closing the cloud security gap with a casb (in partnership with forrester)

Post on 12-Apr-2017

217 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

© 2016 Forrester Research, Inc. Reproduction Prohibited1

Total Data ProtectionOutside the Firewall

webinar

closing the cloud

security gap with a

CASB

© 2016 Forrester Research, Inc. Reproduction Prohibited2

Rich Campagn

aVP of Products

Andras CserVP, Principal

Analyst

guest speaker:

© 2016 Forrester Research, Inc. Reproduction Prohibited33

Cloud Pulls the CISO in Many Directions

CISO and Security

Organization Changes, aka

Uneven Handshake

2. LOB procures

cloud services

1. Cloud Offers

Irresistible Benefits

5. Security Struggles to

Reduce Cloud Security Risks

4. Data Center Is Loosely Coupled

3. CISO Can’t Say ‘No’ All the

Time

© 2016 Forrester Research, Inc. Reproduction Prohibited44

Cloud Security Means a Lot of Things to a Lot of People

› Security To the Cloud - how can employees securely interface with our Cloud Providers?

› Security In the Cloud - how can a Cloud Provider (MSFT, Salesforce) prove that they are secure?

› Security From the Cloud - how can we secure data accessed from the cloud?

› Organizational Implications - how cloud changes our IT security organization?

© 2016 Forrester Research, Inc. Reproduction Prohibited55

Why Cloud Security is like a two component glue, a unique blend:

A: The Cloud is not just a new delivery platform

B: Cloud Security is NOT just extending existing security to the cloud

The dual nature of cloud security

© 2016 Forrester Research, Inc. Reproduction Prohibited66

General Challenges with SaaS Security

› Ease of Use› Cloud security should not inhibit usage

› Inconsistent Control› You don’t own the app or infrastructure; data moves beyond the

firewall

› Controlling Access› Any user, any device can connect to cloud over public networks

› The “share” button!

› Cloud Proliferation› Whack-a-mole use of built-in app security controls is a losing

proposition.

© 2016 Forrester Research, Inc. Reproduction Prohibited77

Technology challenges with SaaS Security

› Access controls

› Limited and inconsistent native security

› Information Rights Management

› Identity and Access Management (IAM) and Privileged Identity Management (PIM)

› Log and event management

© 2016 Forrester Research, Inc. Reproduction Prohibited8

How do we avoid this?

When it comes to responsibilities…

© 2016 Forrester Research, Inc. Reproduction Prohibited99

Cloud Does NOT Shift the Responsibility of Data Protection

“When data is transferred to a cloud, the responsibility for protecting and

securing the data typically remains with the collector or custodian of that data.”

Cloud Security Alliance, Guidance v3.0 X

© 2016 Forrester Research, Inc. Reproduction Prohibited10

Who’s Responsible for SaaS Security?

swapped in new graphic/title to focus on SaaS security versus IaaS security.-Rich Campagna

© 2016 Forrester Research, Inc. Reproduction Prohibited1111

Consciously Building the Cloud Data Protection Onion

Discovery and Tagging

Risk Assessment

Encryption on Premise

Data Leakage Prevention

Encryption in transit

Identity Context

Encryption at Cloud Vendor

© 2016 Forrester Research, Inc. Reproduction Prohibited12

› Why do it?› We are moving our entire IT portfolio to the

cloud, can data protection follow and how?› How much should we pay for it?› Does CSG support our application portfolio?› How does it do provisioning?

Common questions Forrester gets about CSG

© 2016 Forrester Research, Inc. Reproduction Prohibited13

› Moving to the cloud is not optional› Compliance mandates: SOX, GLBA, HIPAA, HITECH,

FERC/NERC› Cloud cannot increase overall organizational risk› Privacy and data protection concerns mounting› Insider threats› Companies must discover, control and secure shadow IT› BYOD and “mobile first” is key

Why CSG is important to Forrester customers

© 2016 Forrester Research, Inc. Reproduction Prohibited14

Drivers for CSG Implementation

InformationRisk

Efficiency

Compliance

Flexibility

© 2016 Forrester Research, Inc. Reproduction Prohibited15

› S&R pros must control data dissemination› Scan and protect data at upload and download› Allow employees to work anywhere/any device› YOU are responsible for security of your data in the

cloud › Don’t blindly trust cloud app vendors’ built-in security› Discover risky unsanctioned cloud apps

Requirements for CSG

© 2016 Forrester Research, Inc. Reproduction Prohibited16

Source: Forrester Research World Cloud Security Solutions Forecast, 2015 To 2020 (Global)

© 2016 Forrester Research, Inc. Reproduction Prohibited17

Source: Forrester Research World Cloud Security Solutions Forecast, 2015 To 2020 (Global)

© 2016 Forrester Research, Inc. Reproduction Prohibited18

© 2016 Forrester Research, Inc. Reproduction Prohibited19

19

© 2016 Forrester Research, Inc. Reproduction Prohibited20

20

© 2016 Forrester Research, Inc. Reproduction Prohibited21

21

© 2016 Forrester Research, Inc. Reproduction Prohibited22

› Increased investment in Cloud Security› Support for multi-cloud deployments› (CASB) CSG = CDP + CASI + Cloud Data Governance› Hybrid Proxy + API + Log management preferred› Machine Learning/UBA to play a prominent role› IAM integration is a must› SIEM integration broadens› Cloud Data Governance: reviews, campaigns, roles, SoD

checks

Forrester’s Cloud Security Predictions

© 2016 Forrester Research, Inc. Reproduction Prohibited23

© 2016 Forrester Research, Inc. Reproduction Prohibited24

about bitglass

total data

protectionest. jan 2013

CA, NY, MN, MA, IL, NC

tier 1 VCs

© 2016 Forrester Research, Inc. Reproduction Prohibited25

our solutions

cloud mobile breach

25

© 2016 Forrester Research, Inc. Reproduction Prohibited26

secure office 365

+ byod

client:

■35,000 employees globally

challenge:

■Inadequate native O365 security■Controlled access from any device■Limit external sharing■Interoperable with existing

infrastructure, e.g. Bluecoat, ADFS

solution:

■Real-time data visibility and control ■DLP policy enforcement at upload or

download■Quarantine externally-shared sensitive

files in cloud ■Controlled unmanaged device access

fortune 50 healthcare

firm

© 2016 Forrester Research, Inc. Reproduction Prohibited27

client:

■15,000 employees in 190+ locations globally

challenge:

■Mitigate risks of Google Apps adoption

■Prevent sensitive data from being stored in the cloud

■Limit data access based on device risk level

■Govern external sharing

solution:

■Inline data protection for unmanaged devices/BYOD

■Bidirectional DLP■Real-time sharing control

secure google apps +

byod

business data giant

© 2016 Forrester Research, Inc. Reproduction Prohibited2828

Thank You!

Andras Cser+1 617.613.6365acser@forrester.com

Rich Campagna+1 408.203.7090

rich@bitglass.com

@bitglass

© 2016 Forrester Research, Inc. Reproduction Prohibited29

top related