The Perimeter Security Retreat: Fall Back, Fall Back to the Server

17
Copyright 2016 Trend Micro Inc. Bill McGee, SVP & General Manager, Cloud and Data Center Security February 25, 2016 The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Transcript of The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Page 1: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.

Bill McGee, SVP & General Manager, Cloud and Data Center Security

February 25, 2016

The Perimeter Security Retreat:Fall Back, Fall Back to the Server

Page 2: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.2

Page 3: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.3

Page 4: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.4

Page 5: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.5

Page 6: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.6

1. Notificator. Retrieved from http://gizmodo.com/5254222/olde-timey-notificator-machine-twitters-like-its-1935

2. The Main Gate to Ninomaru Palace. Retrieved from http://en.wikipedia.org/wiki/Nij%C5%8D_Castle

3. Present plan of Nijo Castle. Retrieved from:http://en.wikipedia.org/wiki/Nij%C5%8D_Castle

4. Inner Walls and Moat of Nijo Castle. Rerieved from http://en.wikipedia.org/wiki/Nij%C5%8D_Castle

5. Nightingale Floor,. Retrieved from http://static.panoramio.com/photos/large/24443642.jpg

References

Page 7: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.7

PhysicalServers

Journey to the cloud is different for every

customerPublicCloud

Virtual Servers

Virtual Desktops

Hybrid Environments

Page 8: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.8

Cloud Security Challenges

Agility

CompliancePurchasing

Visibility

Page 9: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.9

Firewall IPS

On-premises

LoadBalancer

WebTier

AppTier

DBTier

Traditional on-premises securityApplied at the perimeter

Page 10: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.10

Build a workload-centric security strategy

DB Services

WebTier

in the cloud

AppTier

in the cloud

ElasticLoad

Balancer

WebTier

AppTier

Network &SecurityGroups

Page 11: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.11

Best Practices for Securing AWS Workloads*

• Understand Your Shared Responsibilities • Get Visibility of Cloud-based Workloads• Bake Security Into Workloads from

Development• Adopt a "No Patch" Strategy for Live

Environments• Use AWS Security Groups but Leverage a

Third-Party Firewall for Advanced Functionality• Adopt a Workload-Centric Security Strategy

* Source: Gartner research note – Best practices for securing workloads in Amazon Web Services, April 2015

Page 12: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.12

All in a single platform

Deep Security delivers

Intrusion Detection & Prevention

DevOps friendly Security

Virtual PatchingAdvanced Security Functionality

Actionable Insight

Page 13: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.13

Deep Security - Optimized for the Cloud

Deep Security can secure cloud and hybrid deployments with a single platform

Seamless integration with leading cloud providers:

• Auto-detect instances and rapidly protect them

• Fully scriptable, including tools to automate provisioning and set up

• Host-based protection so security isn’t a bottleneck

Page 14: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.14

Trend Micro Deep Security

Anti-malware

Integrity Monitoring

Intrusion Prevention

Log Inspection

Web Reputation

Host Firewall

Page 15: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.15

Ready & optimized for the cloud

Proven security for virtualized, converged and

hyper-converged environments

+

Page 16: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.16

SymantecIntel

Other

30.3%

Sources: 1. IDC Tech Spotlight: “Server Security: Virtualization & Cloud Changes Everything” January 2016;

Protecting more servers than anyone else

Market leader in server security for the 6th straight year!1

Page 17: The Perimeter Security Retreat: Fall Back, Fall Back to the Server

Copyright 2016 Trend Micro Inc.Copyright 2016 Trend Micro Inc.17

[email protected]