Cloud Security: Focusing On Automation And Thwarting APTs

Transcription

Cloud Security:Focusing on Automation andThwarting APTsDerek TumulakVP Product ManagementJune 5th 2013

Stark Reality of Security Industry Today:Perimeter Security is Failing100%94%of breaches are reportedby third partiesof victims have up-to-dateantivirus software100%416median number of daysadvanced attackers areon the network beforebeing detectedof breaches involvedstolen credentialsSource: mandiant.com/threat-landscape/2Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

“W e m ust accept the fact that no barrier isim penetrable, and detection/ responserepresents an ex trem ely critical line ofdefense. Let’s stop treating it lik e a back upplan if things go w rong, and start m ak ing it acore part of the plan.”Verizon Data Breach Report 20133Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data is the Target Server Data Biggest TargetlaptopsServersServersRecords Compromised 1%Records Compromised94%2012 DATA BREACH INVESTIGATION REPORT4Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data is the New Currency Protect What Matters – Your Sensitive Data“In the underground marketeconomy, data is money, andmuch like any other marketeconomy, principles of supplyand demand drive it.iForrester Research, Inc.Measure the Effectiveness of Your Data PrivacyProgram - January 20135Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Sensitive Data is the Target and No One is Immune6Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Plus There Are Insider Threats"At the bureau, about 24 percent of theincidents w e track on a yearly basis have to dow ith just accidental insiders — people being ak nuck lehead. W e spend about 35 percent of ourincident response tim e [on them ].”Patrick Reidy, CISO for the meaning-anddangerous.html?cid nl DR daily 2013-03-12 html7Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Market Drivers For Enhancing SecurityGlobal Compliance, Cloud Adoption, Big Data, Data BreachesGLOBALCOMPLIANCEAggressive NewRegulationsCLOUDADOPTIONEnterprise Security#1 Inhibitor1BIGDATABig Data is aBig TargetAPTsDATA BREACHES98% Stolen RecordsFrom Large Orgs21.2.8Global State of Information Security Survey by PwC, CIO magazine, and CSO magazine – October 2012Verizon Data Breach Investigation Report – March 2012Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Threats Behave Very Differently TodayOLD THREATSNEW THREATSSignatureBehavioralRandomTargetedMoves entCopyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Old Model is Weak Against New Threats —A Data-Centric Security Model is RequiredAdvanced Persistent ThreatsAPTs/New ThreatsSignature-Based KnownOld Threats / Old M tualPropertyFinancialDataAdvanced MalwareWebGateways10Worms, Virus, Spyware, BotsOne-Time EventsIntrusionPreventionSystemsCopyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Reducing the Attack Surface by RestrictingAccess to Data in the Cloud11Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Essential Data-Centric Security MeasuresAccess Policies Block privileged users like root from viewing data and thwart APTs Provide fine-grained control to determine who can view specific dataEncryption & Key Management Lock down the data using strong industry approved algorithms Centralized and hardened key management applianceSecurity Intelligence Log all access to what matters the protected data Provide valuable real-time intelligence on who is accessing protecteddata where and whenMulti-Tenancy Secure cloud data in commingled and multi-tenant environments Enable end customers to control policies specific to their own dataAutomation Automatic installation, configuration, and dynamic policyenhancements based on real-time threats Instant protection during new customer onboarding12Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.Vormetric Confidential

Use Case 1: Security Controls Managed bythe Cloud Service ProviderCloud Service ProviderKey and Policy ManagerVirtual ServersEnterprise #1AutomationToolkit(via SecureVPN)Enterprise #2Key Capabilities: Enterprises rely on cloud service provider to apply securitybest practices for encryption and key managementEnterprise #3 Demonstrate to end customers that cloud IT admins do nothave access to their data via access policies Provide rich security intelligence around who/what isaccessing protected data in the cloud13Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Use Case 2: Security Controls ManagedOn-Premise by the EnterpriseCloud Service ProviderVirtual ServersEnterprise DataCenterAutomationToolkit(via SecureVPN)AutomationToolkitPhysical or VirtualServersKey and PolicyManagerKey Capabilities: Key and policy management owned and driven on-premisefrom the enterprise Ability to implement data access policies across public andprivate cloud servers – block access from cloud IT admins Provide rich security intelligence around who/what isaccessing protected data in the cloud14Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data-Centric Security Must Be TransparentStrongTransparent to Business ProcessFirewall Your DataTransparent to Apps / UsersProtect Privileged User AccessProtect All Data TypesAutomatedCost SavingsProven With Most DemandingCustomersAvoid Error Prone Manual StepsEasy15Dynamic Real-Time ResponsivenessEfficientEasy to ImplementMinimal Performance ImpactEasy to Manage/AutomateSupport Existing SLAsEasy to UnderstandLow Administrative SupportCopyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Benefits of AutomationCost Savings With fewer manual steps time and money is saved Apply the 80/20 rule and automate the most common tasksAvoid Errors Manual steps often lead to mistakes This can be costly for your businessReal-Time Responsiveness Dynamic action can be taken based on events Security can be enhanced by increasing auditing or by even blockingaccess to data for certain users and processes16Copyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

Data-Centric Security ElementsAdvancedEncryptionFile and VolumeEncryption AgentsKeyManagementPhysicalApplication Agents Oracle and SQLServer TDE Keys ApplicationEncryption APIVirtualSecureVaulting(Certificates, Keys)PhysicalBig DataVirtualData Security ManagerEnvironment SupportVMPublic CloudHybridAutomatedToolkitsPhysicalVirtualPrivate Cloud &Virtualization AutomateDeployment Key & EncryptionManagementData CentersSecurityIntelligence Logs17Groups andUsersCopyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

ConclusionGet Ready for the Cloud Invest in security solutionsthat provide for a smoothtransition from physical tovirtual to cloud18Be Data-Centric Thwart APTs and maliciouscloud administrators bybringing controls closer tothe data and reducing theattack surfaceAutomate Drive additional cost savingsand dynamically adjustsecurity policy in real-timeCopyright 2013 Vormetric, Inc. – Proprietary and Confidential. All rights reserved.

ProtectWhat Matters

Global Compliance, Cloud Adoption, Big Data, Data Breaches . CLOUD ADOPTION . Enterprise Security #1 Inhibitor. 1 . APTs DATA BREACHES . 98% Stolen Records From Large Orgs. 2 . 1. Global State of Information Security Survey by PwC, CIO magazine, and CSO magazine - October 2012 2. Verizon Data Breach Investigation Report - March 2012. BIG DATA