Partner Webcast – Announcing Oracle CASB Cloud Service, an API-based Cloud Access Security Broker
-
Upload
oracleimc-innovation-modernization-center -
Category
Technology
-
view
471 -
download
6
Transcript of Partner Webcast – Announcing Oracle CASB Cloud Service, an API-based Cloud Access Security Broker
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Luca Martelli Director of Identity Management & Security EMEA Ian Davie Manager, Specialist Presales, EMEA Fabrizio Zarri Master Principal Sales Consultant Thanos Terentes Printzios Technology Adoption Manager, EMEA A&C
Security Cloud Services
Oracle CASB Cloud Service February 23rd 2017
EMEA Upcoming Security Webcasts & Events Partner Webcasts (@OracleIMC) • Identity Cloud Service – 26 Jan (replay Available) • CASB CS Palerra – 23 Feb • SMA and CC – March 27-28 April, Budapest, annual Oracle Partner Security Forum
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Agenda
• Security & Cloud? Oracle Cloud Security Strategy
• Why CASB? Market Opportunity
• CASB Use Cases
• Live Demo & Real Life Examples
• Pricing & Packaging
• CASB Buyer Persona
• Summary - Q&A
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
4
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Your Sensitive Data is Already in the Cloud
Oracle Public 5
2016 Cloud Security Research Report, Crowd Research Partner
79% Of enterprises are actively deploying cloud solutions in public, private, or hybrid cloud environments
% of Enterprises Deploying
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 6
Workloads are Everywhere Cloud is not just SaaS. Workloads are moving
rapidly to PaaS and IaaS
71% of large enterprise will shift some workloads to cloud by 2018
Enterprises plan to use an average of 6 clouds to run their workloads
2016 McKinsey, 2016 Right Scale
Oracle Public Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Modern Security Attacks Are…
Oracle Confidential
Not carried out by humans
(they are automated)
Not confined to network (they begin outside)
Not static
(they adapt)
IS YOUR SOC READY?
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Traditional SOC Challenges
Oracle Confidential
Manual processes (too many alerts, no context)
Static protection (not adaptive)
Focused within perimeter (not external data/apps)
IS YOUR SOC INTELLIGENT?
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 9
Threat intelligence
Oracle Identity SOC
CASB UEBA
Identity Management
SIEM
Automated remediation
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 10
Security Cloud Services: Enabling Faster and More Secure Cloud Adoption
Identity Cloud Service
Compliance Cloud Service
Security Monitoring & Analytics Cloud Service
Oracle Public Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
API Platform Cloud Service
Hybrid Data Security Protection: Database Security
CASB Cloud Service (Palerra)
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
A New Model is Required
Oracle Public 11
Secure
Monitor Respond
Discover
Automated response to augment already stretched security teams
Visibility into what and how cloud services are being used and by whom
Continuous
Visibility and
Verification
Proactive application and data security to ensure sensitive data is protected
Ability to detect threats if anomalous activity is occurring
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Public 12
CASB Cloud Service “Cloud Access Security Broker”
Oracle Public Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Discover Continuous visibility into cloud risk covering sanctioned and unsanctioned SaaS, PaaS, and custom applications on IaaS
Secure Automated controls covering users, data, content, applications, settings, and infrastructure with actionable intelligence
Monitor Continuous monitoring of user activity and security configurations identifying threats and compliance risks
Respond Automate incident management and remediation through native features as well as integration with existing solutions
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Palerra, Why we bought it
• CASB = Cloud Access Security Broker (Gartner definition), well know term in the security market
• “Oracle CASB CS ensures, protects and assures compliance of applications, workloads and sensitive data stored across cloud services
• Combination of visibility into cloud usage, data security, user behavior analytics, and security configuration, with automated incident responses.
• Customers can respond to cloud security incidents in real-time, protecting sensitive company data and workloads across all of the leading cloud services.
