290 likes | 507 Views
Cloud Security:. Enabling Continuous, Scalable Security for Today’s Hyper Connected World. By Sumedh Thakar. Sumedh Thakar 15 years architecting cloud platforms; 10 years in Cyber Security VP of Research and Development. About me. Qualys, Inc. Established Leader in Enterprise Security
E N D
Cloud Security: Enabling Continuous, Scalable Securityfor Today’s HyperConnected World By Sumedh Thakar
Sumedh Thakar 15 years architecting cloud platforms; 10 years in Cyber Security VP of Research and Development About me Qualys, Inc. Established Leader in Enterprise Security Deployed in 55 of Fortune 100 Vulnerability, Threat, Compliance & Web Security Global platform that performs 1 Billion+ scans annually
Why care about securityat scale? • Perimeter ischanging dramatically
What is the NEW perimeter? Web Applications PhysicalData Center Mobile IaaS/PaaS VirtualData Center
50B The Internet of Things is Here 25B • In 2012 2.4 Billionpeople • connected to the Internet INTERNET OFTHINGS 12B 500M SOCIAL NETWORKS 250M 100M Internet Connected Devices .COM ARPANET WWW HTML TCPIP
Why care about security at scale? Web Applications PhysicalData Center Mobile • Attacks are • non-stop IaaS/PaaS VirtualData Center
How many attacks? • Honestly too manyto count
How do breaches happen? • In 2012, • External Threats made up • 98%of all breachescompared to 70% in 2007 • *Source: Verizon data breach report 2012
How do breaches happen? • 88% of all hacking attacks • use remote access from the internet • *Source: Verizon data breach report 2012
How do breaches happen?(In 2012) 81% 69% 10% 7% 5% +31% +20% Incorporatedmalware • utilized some formof hacking -19% Involved physicalattacks -4% employed socialtactics -12% resulted fromprivilege misuse • *Source: Verizon data breach report 2012
Web applications are the underbelly of the internet They are Everywhere!
Web application security is a challenge They are Custom
Is it enough to scan and pentest once a quarter? Security Needsto be Continuous
Continuous = Automation Security built into infrastructure Always ON Always analyzing Continuous monitoring
Sounds Impossible? Today’s tools need to evolve It’s not a choice anymore
New Security Architectureis needed • Legacy Enterprise Point SolutionsDo Not Scale
Cloud Oriented Architecture Web Applications PhysicalData Center Mobile IaaS/PaaS VirtualData Center
Security Platform based on COA Globally distributed Embedded in infrastructure Continuous Discovery Analyze and correlate in real time Alerting and reporting for appropriate stakeholders
COA platform enables Continuous Security at Scale Full 360 deg global visibility Scan/discover all assets daily Correlate diverse security data Integrate into SDLC Track compliance globally
Continuous Security and COA examples Monitor your perimeter by the minute? Fix vulnerabilities that matter? Is your Malware solution effective all alone? Web application security is manual?
COA platform deployment COA can be a private cloud
Continuous Security: Case Study US Department of State 400 worldwide embassies Grades based on formula Scan every 3 days 85% hosts fixed in 6 days
Continuous Cloud Security You CAN protect yourself • More than • 80%of all breaches • are from known vulnerabilities
SANS Top 20 www.sans.org/critical-security-controls/ Laws of Vulnerabilities laws.qualys.com SSL Pulse www.trustworthyinternet.org/ssl-pulse/ Thank Yousthakar@qualys.com