13
Protecting Federal Agencies in a World without Walls

Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Protecting Federal Agencies in a World without Walls

Page 2: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

Ju

Copyright © 2018 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries

Inside Out

BRIEFING DECK

Protecting Your Agency in a World without Walls

Page 3: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

Almost 4.5 billion records stolenworldwide in first half of 20182

Data breaches increased by 75%over the past two years1

$6 trillion in estimated global cybercrime damages by 20213

700 millionpeople worldwidewere victims ofcybercrime last year3

1. Information Age, September 20182. Business Wire, October 2018 3. Comparitech, October 2018

Cybercrime is booming…

Page 4: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

It’s all about the data…

who is accessing it… and how…

where its stored…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

Customers/Citizens

Privileged Users

Business Users

Developers

Devices

80%of data breaches involved privileged credentials1

1. Forrester, The Forrester WaveTM: Privileged Identity Management,Q4 2018, Andras Cser, November 14, 2018

Page 5: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

Privileged access is the main target for hackers…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

Privileged Users PRIVILEGEDACCESS MGMT

Customers/Citizens

Business Users

Developers

Page 6: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

But a malicious user can compromise a privileged user…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

Privileged Users PRIVILEGEDACCESS MGMT

MaliciousUser

But this can be mitigated with Threat Analytics…

THREATANALYTICS

Page 7: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

THREATANALYTICS

IAM solutions are leveraged to control access…

Customers/Citizens

Privileged Users

Business Users

How to handle business and external users…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

PRIVILEGEDACCESS MGMT

ACCESS MANAGEMENT

IDENTITY MGMT & GOVERNANCE

AGENCYDIRECTORY

Page 8: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

THREAT

ANALYTICS

Stronger authentication is required to identify users…

Customers/

Citizens

Privileged Users

Business Users

But what about the rash of stolen credentials…

Cloud

Environments

Virtual

Servers

Traditional Data

Centers

Legacy

Mainframe

PRIVILEGED

ACCESS MGMT

ACCESS

MANAGEMENT

2.3Bauthentication credentials stolenin 20171

1. Credential Spill Report, 2018

STRONG

AUTHENTICATION

IDENTITY MGMT &

GOVERNANCE

AGENCY

DIRECTORY

Page 9: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

THREATANALYTICS

API Gateways integrate these new interfaces…

Customers/Citizens

Privileged Users

Business Users

But users aren’t just accessing data from a browser…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

PRIVILEGEDACCESS MGMT

ACCESS MANAGEMENT

Mobile Apps

IoT

Browser

API GATEWAY

IDENTITY MGMT & GOVERNANCE

AGENCYDIRECTORY

Page 10: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

THREATANALYTICS

It provides SDK’s to integrate with Mobile Apps and IoT…

Customers/Citizens

Privileged Users

Business Users

The API Gateway integrates with PAM & IAM systems…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

PRIVILEGEDACCESS MGMT

ACCESS MANAGEMENT

STRONGAUTHENTICATION

Mobile Apps

IoT

Browser

API GATEWAY

IDENTITY MGMT & GOVERNANCE

AGENCYDIRECTORY

Page 11: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

THREATANALYTICS

Enabling developer velocity needed for the business…

Customers/Citizens

Privileged Users

Business Users

And you need the ability to develop and expose API’s…

CloudEnvironments

VirtualServers

Traditional Data Centers

LegacyMainframe

PRIVILEGEDACCESS MGMT

ACCESS MANAGEMENT

API GATEWAY

APIPORTAL

Developers APICREATOR

Page 12: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Copyright © 2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

Enterprise Security from the Inside Out…

Layer7 Security & Integration Portfolio

Data

Privileged Access Management• Securing privileged

users, accounts and

credentials

Threat Analytics• Monitor privileged user

activities for abnormal

usage

Identity and Access Management• Securing and governing

business and privileged

users

Authentication• Applying multifactor

credentials for logins

API Management• Connecting data

securely to apps

and devices

Page 13: Protecting Federal Agencies in a World without Walls€¦ · Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. Title: Broadcom PPT 2019 Track

Broadcom Proprietary and Confidential. Copyright © 2018 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.

Thank You