• Oracle CASB CS will help accelerate cloud adoption securely by providing comprehensive identity and security cloud services across leading clouds”
• This will also broaden the way we approach the customers / markets when it comes to heterogeneous clouds
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Gartner Facts to Know
• Automation is a requirement for cloud security
– "Through 2020, 95% of cloud security failures will be the customer’s fault”1
• The CASB market is growing fast
– “By 2020, 85% of large enterprises will use a cloud access security broker platform for their cloud services, which is up from less than 5% today”1
• CASB is a mandatory control
– “Gartner Identifies the Top 10 Technologies for Information Security in 2016,” and Cloud Access Security Brokers are at the top of that list2
Sources: 1. “Market Guide for Cloud Access Security Brokers,” 24 October 2016, Craig Lawson, Neil MacDonald, Brian Lowans, Brian Reed; 2. Gartner press release dated June 15, 2016, “Gartner Identifies the Top 10 Technologies for Information Security in 2016”
14
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Securing Clouds: Iaas Paas Saas
My mission-critical apps need deep
monitoring and governance!
15
I need broad visibility into all apps in
use!
Visibility Compliance Data Security Threat Protection
CASB
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle’s Palerra: The only CASB to be deployed in <5 minutes
Visibility Compliance Data Security Threat Protection
CASB IaaS PaaS SaaS
Direct Cloud Service Access
MOBILE USERS AND DEVICES
ENTERPRISE
INSIDE PERIMETER
SIEM IDaaS NGFW
DLP MDM
Enterprise Security
Integration
API Access
16
Ad
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle CASB Cloud Service
Oracle Public 18
Prevent
Detect Respond
Predict
Visibility Compliance Data
Security Threat
Protection
CASB – Four Pillars of Functionality
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle CASB Cloud Service Visibility
Oracle Public 19
Prevent Predict
Detect Respond
Shadow IT Discovery – Over 50K application database with risk ratings and app control integration Discover perimeter SaaS and apps from enterprise app store User & Activity Monitoring across entire cloud environment from IaaS to SaaS
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle Cloud Security Service Compliance
Oracle Public 20
Detect Respond
Prevent Predict
Configuration seeding, monitoring, and enforcement Detect over privileged users and assets Pre-built and customizable reports covering entire cloud service environment
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle Cloud Security Service Data Security
Oracle Public 21
Respond Detect
Prevent Predict
Detect changes to user access privileges or specific data sharing settings Integrate with content inspection capabilities from cloud service providers Detect anomalous activities and insider threats including large data download
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle Cloud Security Service Threat Protection
Oracle Public 22
Data science powered threat detection Incident response automation with built-in ticketing service and integration with 3rd party solutions Threat intelligence with real-time feeds
Detect Respond
Prevent Predict
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Ian Davie Manager, Specialist Presales, EMEA
Oracle CASB Cloud Service February 23rd 2017
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Use Cases Backup for Demo
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
CASB CS use case #1
My mission-critical apps need deep
monitoring and governance!
25
CISO VP/Dir. Of InfoSec
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Mission-critical apps: Security Automation with CASB CS
Provision and baseline
app config
Monitor user activity, data
and apps
Detect and prevent threats
Control user access
Automate incident
response
IaaS – PaaS – SaaS coverage
What makes Palerra unique:
App-to-App and BYoD-ready
Full security automation:
Predict -> Prevent -> Detect -> Respond
Secure Provisioning
Incident Response
26
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
CASB CS use case #2
I need broad visibility into all apps in
use!
27
CISO VP/Dir. Of InfoSec
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Broad visibility for all apps
All Cloud apps employees use....
What you need to see:
Third-party apps that get
installed...(e.g. Salesforce AppExchange)
Custom apps built by 3rd
party vendors in your PaaS...
Is your business at risk? Are there any active threats? How fast is Incident Response?
