1 / 12

Protecting security clouds with intelligent IPS solutions

Protecting security clouds with intelligent IPS solutions. Dominic Storey Technical Director Sourcefire EMA. “What's in a name? that which we call a rose       By any other name would smell as sweet ;”. Cloud Computing = Outsourcing. Cloud computing MAY use virtualization.

hamal
Download Presentation

Protecting security clouds with intelligent IPS solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting security clouds with intelligent IPS solutions Dominic Storey Technical Director Sourcefire EMA

  2. “What's in a name? that which we call a rose      By any other name would smell as sweet;”

  3. Cloud Computing = Outsourcing

  4. Cloud computing MAY use virtualization

  5. Cloud computing and security • NOT • Your network • Your applications • Your security problem? • Think again • Your data • Your availability • Your identity • Your business risk

  6. So What are the security challenges?

  7. What are we protecting? • In the cloud: • Physical machines • Virtual servers • Virtual services • Asset sprawl “My concern right now isn’t what I’m being attacked with, its finding what I need to defend” Sourcefire customer

  8. How can Sourcefire help? • Monitor for intruders • Identify network assets • Monitor network behaviour • Enforce network configuration • Link to user identity • Automate everything to decrease response time and increase repeatability

  9. That’s’ a tall order! How’s it done?

  10. Monitoring virtualized services DC Sensor SF-Linux SF-Linux Sourcefire Virtual 3D Sensor™ Sourcefire Virtual Defense Center™

  11. Context is everything Event: Attempted Privilege Gain Target: 96.16.242.135(vulnerable) Host OS: Blackberry Applications: Mail, Browswer, Twitter Location: Whitehouse, US User ID: bobama Full Name: Barack Obama Department: Executive Branch How much security context would you like? Network and user context Event: Attempted Privilege Gain Target: 96.16.242.135(vulnerable) Host OS: Blackberry Applications: Mail, Browser, Twitter Location: Whitehouse, US Network context No context Event: Attempted Privilege Gain Target: 96.16.242.135

  12. Summary • Cloud computing is a new business paradigm, NOT a new technical paradigm • Security as important in the cloud • It’s YOUR business - security ultimately YOUR responsibility • You DO have a choice • Challenge your cloud vendor about their security practice • Ask for regular report and/or co-monitoring • Protect your own boundaries

More Related