on-premise

from the enterprise

• Ability to implement data access policies across public and private cloud servers – block access from cloud IT admins

• Provide rich security intelligence around who/what is accessing protected data in the cloud

Use Case 2: Security Controls Managed On-Premise by the Enterprise

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 14

Page 15: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Data-Centric Security Must Be…

Transparent Transparent to Business Process Transparent to Apps / Users Protect All Data Types

Strong Firewall Your Data Protect Privileged User Access Proven With Most Demanding Customers

Easy

Easy to Implement Easy to Manage/Automate Easy to Understand

Efficient

Minimal Performance Impact Support Existing SLAs Low Administrative Support

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 15

Automated

Cost Savings Avoid Error Prone Manual Steps Dynamic Real-Time Responsiveness

Page 16: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Benefits of Automation

Cost Savings • With fewer manual steps time and money is saved • Apply the 80/20 rule and automate the most common tasks

Avoid Errors • Manual steps often lead to mistakes • This can be costly for your business

Real-Time Responsiveness • Dynamic action can be taken based on events • Security can be enhanced by increasing auditing or by even blocking

access to data for certain users and processes

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 16

Page 17: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Physical

Advanced Encryption

Data Security Manager

(Certificates, Keys)

• Automate Deployment

• Key & Encryption Management

Automated Toolkits

Secure Vaulting

File and Volume Encryption Agents

Big Data

VM Virtual

Security Intelligence Logs

Groups and Users

Physical

Virtual

Key Management

Virtual Physical

Environment Support

Public Cloud

Private Cloud & Virtualization

Hybrid

Data Centers

Application Agents • Oracle and SQL

Server TDE Keys • Application

Encryption API

Data-Centric Security Elements

17 Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Page 18: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Conclusion

Get Ready for the Cloud • Invest in security solutions

that provide for a smooth transition from physical to virtual to cloud

Be Data-Centric •Thwart APTs and malicious

cloud administrators by bringing controls closer to the data and reducing the attack surface

Automate •Drive additional cost savings

and dynamically adjust security policy in real-time

Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved. 18

Page 19: Cloud Security: Focusing on Automation and Thwarting APTs · 2014-11-26 · Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor

Protect What Matters