The New Approach to Security leveraging channel resources
Meet TBI Jeff Newton Joe Fizor Vice President of Enterprise Sales Solutions Engineer linkedin.com/in/jeffmnewton/ linkedin.com/in/joefizor/ CYXTERA TECHNOLOGIES |
TBI as a Resource Founded in 1991 Established as a Master Agency (technology distributor) 225 employees Chicago HQ, International Sales Best-in-class technology solution for complete connectivity All we know is B2B Agnostic consultation on data, network, voice, cloud, mobility and security 3 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
TBI as a Resource As a Master Agent. A technology consultant. Direct agreements with 100+ solution providers For channel partners: supplying organizations a recurring revenue model Consultants Value-added Resellers (VARs) Managed Service Providers (MSPs) Software Developers System Integrators For end-users: SMB, Mid and Enterprise consultation and sales for telecommunications and cloud technologies 4 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
Empowering selling partners to solve their customers’ technology needs through: Training • TBI University - certification program, partner experience liaison, training events and stewardship Marketing • Sales enablement tools, white label solutions, collateral, case studies, promotions Back-office, sales support and operations • Back-office, operational support, highly technical Telco, Cable and Cloud pre- and post- sales support, provisioning, installation and commissioning Finance • Transparent commission tracking, proactive management and troubleshooting CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
Our Partners’ Security Appetite Recently we conducted a research study of our partners business needs, investments in education, portfolio additions, etc. • 50% of respondents citing security as having the greatest potential for industry influence, transformative power and revenue generation. • Virtually all respondent companies (95%) are currently investing in emerging technologies. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud solutions. • Security is included in more than two- thirds of respondents’ portfolios, followed by hybrid cloud solutions, which are part of nearly half of respondents’ respective portfolios, and one in three currently offer SDN/SD-WAN and/or IoT solutions. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 6
How a Software-Defined Perimeter Prevents Malicious Insiders, Over Privileged-Users and Compromised Third Party Access
The Threat is REAL… Percentage of data breaches due to insider threat vary… Ponemon Institute/ 36 % 39 % CSO Online (2013) Symantec (2012) Online Trust Alliance 60 % 29 % Celent (2008) (2015) Central European University's 39 % 57 % Center for Media, Data and Forrester (2012) Society (2014) …but regardless of the number, the threat is real! 10 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
How are Networks Vulnerable Today?
Yesterday’s network security doesn’t address today’s IT reality 1996 2017 Perimeter security has remained largely unchanged for the past 2 decades. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 12
VPNs – It Isn’t Working… VPN - It Isn’t Working… KEY ISSUES: • VPNs Do NOT Equal Secure • Over-Privileged and Off To The Races CHALLENGES CREATED: • Lateral Movement • Horrible User Experience • Not Built for Cloud “60% of enterprises will phase out network VPNs by 2021.” - Gartner 13 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
Traditional Firewalls – It Isn’t Working... Firewalls - It Isn’t Working… KEY ISSUES: • Static - Configure and Forget • Ports and Addresses, Not Users CHALLENGES CREATED: • Over-Privileged Users • Exceptions Proliferation • Complex, Difficult to Manage • Not Designed for Cloud Architectures 14 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
NAC – It Isn’t Working... Network Access Control Its Complicated Complicated setup and management NAC Show Me The Money Generally very expensive and proprietary solutions. It Takes a Village LOTS of components and add-on solutions for it to work. 15 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
Common Weaknesses of Current Solutions… 1 Connect First, Authenticate Second 2 Static Controls for Dynamic Environments 3 Users are NOT IP Addresses or Devices 4 The Perimeter has Changed…and Continues to Change 5 The Bad Guys are Not Just on the Outside… 16 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
We Need a New Approach…
A better approach to network security: Software-Defined Perimeter 2 3 1 Colocation Zero-trust model Identity-centric Built like cloud, for cloud Authentication before connection User- or device- based access control Distributed, stateless and highly scalable Integrates with directory services and IAM Dynamically-provisioned 1:1 connectivity Programmable and adaptive Unauthorized resources completely dark Context sensitive Dynamic and on demand CYXTERA TECHNOLOGIES | 18
SDP: An industry consensus “ SDP enables organizations to provide people-centric, manageable, secure and agile access to networked systems. It is easier and less costly to deploy than firewalls ,VPN concentrators and other bolt- in technologies.” “ Legacy, perimeter-based security models are ineffective against attacks. Security and risk pros must make security ubiquitous throughout the ecosystem.” “ BeyondCorp doesn’t gate access to services and tools based on a user’s physical location or the originating network; instead, access policies are based on information about a device, its state, and its associated user. ” “ The SDP security model has been shown to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threat. ” CYXTERA TECHNOLOGIES | 19
How Does a SDP Work? Traditional TCP/IP Not Identity Centric – Allows Anyone Access “Connect First, Authenticate Second” Software-Defined Perimeter Identity-Centric – Only Authorized Users “Authenticate First, Connect Second” CYXTERA TECHNOLOGIES |
The Application View Executives Marketing Human Resources Research & Development Sales 21 CYXTERA TECHNOLOGIES |
The Network View Executives Marketing Human Resources Users have too much network access… Research & Development Need to eliminate the gap between network Sales and application security 22 CYXTERA TECHNOLOGIES |
What Does a SDP Look Like? Fine-grained Contextual Dynamically Consistent access Individualized Simplify authorization for awareness drives adjusts to new policies across perimeter for firewall and on-premises and access and cloud server heterogeneous each user security group cloud authentication instances environments rules 23 CYXTERA TECHNOLOGIES |
Why Deploy Software Defined Perimeter Secure High Risk Users Secure and Compliant Alternative to Traditional and Assets Cloud Deployments Network Security • “Crown Jewels” • Extend to AWS & Azure • Simplify network • Third-party access • Manage users, not IP addresses • Reduce firewall rules • Privileged users • Improved compliance reporting • Eliminate NACs or VPNs 24 CYXTERA TECHNOLOGIES |
Operational Benefits of SDP 90% 8 1 Social healthcare site reduced Multinational retailer Governmental agency reduced the number of firewall rules reduced the FTEs managing FTEs managing access to key systems by 90% firewall rules from 52 to 13 from 8 to 1 for over 15,000 users Financial services reporting body Cyber security consulting firm Global 50 financial replaced Cisco ISE to avoid $20K per reduced audit prep time from eliminated redundant firewalls switch upgrades as they expand 2.5 months to 17 days and VPNs into remote offices 25 CYXTERA TECHNOLOGIES |
SUMMARY
Summary Insider threats are Today’s Solutions A Software-Defined in your Network Do Not Work Perimeter Solves! • The perimeter is not a • Firewalls, VPNs and NAC • Creates a dynamic, unbreakable wall, as it was in solutions are yesterday’s individualized perimeter for the past. It is fuzzy (at best) and technology, and unable to meet each user and user-session – constantly changing. today’s insider threats. a network “segment of one”. • At least a quarter of all data • The dynamic nature of users and • Entitlements can be modified breaches are due to an insider cloud infrastructures demand an dynamically as necessary to threat. easier to manage, more flexible, meet environmental changes. and scalable solution. • The threats are not just on the • One solution to address security outside anymore. and compliance challenges – on premise and in the cloud. 27 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA
TBI is an Agnostic Resource We offer several vendor-agnostic resources on security including our: Vendor-Agnostic Security Training Security EBook SDWAN Comparison Guide CYXTERA TECHNOLOGIES |
Recommend
More recommend