Webinar: Dispelling the Myths about Cloud Security
-
Upload
cyren-inc -
Category
Technology
-
view
376 -
download
1
Transcript of Webinar: Dispelling the Myths about Cloud Security
1©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document and the contents therein are the sole property of CYREN and may not be transmitted or reproduced without CYREN’s express written permission.
Dispelling the Myths about Cloud Security
Chris Taylor, CYREN Marketing
2©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Agenda
Can I trust the Cloud?
Common misconceptions about cloud security
CYREN WebSecurity – Cloud Security-as-a-Service
Q&A
3©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 3
Can I Trust the Cloud?
4©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Can I Trust the Cloud?
https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf
5©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Can I Trust the Cloud?
https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf
Also, 80% agree to some extent that conventional network (perimeter) security solutions don’t work well in cloud environments, and 76% agree their organizations lack visibility into attacks when applying traditional security in cloud infrastructure environments.
6©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Can I Trust the Cloud?
https://www.cloudpassage.com/assets/img/resources/cso-cloud-security-concerns-and-the-perceived-effectiveness-of-traditional-security-solutions-in-a-cloud-environment.pdf
7©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
What the Analysts Say…
"Cloud computing, by its very nature, is uniquely vulnerable to the risks of myths. It is all aboutcapabilities delivered as a service, with a clear boundary between the provider of the service and theconsumer. From a consumer perspective, 'in the cloud' means where the magic happens, where theimplementation details are supposed to be hidden. So it should be no surprise that such an environmentis rife with myths and misunderstandings."
David Mitchell Smith, Gartner
"The cloud is more secure than you are. If you're Coke and in the cloud, Pepsi can be right next door."James Staten, Forrester
"Cloud computing is perceived as less secure. This is more of a trust issue than based on any reasonableanalysis of actual security capabilities. To date, there have been very few security breaches in the publiccloud—most breaches continue to involve on-premises data center environments“
David Mitchell Smith, Gartner
8©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 8©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Some Common Misconceptions About Cloud Security
8
9©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
#1: The Cloud? We Don’t Use It
Yet enterprise apps have moved to the cloud (Office365)
The consumerization of IT brings personal cloud apps
into the enterprise
Saying ‘no’ is not an option any more
And “Shadow IT” is here to stay…
There is no control without first gaining visibility
“I’ve had discussions with CIOs who were indenial they were even in the cloud; it turns outthey were using a wide variety of Software asa Service apps.”
Jim Reavis, Cloud Security Alliance
10©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
#2: I Have No Control Over My Data
Determine controls needed, then select accordingly
Storage supports Corporate and regulatory compliance
Vendors adhere to certifications and standards
Ensure the application is multi-tenant and data is
encrypted and only accessible from the ‘home’ region
11©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
#3: Cloud is Less Secure than On-Premise
Yet the majority of breaches involve data from local systems
Most enterprise local apps are now Internet-connected
Cloud vendors have massive economies of scale/skill
Failure to keep security up to date = immediate customer loss
“Companies who store their own data, rather than using a cloud-based storage medium, must make asignificant and continuous investment in tools, training, and personnel charged with guarding the business'most significant assets: its knowledge. The defense, like the adversary, must be continuous, growing, andtireless; anything less will not suffice.“
Google study by Leviathan Security Group
12©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
#4: Cloud Security is Difficult to Manage
Data consolidation is done for you – one view of the world
No patches to apply, no service windows to manage
Capabilities enabled by license, not ‘forklift upgrade’
Vendors provide SLAs on all key elements
Your focus can be managing security, not the platform
13©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
#5: Appliances Give Me More Flexibility (Control)
Capacity planning is always a challenge with hardware
Appliances tie users/data/process to fixed locations –
this has nothing to do with how you do business!
The Cloud offers virtually limitless scale
Business growth (organic or by M&A) is easily supported
New technologies are seamlessly supported
14©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. 14©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
About CYREN
14©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN leverages superior Detection Engines,Big Data and Intelligent Analytics to deliver cloud-based Cybersecurity
15©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
CYREN Powers the World’s Security
200+ OEM customers
500K Points of presence
600M End users
17BDaily Transactions
16©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
TCO
Modern Threats Demand A Modern Solution
Security Roaming
17©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. © 2014 CYREN Confidential and Proprietary 17
Mobile App
Consumer Cloud
Private Cloud
Blocking Threats Enforcing Compliance
Cloud AppPublic Cloud
Analyzing Web Traffic Applying Cyber Intelligence
BotExploits APT
Malware
Roaming HomeOn Call Wearables/IoTPCP MobileHospital Clinic
A Comprehensive Internet Security Platform
18©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Malware Trends and Detection Speed
Malware Emails Malware URLs Zero-hourMalwaredetection
19©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Zero-Hour Phishing
The Fastest Detection Means Better Security
Compliance / ProductivityZero-Hour Malware
“CYREN consistently demonstrates the best performance; detecting new phishing attacks faster than others, and providing unique detection of many attacks.” Greg Ogorek, Sr. Director, Cyber Security Operations, Cyveillance
20©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Unified policy definition, enforcement and reporting
Each license covers a user for up to 5 different devices
No capital expense for hardware or software
Eliminates the cost and complexity of multiple appliances
Up-to-the-moment applied cyber intelligence
Simple to deploy, easy to administer - centralized or distributed
Scales and moves with you
The Lowest Total Cost of Ownership (TCO)
21©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Protect networks, notebooks, tablets and smartphones
Flexible controls for BYOD and corporate devices
No discernible impact compliant browsing experience
Secure Internet connectivity for IoT/wearables
Security and compliance public/guest WiFi networks
The Best Solution for Roaming and RemoteDesigned for modern business computing
22©2014. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
You can also find us here:
www.CYREN.com
twitter.com/cyreninc
linkedin.com/company/cyren
©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential.
Questions, Next Steps
Chris Taylor
CYREN Marketing
+1 703.760.3320
To Learn More or Request a Demo:
http://www.cyren.com/websecurity-direct.html