leveraging channel resources meet tbi
play

leveraging channel resources Meet TBI Jeff Newton Joe Fizor Vice - PowerPoint PPT Presentation

The New Approach to Security leveraging channel resources Meet TBI Jeff Newton Joe Fizor Vice President of Enterprise Sales Solutions Engineer linkedin.com/in/jeffmnewton/ linkedin.com/in/joefizor/ CYXTERA TECHNOLOGIES | TBI as a Resource


  1. The New Approach to Security leveraging channel resources

  2. Meet TBI Jeff Newton Joe Fizor Vice President of Enterprise Sales Solutions Engineer linkedin.com/in/jeffmnewton/ linkedin.com/in/joefizor/ CYXTERA TECHNOLOGIES |

  3. TBI as a Resource Founded in 1991 Established as a Master Agency (technology distributor) 225 employees Chicago HQ, International Sales Best-in-class technology solution for complete connectivity All we know is B2B Agnostic consultation on data, network, voice, cloud, mobility and security 3 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  4. TBI as a Resource As a Master Agent. A technology consultant. Direct agreements with 100+ solution providers For channel partners: supplying organizations a recurring revenue model Consultants Value-added Resellers (VARs) Managed Service Providers (MSPs) Software Developers System Integrators For end-users: SMB, Mid and Enterprise consultation and sales for telecommunications and cloud technologies 4 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  5. Empowering selling partners to solve their customers’ technology needs through: Training • TBI University - certification program, partner experience liaison, training events and stewardship Marketing • Sales enablement tools, white label solutions, collateral, case studies, promotions Back-office, sales support and operations • Back-office, operational support, highly technical Telco, Cable and Cloud pre- and post- sales support, provisioning, installation and commissioning Finance • Transparent commission tracking, proactive management and troubleshooting CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  6. Our Partners’ Security Appetite Recently we conducted a research study of our partners business needs, investments in education, portfolio additions, etc. • 50% of respondents citing security as having the greatest potential for industry influence, transformative power and revenue generation. • Virtually all respondent companies (95%) are currently investing in emerging technologies. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud solutions. • Security is included in more than two- thirds of respondents’ portfolios, followed by hybrid cloud solutions, which are part of nearly half of respondents’ respective portfolios, and one in three currently offer SDN/SD-WAN and/or IoT solutions. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 6

  7. How a Software-Defined Perimeter Prevents Malicious Insiders, Over Privileged-Users and Compromised Third Party Access

  8. The Threat is REAL… Percentage of data breaches due to insider threat vary… Ponemon Institute/ 36 % 39 % CSO Online (2013) Symantec (2012) Online Trust Alliance 60 % 29 % Celent (2008) (2015) Central European University's 39 % 57 % Center for Media, Data and Forrester (2012) Society (2014) …but regardless of the number, the threat is real! 10 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  9. How are Networks Vulnerable Today?

  10. Yesterday’s network security doesn’t address today’s IT reality 1996 2017 Perimeter security has remained largely unchanged for the past 2 decades. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 12

  11. VPNs – It Isn’t Working… VPN - It Isn’t Working… KEY ISSUES: • VPNs Do NOT Equal Secure • Over-Privileged and Off To The Races CHALLENGES CREATED: • Lateral Movement • Horrible User Experience • Not Built for Cloud “60% of enterprises will phase out network VPNs by 2021.” - Gartner 13 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  12. Traditional Firewalls – It Isn’t Working... Firewalls - It Isn’t Working… KEY ISSUES: • Static - Configure and Forget • Ports and Addresses, Not Users CHALLENGES CREATED: • Over-Privileged Users • Exceptions Proliferation • Complex, Difficult to Manage • Not Designed for Cloud Architectures 14 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  13. NAC – It Isn’t Working... Network Access Control Its Complicated Complicated setup and management NAC Show Me The Money Generally very expensive and proprietary solutions. It Takes a Village LOTS of components and add-on solutions for it to work. 15 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  14. Common Weaknesses of Current Solutions… 1 Connect First, Authenticate Second 2 Static Controls for Dynamic Environments 3 Users are NOT IP Addresses or Devices 4 The Perimeter has Changed…and Continues to Change 5 The Bad Guys are Not Just on the Outside… 16 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  15. We Need a New Approach…