28
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Fabrizio Zarri Master Principal Sales Consultant
Real Life Experiences: Oracle CASB Cloud Service February 23rd 2017
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Understanding the Buyer Personas – Cloud Security
CISO •Economic Buyer •Responsible for setting information security strategy across company
VP/Dir. Of InfoSec •Secondary Buyer •Responsible for setting policies and protections •Monitors security posture
Security Operations •Monitors and responds to security incidents •Internal SOC or MSSP
Security Analyst •Investigates & performs forensics on incidents •Works w/ Cloud app admin to remediate
VP Risk/Compliance •Monitors compliance with policies
Cloud App Admin • Implements and maintains
security controls per InfoSec guidance
LOB Cloud Owner •Driver for cloud adoption •Not security saavy
KEY STAKEHOLDERS OTHER PERSONAS
Security Architect •Responsible for securing apps & infrastructure •Thinks like a hacker
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
CASB Cloud Service Subscription Pricing
CASB for Discovery
CASB for SaaS CASB for IaaS
• $900 per month per “monitored account” • Incl Unlimited IaaS users • Incl 10 GB of data per
month
Add-On
• $400 for each additional one (1) “gigabyte data capacity”
• $5 per month per “monitored service user”
CASB for Custom Apps
• $2500 per month per “monitored app” • Incl Unlimited app users • Incl 10 GB of data per
month
Pre-requisite
• Purchase of 1 unit of CASB for IaaS or CASB for PaaS (or both in cases where the app has dependencies on both)
• $2 per month per “monitored service user”
6
NOTE: If GBP requires a separate SKU for Oracle IaaS as compared to 3rd Party IaaS, we can add an additional SKU for that specifically; otherwise, the above generic SKU for IaaS will be used for both Oracle IaaS and 3rd Party IaaS
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
CASB Cloud Service Qualifying Questions (Sample) December 2016
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Qualification Checklist
• Enterprise cloud adoption strategy
• Top 5 security priorities for cloud
• Active or future security projects
• Do you know the Shadow IT usage?
• Are you monitoring user beahviour to protect against Intellectual Property loss and to get aligned with compliance requirements, also in the cloud?
• SalesForce, Office 365, Box, Google Apps, Amazon WS
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
AWS
A U D I E N C E D I S C O V E R Y Q U E S T I O N S
CISO, Security Architect, Engineering-Product Exec
How do you avoid configuration drifts of your AWS
settings to ensure compliance?
How quickly can you determine whether new costly
AWS instances have been launched?
How are you alerted of a potential attack on your
AWS environment?
How many applications/accounts do you have
running on AWS?
How many “IAM” users do you have in your AWS
environment?
B U S I N E S S P R O B L E M S
No visibility of admin/privileged user activity
No validation that application has been configured
securely
Inability to ensure compliance across
environments
Inability to readily answer questions from internal
legal, compliance, and enterprise risk teams
regarding cloud footprint
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Salesforce.com
A U D I E N C E D I S C O V E R Y Q U E S T I O N S
CISO, VP of InfoSec, Security Architect, CRM Lead
How many users do you currently have on SFDC?
What SFDC level/edition do you subscribe to?
Do you use applications that tie into SFDC from the
AppExchange?
Do you have any active or planned business critical
custom applications developed on the SFDC
platform?
Do you store information, such as pricing and
discounts, which you consider confidential or
sensitive in SFDC?
Do you provide access to SFDC for your partners?
B U S I N E S S P R O B L E M S
No visibility into SFDC Security posture
No validation that application has been
configured securely
Concerns over admin/privileged user activity
No way to prevent leakage of sensitive data
Slow detection of hijacked credentials or
malicious users
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Office 365
A U D I E N C E D I S C O V E R Y Q U E S T I O N S
CISO, VP of Infosec, Chief Risk Officer, Security Architect
How do you ensure that configurations like DLP
settings, retention settings, and sensitive
distribution groups are not inadvertently changed
and continue to comply with your guidelines?
