soha systems devops summit new york june 2015

17
Don’t Go Naked in the Cloud Rob Quiros [email protected] June 1, 2015

Upload: robert-berlin

Post on 11-Aug-2015

82 views

Category:

Internet


0 download

TRANSCRIPT

Don’t Go Naked in the CloudRob Quiros

[email protected]

June 1, 2015

2

One Key Difference…

Data CenterInfrastructure Cloud

(AWS, Azure,…)

AppUser

App

User

3

Security and Remote Access

Apps

Employees

Customers

Partners

Bad Guys

DDoS attacks

Compromised credentials

Untrusted endpoints

Compliance

4

Shared Responsibility Model

Application

Hosted Operating System

Virtualization Layer

Physical Infrastructure

Customer Responsibility

Cloud ProviderResponsibility

5

Solution #1: Build Security Perimeter in your Cloud

Firewall

VPN

ADC

IDS

WAF

WANopt

DDoS

Firewall

User

Directory

Logging

Your Apps

Your Users

Your Admins

VPN

6

Solution #1: Build Security Perimeter in your Cloud

Firewall

VPN

ADC

IDS

WAF

WANopt

DDoS

Firewall

User

Directory

Logging

Your Apps

Your Users

Your Admins

VPN

6 Months

3 Engineers

$100,000

9

Solution #2: Expose Your Apps on The Internet

Your Apps

Your Users

Your Admins

SSH

HTTP

10

11

Good Morning!

12

Take your applications off the internet

Lock down your cloud to all inbound access

Yet still control security and access policy

With full logging and audit trail?

What If You Could….

?And have it running in 15 minutes?

13

Tackle Shared Responsibility with Soha Cloud

Architected for hybrid cloud & mobile world Distributed in-the-cloud security enforcement Centralized security oversight and control Performance-assured path between users and

apps

AWS

Azure

Vcloud Air

Private Cloud

Public Clouds

VMwareOpenStack

14

• Double proxy architecture takes your cloud off the Internet

• Soha Cloud provides all security and access control

• No network changes

Hide Your Clouds Behind Ours

Cloudlet dials out onlyNo inbound ports open to your Cloud

15

• User enters public URL for application into any browser

• Cloud authenticates user

• Optional MFA, 2FA, access control rules

• No Client on user device

Air Gap Between Your Apps and the Internet

INVISIBLE

No connectivity before user identity verified

16

Highly Available, Highly Scalable

17

Don’t Go Naked in the Cloud

GET

18

Sign up for a free account: http://soha.io/signup

Find us at BOOTH #131

email me (Rob @ SOHA dot IO) for a free upgrade to PREMIUM

To Learn More …

Thank you