18
Securing The Cloud When Users Are Left To Their Own Devices November 2014

Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

Embed Size (px)

DESCRIPTION

90% of cloud apps in the enterprise are being used without IT’s knowledge. Whether brought in by individuals or lines of business, there’s an average of 508 apps per enterprise and more than 5,000 in the world from which people can choose. Where things get even more interesting is when cloud and mobile combine and the opportunity for data loss and breaches multiply. These slides are from a webinar where leading identity management, cloud security, and fraud management expert Andras Cser from Forrester and Netskope’s Sr. Director of Product Marketing Bob Gilbert talk about the importance of understanding which employees are using which cloud apps and from where they’re accessing them. View the on-demand webinar here: http://www.netskope.com/webinars/securing-cloud-users-left-devices/

Citation preview

Page 1: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

Securing The Cloud When

Users Are Left To Their Own

Devices

November 2014

Page 2: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2014 Netskope. All Rights Reserved.

Today’s Speakers

2

› Andras Cser, VP and Principal Analyst

› Bob Gilbert, Sr. Director Product Marketing

Page 3: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2014 Forrester Research, Inc. Reproduction Prohibited 3

Source: Forrsights Developer Survey, Q1 2013

“Which of the following cloud-based services have you employed on a regular basis?"

2%

3%

14%

16%

18%

21%

23%

23%

26%

31%

33%

33%

37%

42%

49%

50%

Other

Don't know

Nonrelational database

BPM

Mobile back end

Content delivery network

Application-level caching

Integration (e.g., Dell Boomi, IBM Cast Iron)

Message queuing

Content management

Messaging

Social (e.g., Salesforce Chatter)

Development tools/IDE (e.g. Cloud9, Cloud Foundry)

Relational database (e.g. SQL Azure)

Storage

Compute (e.g., Amazon EC2, Microsoft Azure VM Role)

Sample Size = 175 software developers from companies with 1,000 or more employees

Cloud-based Services Employed Regularly

Page 4: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2014 Forrester Research, Inc. Reproduction Prohibited 4

Source: Forrester Software Survey, Q4 2012

“Which of the following initiatives are likely to be your IT organization's top project

and organizational priorities over the next 12 months?”

-- Increase our use of software-as-a-service (cloud applications)

Base: 1,176 North American and European IT decision-makers at firms with 1,000 or more employees

1%

15%

35%

48%

Don't know

Not on our agenda

Low priority

Critical or High priority

Page 5: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 5

Cloud Pulls the CISO in Many Directions

CISO and

Security

Organization

Changes, aka

Uneven

Handshake

2. LOB

procures

cloud

services

1. Cloud

Offers

Irresistible

Benefits

5. Security

Struggles to

Reduce Cloud

Security Risks

4. Data Center

Is Loosely

Coupled

3. CISO

Can’t Say No

All the Time

Page 6: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

Cloud Security Prepositions

Page 7: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 7

A: The Cloud is not just a new delivery platform

B: Cloud Security is NOT just continuing security and extending it to the cloud

Why Cloud Security is like a two component “explosive”, a unique blend:

Page 8: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2014 Forrester Research, Inc. Reproduction Prohibited

We’re moving to a single mobile form factor

Screen

Projector

E-ink

Smartboard

Docking station

Wearable glasses

Retina projectionFlexible display

KeyboardMouse

Touch

3D finger tracking

Gesture tracking

Body motionVoice commands

Page 9: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2014 Forrester Research, Inc. Reproduction Prohibited

Source: Google - The New Multi-screen World: Understanding Cross-platform Consumer Behavior, August 2014

Customers cross devices to accomplish a single goal

Page 10: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 10

Access to Apps Runs the Gamut

› You don’t control your users’ devices

› You don’t control your users’ devices

› You don’t control your users’ devices

› But you have to take inventory of apps they use

› And you have to control the apps they use

› And you have to protect the data they use

Page 11: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 11

Cloud Security Top Threats Move to Data

Page 12: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 12

Cloud Does NOT Shift the Responsibility of Data Protection

› “When data is transferred to a cloud, the responsibility for protecting and securing the data typically remains with the collector or custodian of that data.”

Cloud Security Alliance, Guidance v3.0

Page 13: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

13

General Challenges with Cloud Security› Ease of Use for End Users (you can’t control end users)

• Cloud security should not require users to change behaviors or

tools

› Inconsistent Control (you don’t own everything)

• The only thing you can count on is guest VM ownership

› Elasticity (not all servers are steady-state)

• Cloudbursting, stale servers, dynamic provisioning

› Scalability (highly variable server counts)

• May have one dev server or 1,000 production web servers

› Portability (same controls work anywhere)

• Nobody wants multiple tools or IaaS provider lock-in

Page 14: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 14

Technology Challenges with Cloud Security

› Data protection

› Workload separation and multi tenancy

› Information Rights Management

› SaaS providers don’t help much with security related

concerns

› Network Security

› Identity and Access Management (IAM) and Privileged

Identity Management (PIM)

› Business Continuity and Disaster Recovery (BCDR)

› Log Management (SIEM)

Page 15: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 15

Network perimeter is gone

Page 16: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 16

Consciously Building the Cloud Data Protection Onion

Discovery and Tagging

Risk Assessment

Encryption on Premise

DLP on premise and in the cloud

Behavioral Patterns

Identity Context

Encryption at Cloud Vendor

Page 17: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

Thank you

Andras Cser

+1 617.613.6365

[email protected]

Page 18: Forrester Research: Securing the Cloud When Users are Left to Their Own Devices

© 2013 Forrester Research, Inc. Reproduction Prohibited 18