top 7 ways to protect your data in the face of shadow it and enterprise saas

13
The Top 7 Ways to Protect Your Data in the Face of Shadow IT and Enterprise SaaS

Upload: elastica-inc

Post on 26-Jun-2015

486 views

Category:

Technology


5 download

DESCRIPTION

(Watch this webcast with audio at http://elastica.net/od-webcast-7sins-dlp/ ) Do you find protecting your company’s sensitive data a challenge with the proliferation of unauthorized apps used by your employees, especially those on mobile devices? If you are like most companies, over 500 apps are running on your network at any given time. Many of these are mobile native apps running on wireless networks, where employees are storing everything from IP to customer data, often in violation of PII, PCI and PHI compliance. So what do you do? In this webcast, Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS, two noted cybersecurity experts and industry thought leaders, Centrify CTO, Paul Moore, and Zulfikar Ramzan, CTO from Elastica to learn how to: --Discover the presence of Shadow IT and understand the implications from an IT risk, governance, and compliance perspective --Get needed visibility and security controls between users and the cloud-based services they consume --Protect your data in the face of Shadow IT --Get enterprise identity access control to SaaS applications without the added cost of an alternate MDM solution.

TRANSCRIPT

Page 1: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

The Top 7 Ways to Protect Your Data in the Face of Shadow IT and Enterprise SaaS

Page 2: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

Zulfikar Ramzan, PhDCTO Elastica

Paul MooreCTO Centrify

• Introduction• Discussion• Q&A – If you have any

questions during the event, please type them into the panel on the right side of your screen.

Agenda

Page 3: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

New role of ITThe Good, the Bad, and the

Ugly

Broad definition; our

focus (SaaS)

Understanding Shadow IT

Page 4: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

Two kinds of orgs: those who use cloud and

those who don’t know

they use cloud

5000+ Apps tracked by

Elastica

Hundreds of file sharing apps

alone…

#1 Discover What’s on Your Network

Page 5: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

#2 Assess Security Implications

Not all SaaS App Created Equal

Understand App Usage

Page 6: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

Traditional control:

Black and white

Understand application

usage

#3 Act to Compensate For Risk

Protect against

front door and back

doorMALWAREMALWARE

INSIDER THREATINSIDER THREAT

PHISHINGPHISHING

Page 7: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

#4 Control Identity

• In the good old days we had centralized identity.• Now we have chaos• Identities are invisible• See #1

CLOUD (IaaS & PaaS)

CLOUD (SaaS)

MOBILE

DATA CENTER SERVERS

DATA CENTER APPS

by Red Hat

DESKTOPS

ID

ID

ID

ID

ID

ID

ID

IDID

ID

IDID

ID+

+

+

Page 8: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

CLOUD (IaaS & PaaS)

CLOUD (SaaS)

MOBILE

DATA CENTER SERVERS

DATA CENTER APPS

by Red Hat

DESKTOPS

ID

#4 Control Identity

• Use identity as the perimeter• Re-centralize user identity

into something you manage• Need apps that support

centralized identity• Or manage the user’s

passwords

Page 9: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

#5 Manage Shared Accounts

• Sometimes users have to share• Do it safely• Track the usage• Control usage

• Use discovery (#1) to find out what’s going on

The new identity database

Page 10: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

#6 Provision and Deprovision

• Ensure that users have accounts that match their corporate profile• Hire as salesperson -> Sales account in SalesForce• Move to marketing -> Marketing account in SalesForce, account in Marketo• Leave -> remove SalesForce and Marketo accounts

• IAM solution that supports it• Choose apps that support provisioning

Page 11: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

#7 Secure Mobile

• Shadow IT => BYOD, BYOD => Insecure• Use MDM to enforce policies

on devices• At least a PIN

• Use MDM that allows self service• Find / lock / wipe lost device,

• Use MDM that integrates with your IAM solution• Can match devices to users• Linked to hire / fire cycle

Page 12: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

Recap

#1 Discover what’s on your network#2 Assess Security Implications#3 Act to Compensate Risk#4 Control Identity#5 Manage Shared Accounts#6 Provision and deprovision#7 Secure Mobile

1 Discoverwhat’s on your network

2 AssessSecurity Implications

3 Actto Compensate Risk

4 ControlIdentity

5 ManageShared Accounts

6 ProvisionAnd deprovision

7 SecureMobile

Page 13: Top 7 ways to protect your data in the face of Shadow IT and Enterprise SaaS

Q&A

Thank You

If you have any questions, please type them into the panel on the right side of your screen and they will be answered in the order in which they come in

If you have any questions after the event about Elastica, please contact [email protected]

If you have any questions about Centrify, please contact [email protected]

To learn more, please go to:www.elastica.netwww.centrify.com