As organizations adopt cloud computing, the perimeter moves into unprotected territory within these new environments. Where IT sees the cloud as an opportunity, security sees a new attack surface. Most companies have heavily invested in traditional multi-layer, security appliances—like firewalls and intrusion prevention systems which help with “north-south” protection. But, these controls are less effective in securing lateral or “east-west” traffic where the new perimeters sit. Worse, they were not designed to handle the sheer volume of cloud traffic--a significant operational hurdle.
Join this interactive webinar to learn more about:
- The latest cloud attack methods every security team should understand
- Anatomy of specific attack types including cross cloud, cross workload, cross data center, cross tenant, as well as, orchestration and serverless attacks
- Best practices on how to guard your enterprise
Brian Talbert, Alaska AIrlines; Enrique Salem, Bain Capital; Ami Hofman, Dimension Data; John Parker, ShieldX
According to ESG, 25 percent of organizations say maintaining strong and consistent security across their own data center and multiple public cloud environments with a centralized command-and-control a top CISO concern. So how do you do it?
Join Alaska Airlines Director of Network and Connectivity Solutions Brian Talbert, former Symantec CEO Enrique Salem and ShieldX VP of Products John Parker for a discussion on best practices for secure cloud migration. This panel will discuss:
- How security can help your company adopt a cloud first strategy
- Key threats security teams should expect.
- Why micro-segmentation becomes a critical control when your perimeter defenses are defeated
- How to gain visibility into your data center and cloud environments
- Overcoming common objections encountered during migration
According to the Global Information Security Workforce Study from (ISC)2, the worker shortage in cybersecurity will rise to 1.8 million by 2022, increasing by 20% from 2015. But the gap in skilled workers is already evident, with “66% of respondents reported not having enough workers to address current threats."*
In the second of our micro-segmentation TechTalk series, we’ll explore how this shortage creates a fundamental, operational roadblock for IT organizations implementing micro-segmentation in their highly-virtualized data centers and cloud deployments.
Simply stated, when moving from a flat to a segmented network - IT organizations want the benefits of micro-segmentation, but are challenged by the manual, resource-intensive, up-front work of documenting security requirements and formulating the sophisticated policies required to implement most solutions available on the market today.
ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will take you through the real-world challenges of the implementation process, highlight where automation is needed, provide best practices on achieving automation using machine learning, and offer guidance on how the admin experience may be visualized and optimized to support micro-segmentation projects.
Micro-segmentation deployment requirements – manually defining and assigning policy at scale
Get automated - applying machine learning for efficiency
Using it - best practices for visualizing an automatically segmented network
*International Info System Security Certification Consortium (ISC)2 (2017). Global Cybersecurity Workforce Shortage to Reach 1.8 Million as Threats Loom Larger and Stakes Rise Higher. https://www.isc2.org/en/News-and-Events/Press-Room/Posts/2017/06/07/2017-06-07-Workforce-Shortage.
According to MarketsandMarkets, “more than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” And with the rise of multi-cloud architectures, plans and budgets to employ micro-segmentation are on the rise too, to help protect against the lateral movement of an attack, its access to high-value assets, and its subsequent exfiltration of sensitive data.
But while ESG' research reports that already “68% of enterprise organizations use some type of software-based micro-segmentation technology” today, its implementation still presents challenges and fails to protect against today’s most pervasive assaults.
Specifically, today’s micro-segmentation solutions offer only simple, ACL-based control, failing to secure all layers of the protocol stack in a way that is also cost-effective and practical to operationalize, especially in newer and elastic, multi-cloud environments.
ShieldX Networks, a 2017 Gartner Cool Vendor in Cloud Security, will present a brief and instructional overview on the new criteria for effective micro-segmentation, including why micro-segmentation and security controls must work through Layer 7 to protect against advanced attacks, and how to evaluate a solution behind the hype to determine if the micro-segmentation product you plan to deploy will deliver the security you’ve been promised.
•Micro-segmentation state-of-the-union: What is it and how most IT organizations deploy it today
•Security challenges: What basic micro-segmentation does, and the compromises it misses
•Blueprint for effective micro-segmentation: Preventing the ‘confused deputy’ and its use in the spread of lateral attacks
Special events from ShieldX, Gartner Cool Vendor in Cloud Security
ShieldX is redefining cloud security to better protect organizations against cyber threats—regardless of where sensitive data resides or how it moves across public, private or multi-cloud environments. Organizations are using APEIRO to scale security and micro-segmentation on demand, support business innovation, meet compliance requirements and protect against the latest cyberattacks. Based in San Jose, CA, ShieldX was founded in 2015 and is privately funded. Contact us at ShieldX.com.
The Dissolving Perimeter-Security Experts SpeakPatrick Heim, CISO; Hal Lonas, CTO; Dr. Doug Jacobson, University Professor; Dr. Ratinder Ahuja, CEO[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]48 mins