Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
-
Upload
bitglass -
Category
Technology
-
view
277 -
download
5
Transcript of Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
![Page 1: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/1.jpg)
webinarapr 26
2016
beyond the firewall:
securing the cloud with a
CASB
![Page 2: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/2.jpg)
cloud and mobile are inseparable...
saas
driving corporate data outside the firewall.
![Page 3: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/3.jpg)
security must evolve to
protect data outside the
firewall
ungoverned access to
corporate data in the cloud
hidden Shadow IT threats
sensitive data on
unmanaged devices
![Page 4: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/4.jpg)
the traditional approach to
security is inadequate
![Page 5: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/5.jpg)
native security features can’t be relied uponthe data blind spot
componentsusage/consumption
dataapplication
servicesservers & storage
network
layer
data
application
infrastructure
owner
enterprise
![Page 6: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/6.jpg)
CASB: a better approach to cloud security
identity
discovery
data-centric security
mobile
![Page 7: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/7.jpg)
pollwhat are your
casb deployment
plans?
![Page 8: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/8.jpg)
casb discoverygain visibility into your org’s cloud usage
■ analyze outbound data flows to learn what SaaS apps your organization is using
■ understand risk profiles of different apps
■ essential in process of enabling secure cloud app usage
![Page 9: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/9.jpg)
casb securitya data-centric approach
the new data reality requires a new security architecture
■ cross-device, cross-platform agentless data protection
■ granular DLP for data at rest and in motion
■ contextual access control
■ detailed logging for compliance and audit
![Page 10: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/10.jpg)
mobile security cannot be overlookedprotect data across all devices, managed and unmanaged
■ demand for byod continues to rise
■ employees have rejected mdm and mam
■ IT must securely enable access to frequently used apps
![Page 11: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/11.jpg)
casb identitycentralized identity management is key in securing data
■ cloud app identity management should maintain the best practices of on-prem identity
■ limit potential breaches with contextual multi-factor auth for high risk logins
![Page 12: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/12.jpg)
managed devices
application access access control data protection
unmanaged devices /
byod
in the cloud
Forward ProxyActiveSync Proxy
Device Profile: Pass● Email● Browser● OneDrive Sync
● Full Access
Reverse Proxy + AJAX VMActiveSync Proxy
● DLP/DRM/encryption ● Device controls
API Control External Sharing Blocked
● Block external shares● Alert on DLP events
Device Profile: Fail● Mobile Email● Browser● Contextual multi-factor auth
typical use caseonly CASB with real-time data protection on any device
![Page 13: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/13.jpg)
pollwhat are your
top cloud security needs?
![Page 14: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/14.jpg)
our solutions
cloud mobile discovery
![Page 15: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/15.jpg)
secure office 365 + byod
client■ 35,000 employees globally
challenge ■ Inadequate native O365 security■ Controlled access from any device■ Limit external sharing■ Interoperable with existing
infrastructure, e.g. Bluecoat, ADFSsolution
■ Real-time data visibility and control ■ DLP policy enforcement at upload
or download■ Quarantine externally-shared
sensitive files in cloud ■ Controlled unmanaged device
access
fortune 50 healthcar
efirm
![Page 16: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/16.jpg)
client■ 15,000 employees in 190+
locations globallychallenge
■ Mitigate risks of Google Apps adoption
■ Prevent sensitive data from being stored in the cloud
■ Limit data access based on device risk level
■ Govern external sharingsolution
■ Inline data protection for unmanaged devices/BYOD
■ Bidirectional DLP■ Real-time sharing control
secure google apps +
byod
business data
giant
![Page 17: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/17.jpg)
client■ 8000 employees ■ s&p 500
challenge ■ Lack of adherence to BYOD security
measures■ Failed MobileIron and SAP Afaria
deploymentssolution
■ Bitglass Agentless – device / OS independent
■ Fast deployment■ Logging for compliance with
internal data security policies■ Seamless integration with
ActiveDirectory
fortune 500
beverage co.
byod security
![Page 18: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/18.jpg)
our mission
total data
protection est. jan
2013
100+ custome
rs
tier 1 VCs
![Page 19: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/19.jpg)
resourcesmore info about cloud security
■ definitive guide to casbs
■ case study: fortune 100 healthcare firm secures o365
■ glass class: cloud security priorities for 2016
![Page 20: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/20.jpg)
download the gartner market guide to casbs
with predictions and recommendations, the market guide is an essential resource for formulating your CASB strategy
download the report
![Page 21: Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)](https://reader035.fdocuments.net/reader035/viewer/2022070510/58a810f21a28ab3d6e8b687f/html5/thumbnails/21.jpg)
bitglass.com@bitglass