How are you alerted when admin roles are
changed or new admin accounts are created?
Do you know which external users your
employees are sharing files with?
Do you know where your users are accessing
data from?
B U S I N E S S P R O B L E M S
Users are accessing O365 outside normal control
points / locations
Data exfiltration via collaboration
Slow detection of hijacked credentials or
malicious users
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Gartner Facts to Know
• Automation is a requirement for cloud security
– "Through 2020, 95% of cloud security failures will be the customer’s fault”1
• The CASB market is growing fast
– “By 2020, 85% of large enterprises will use a cloud access security broker platform for their cloud services, which is up from less than 5% today”1
• CASB is a mandatory control
– “Gartner Identifies the Top 10 Technologies for Information Security in 2016,” and Cloud Access Security Brokers are at the top of that list2
Sources: 1. “Market Guide for Cloud Access Security Brokers,” 24 October 2016, Craig Lawson, Neil MacDonald, Brian Lowans, Brian Reed; 2. Gartner press release dated June 15, 2016, “Gartner Identifies the Top 10 Technologies for Information Security in 2016”
37
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Awarness and Enablement Plan for Partners Demo / Trial (https://trial.palerra.net/ ) Workshops Partner Community Forum (April)
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
IDCS Workshop for Partners CASB Workshop for Partners
The workshop is designed to provide an introduction into Identity Cloud Service architecture, capabilities and functionality through live demos and hands-on exercises.
Two workshop versions:
- Short (4 hours) recommended for online delivery through Webex
- Full (1 day) recommended for in-class with hands-on labs
39
A Virtual Workshop will be offered to the partners attending this webcast Get in touch with your local partner manager or the contacts details at the end of this presentation to request a dedicated Virtual or in Room workshop for you and your team
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
• 2 days annual meeting with focused EMEA Identity&Security partners
• Benefits:
– Sharing about customer business priorities
– Getting the latest roadmaps and insights from HQ head of security development (HQ PMs Team + EMEA Team)
– Networking
• Expectations:
– Bidirectional conversations
Security Partner Community Forum Budapest – 27, 28 April 2017
40
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
• A&C Team
– Thanos Terentes Printzios
– Your Oracle Partner Manager
• EMEA Security
– Franck Hourdin
– Luca Martelli
– Patrick McLaughlin
– Prashant Barot
Regional Security Goto Persons:
– Alessandro Vallega, France, Italy
– Mauricio Gumiel, Iberia
– Karen Weebers, Benelux
– Dragan Petkovic, MEA
– Dimitris Theodoropoulos, EECIS
– Ernst Lorenz, North
– Paul Kennedy and Graeme Kerr, UKIE
– Natalia Diskin, Israel
Follow-up Contact Details in the Security Team ([email protected])
41
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 42
& EMEA Upcoming Security Webcasts & Events Partner Webcasts (@OracleIMC) • Identity Cloud Service – 26 Jan (replay Available) • CASB CS Palerra – 23 Feb • SMA and CC – 09 March * 27-28 April, Budapest, annual Oracle Partner Security Forum
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Stay In Touch Oracle IMC blog: http://blogs.oracle.com/imc
Oracle ECEMEA Partner Hub Homepage: http://oracle.com/goto/hub-ecemea
Oracle IMC Mail: [email protected]
Twitter: http://twitter.com/oracleimc
Facebook: http://facebook.com/oracleimc
LinkedIn: http://linkedin.com/groups/OracleIMC-4535240
Google+: http://plus.google.com/+OracleIMC
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |
Oracle Public 44
For More Information
Blogs.oracle.com/OracleIDM
@OracleSecurity /Oraclesecurity
• Learn about Security Cloud Services @ cloud.oracle.com/paas
• Learn about Identity Cloud Service @ oracle.com/IdentityCloud
• Watch for new service announcements @ oracle.com/security
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | 45