290 likes | 303 Views
Effectuating Multi-Cloud Access Security. Scott Gordon | CISSP. Multi-cloud secure access drivers and challenges Key requirements Stop gap issues 3 tenets for success How to build a Secure Access IT Service Implementing with Pulse Secure. Agenda. Living the Dream.
E N D
Effectuating Multi-CloudAccess Security Scott Gordon | CISSP
Multi-cloud secure access drivers and challenges • Key requirements • Stop gap issues • 3 tenets for success • How to build a Secure Access IT Service • Implementing with Pulse Secure Agenda
Living the Dream Access to the data center used to be simple VPN
Market & Technology Trends IOT Multi-Cloud Secure Access SaaS Public/Private Cloud Datacenter
WorkforceMobility BUSINESS & TECHNOLOGY TRENDS
Workforce Mobility Ensure anywhere, anytime, and any means, appropriate access? BUSINESS & TECHNOLOGY TRENDS
Multi-Cloud Workforce Mobility BUSINESS & TECHNOLOGY TRENDS
Multi-Cloud Optimize IT services All cloud forms IT consumerization DevOps Big Data analytics Workforce Mobility BUSINESS & TECHNOLOGY TRENDS
Visibility Workforce Mobility Multi-Cloud BUSINESS & TECHNOLOGY TRENDS
Visibility Who, What, Where Intelligence Automated Response IOT security Workforce Mobility Multi-Cloud BUSINESS & TECHNOLOGY TRENDS
Compliance Workforce Mobility Multi-Cloud Visibility BUSINESS & TECHNOLOGY TRENDS
Compliance Global, Regional GDPR, FISMA HIPAA, SOX PCI/DSS, PSD2 Workforce Mobility Multi-Cloud Visibility BUSINESS & TECHNOLOGY TRENDS
Before: Trust known users with a corporate device on the corporate LAN Now: Ubiquitous Secure Access must support diverse users and devices, diverse application delivery, and a perimeter-less corporate network Requirements for Enterprise Multi-Cloud “Secure Access is based on trust between the provider (service) & subscriber (consumer)”
Current Evolution - Quick Solve Silos • Mobile Apps • Apps • Cloud Security • Mobile GW • MAM, MDM • NAC • Web GW • VDI GW • VPN GW On-the-go Home network Untrusted LAN Guest WiFi • Cloud IaaS • AWS, Azure • Ent. http applications • Legacy C/S apps • VDI, Terminal Svcs • Cloud SaaS • Apps Datacenter
Secure Access Stop Gaps Multiple access systems, consoles, components, and dependencies Various end user client support Policy and enforcement limitations Network security lacks app, data context Operational visibility gaps Disparate management
Secure Access for Users, Devices and Information Beyond a single vendor SW defined Network Access Must support the Multi-cloud environment of the digital enterprise TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Incorporates existing app and infrastructure environment • Ubiquitous use of data center and cloud apps, resources • Enable mode-2, cloud-centric, DevOps app delivery
Must support the Multi-cloud environment of the digital enterprise Beyond a single vendor SW defined Network Access Secure Access for Users, Devices and Information TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Mobile and local users • Trusted and untrusted devices; end-user and IoT • Privileged, trusted, known and unknown users • Secret, classified, confidential and public domain information
Must support the Multi-cloud environment of the digital enterprise Secure Access for Users, Devices and Information Beyond a single vendor SW defined Network Access TENETS FOR MULTI-CLOUD SECURE ACCESS Strategic Considerations • Leverage infrastructure and proven technologies: SSO, SAML, NG-VPN/NAC… • Explore application of SDN, SDP, micro-segmentation • Plan key integrations and areas for automation
Multi-Cloud Secure AccessTactical Considerations People & Things Information / Resource IOT Enterprise and cloud Apps & Services Client Apps & Services Clients & Devices Private & Public infrastructure Network interface Corporate, private & public networks Trust based Secure Access
Building Out Multi-Cloud Secure Access ITSM New Business Application / Initiative 1 Outline Secure Access IT service scope and process. Prioritize secure access project scope, requirements. Migrate / Port Existing App, Infrastructure New Build Buy 2 Map groups, apps, resources, security requisites. Identify access scenarios by group, application. mode2 hosted 3 Build, refine and test policy. Start with visibility to refine, preempt usability issues. DC Private Public SaaS Public Private Public 4 Notify users of policy, technical support, SOC, audit.Phase in policy rollout; alert to enforce. Multi-Cloud Secure Access ITSM 5 Verify. Tune. Examine areas to integrate, automate. Document achievement, improvement, extend scope.
80 percent of Fortune 500 Over 20,000 customers 18M+ secured endpoints Delivering Secure Access solutions for people, devices, things and services. 48+ NPS 750+ employees globally 250 Patents
Comprehensive, Simple, Flexible User, Devices, Things Secure Access Multi-Cloud Ready Visibility Authentication Access Control Policy Connectivity Compliance IaaS SaaS Data Center
Management, Visibility, Orchestration Unified Client and Mobility Secure Access Platform Common Policy-based Access Broad Interoperability Hybrid IT, Cloud & Virtualization
Secure Access Portfolio Pulse Connect Secure Pulse Policy Secure Pulse Workspace Pulse vADC Pulse One Centralized Management Application Delivery Control NAC Mobile Container VPN