1 / 27

Effectuating Multi-Cloud Access Security

Effectuating Multi-Cloud Access Security. Scott Gordon | CISSP. Multi-cloud secure access drivers and challenges Key requirements Stop gap issues 3 tenets for success How to build a Secure Access IT Service Implementing with Pulse Secure. Agenda. Living the Dream.

spielman
Download Presentation

Effectuating Multi-Cloud Access Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Effectuating Multi-CloudAccess Security Scott Gordon | CISSP

  2. Multi-cloud secure access drivers and challenges • Key requirements • Stop gap issues • 3 tenets for success • How to build a Secure Access IT Service • Implementing with Pulse Secure Agenda

  3. Living the Dream Access to the data center used to be simple VPN

  4. Market & Technology Trends IOT Multi-Cloud Secure Access SaaS Public/Private Cloud Datacenter

  5. WorkforceMobility BUSINESS & TECHNOLOGY TRENDS

  6. Workforce Mobility Ensure anywhere, anytime, and any means, appropriate access? BUSINESS & TECHNOLOGY TRENDS

  7. Multi-Cloud Workforce Mobility BUSINESS & TECHNOLOGY TRENDS

  8. Multi-Cloud Optimize IT services All cloud forms IT consumerization DevOps Big Data analytics Workforce Mobility BUSINESS & TECHNOLOGY TRENDS

  9. Visibility Workforce Mobility Multi-Cloud BUSINESS & TECHNOLOGY TRENDS

  10. Visibility Who, What, Where Intelligence Automated Response IOT security Workforce Mobility Multi-Cloud BUSINESS & TECHNOLOGY TRENDS

  11. Compliance Workforce Mobility Multi-Cloud Visibility BUSINESS & TECHNOLOGY TRENDS

  12. Compliance Global, Regional GDPR, FISMA HIPAA, SOX PCI/DSS, PSD2 Workforce Mobility Multi-Cloud Visibility BUSINESS & TECHNOLOGY TRENDS

  13. Before: Trust known users with a corporate device on the corporate LAN Now: Ubiquitous Secure Access must support diverse users and devices, diverse application delivery, and a perimeter-less corporate network Requirements for Enterprise Multi-Cloud “Secure Access is based on trust between the provider (service) & subscriber (consumer)”

  14. Current Evolution - Quick Solve Silos • Mobile Apps • Apps • Cloud Security • Mobile GW • MAM, MDM • NAC • Web GW • VDI GW • VPN GW On-the-go Home network Untrusted LAN Guest WiFi • Cloud IaaS • AWS, Azure • Ent. http applications • Legacy C/S apps • VDI, Terminal Svcs • Cloud SaaS • Apps Datacenter

  15. Secure Access Stop Gaps Multiple access systems, consoles, components, and dependencies Various end user client support Policy and enforcement limitations Network security lacks app, data context Operational visibility gaps Disparate management

  16. Tenets for Multi-Cloud Secure Access TENETS

  17. Secure Access for Users, Devices and Information Beyond a single vendor SW defined Network Access Must support the Multi-cloud environment of the digital enterprise TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Incorporates existing app and infrastructure environment • Ubiquitous use of data center and cloud apps, resources • Enable mode-2, cloud-centric, DevOps app delivery

  18. Must support the Multi-cloud environment of the digital enterprise Beyond a single vendor SW defined Network Access Secure Access for Users, Devices and Information TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Mobile and local users • Trusted and untrusted devices; end-user and IoT • Privileged, trusted, known and unknown users • Secret, classified, confidential and public domain information

  19. Must support the Multi-cloud environment of the digital enterprise Secure Access for Users, Devices and Information Beyond a single vendor SW defined Network Access TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Leverage infrastructure and proven technologies: SSO, SAML, NG-VPN/NAC… • Explore application of SDN, SDP, micro-segmentation • Plan key integrations and areas for automation

  20. Multi-Cloud Secure AccessTactical Considerations People & Things Information / Resource IOT Enterprise and cloud Apps & Services Client Apps & Services Clients & Devices Private & Public infrastructure Network interface Corporate, private & public networks Trust based Secure Access

  21. Building Out Multi-Cloud Secure Access ITSM New Business Application / Initiative 1 Outline Secure Access IT service scope and process. Prioritize secure access project scope, requirements. Migrate / Port Existing App, Infrastructure New Build Buy 2 Map groups, apps, resources, security requisites. Identify access scenarios by group, application. mode2 hosted 3 Build, refine and test policy. Start with visibility to refine, preempt usability issues. DC Private Public SaaS Public Private Public 4 Notify users of policy, technical support, SOC, audit.Phase in policy rollout; alert to enforce. Multi-Cloud Secure Access ITSM 5 Verify. Tune. Examine areas to integrate, automate. Document achievement, improvement, extend scope.

  22. Pulse Secure Access

  23. 80 percent of Fortune 500 Over 20,000 customers 18M+ secured endpoints Delivering Secure Access solutions for people, devices, things and services. 48+ NPS 750+ employees globally 250 Patents

  24. Comprehensive, Simple, Flexible User, Devices, Things Secure Access Multi-Cloud Ready Visibility Authentication Access Control Policy Connectivity Compliance IaaS SaaS Data Center

  25. Management, Visibility, Orchestration Unified Client and Mobility Secure Access Platform Common Policy-based Access Broad Interoperability Hybrid IT, Cloud & Virtualization

  26. Secure Access Portfolio Pulse Connect Secure Pulse Policy Secure Pulse Workspace Pulse vADC Pulse One Centralized Management Application Delivery Control NAC Mobile Container VPN

  27. Thank you

More Related