  16. A better approach to network security: Software-Defined Perimeter 2 3 1 Colocation Zero-trust model Identity-centric Built like cloud, for cloud Authentication before connection User- or device- based access control Distributed, stateless and highly scalable Integrates with directory services and IAM Dynamically-provisioned 1:1 connectivity Programmable and adaptive Unauthorized resources completely dark Context sensitive Dynamic and on demand CYXTERA TECHNOLOGIES | 18

  17. SDP: An industry consensus “ SDP enables organizations to provide people-centric, manageable, secure and agile access to networked systems. It is easier and less costly to deploy than firewalls ,VPN concentrators and other bolt- in technologies.” “ Legacy, perimeter-based security models are ineffective against attacks. Security and risk pros must make security ubiquitous throughout the ecosystem.” “ BeyondCorp doesn’t gate access to services and tools based on a user’s physical location or the originating network; instead, access policies are based on information about a device, its state, and its associated user. ” “ The SDP security model has been shown to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threat. ” CYXTERA TECHNOLOGIES | 19

  18. How Does a SDP Work? Traditional TCP/IP Not Identity Centric – Allows Anyone Access “Connect First, Authenticate Second” Software-Defined Perimeter Identity-Centric – Only Authorized Users “Authenticate First, Connect Second” CYXTERA TECHNOLOGIES |

  19. The Application View Executives Marketing Human Resources Research & Development Sales 21 CYXTERA TECHNOLOGIES |

  20. The Network View Executives Marketing Human Resources Users have too much network access… Research & Development Need to eliminate the gap between network Sales and application security 22 CYXTERA TECHNOLOGIES |

  21. What Does a SDP Look Like? Fine-grained Contextual Dynamically Consistent access Individualized Simplify authorization for awareness drives adjusts to new policies across perimeter for firewall and on-premises and access and cloud server heterogeneous each user security group cloud authentication instances environments rules 23 CYXTERA TECHNOLOGIES |

  22. Why Deploy Software Defined Perimeter Secure High Risk Users Secure and Compliant Alternative to Traditional and Assets Cloud Deployments Network Security • “Crown Jewels” • Extend to AWS & Azure • Simplify network • Third-party access • Manage users, not IP addresses • Reduce firewall rules • Privileged users • Improved compliance reporting • Eliminate NACs or VPNs 24 CYXTERA TECHNOLOGIES |

  23. Operational Benefits of SDP 90% 8 1 Social healthcare site reduced Multinational retailer Governmental agency reduced the number of firewall rules reduced the FTEs managing FTEs managing access to key systems by 90% firewall rules from 52 to 13 from 8 to 1 for over 15,000 users Financial services reporting body Cyber security consulting firm Global 50 financial replaced Cisco ISE to avoid $20K per reduced audit prep time from eliminated redundant firewalls switch upgrades as they expand 2.5 months to 17 days and VPNs into remote offices 25 CYXTERA TECHNOLOGIES |

  24. SUMMARY

  25. Summary Insider threats are Today’s Solutions A Software-Defined in your Network Do Not Work Perimeter Solves! • The perimeter is not a • Firewalls, VPNs and NAC • Creates a dynamic, unbreakable wall, as it was in solutions are yesterday’s individualized perimeter for the past. It is fuzzy (at best) and technology, and unable to meet each user and user-session – constantly changing. today’s insider threats. a network “segment of one”. • At least a quarter of all data • The dynamic nature of users and • Entitlements can be modified breaches are due to an insider cloud infrastructures demand an dynamically as necessary to threat. easier to manage, more flexible, meet environmental changes. and scalable solution. • The threats are not just on the • One solution to address security outside anymore. and compliance challenges – on premise and in the cloud. 27 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  26. TBI is an Agnostic Resource We offer several vendor-agnostic resources on security including our: Vendor-Agnostic Security Training Security EBook SDWAN Comparison Guide CYXTERA TECHNOLOGIES |

Recommend


More recommend