BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.

Slides:



Advertisements
Similar presentations
THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Barracuda Networks Steve Scheidegger Commercial Account Manager
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Cloud computing.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
Ultimate Test Drive A Partner Led Program. The Ultimate Palo Alto Networks Experience 2 | ©2014, Palo Alto Networks. Confidential and Proprietary. The.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
Perimeters and Unicorns: Two Things That Only Exist in IT Fairyland Gary Paluch, CISSP, Sr. Sales Engineer.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Micro segmentation with Next Generation Firewall and Vmware NSX
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Palo Alto Networks - Next Generation Security Platform
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Complete Cloud Security Anyone, anywhere, any app, any device.
Blue Coat Cloud Continuum
OFFICE 365 APP BUILDER PROFILE: Druva
Protect your Digital Enterprise
Deployment Planning Services
Understanding DATA LOSS PREVENTION
Cloud App Security vs. O365 Advanced Security Management
Do you know who your employees are sharing their credentials with
Hybrid Management and Security
6/3/2018 9:04 PM BRK2374 Stop data exfiltration and advanced threats in Microsoft Office 365 and Azure Jigar Shah, Megha Tamvada Palo Alto Networks © Microsoft.
FSP SAFELY ENABLE YOUR SaaS APPLICATIONS Garry Coldwells – SEM.
Basic Policy Overview Palo Alto.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Threat Ready: The Benefits of Segmentation
Virtualization & Security real solutions
Prevent Costly Data Leaks from Microsoft Office 365
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
MISSION STRATEGIC DIRECTION
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
O365 Data Compliance Control of sensitive data is key to cloud adoption Addressing Legal and Regulatory Data Compliance requirements is now a critical.
Case Study 1: Security Considerations
NSX Data Center for Security
Increase and Improve your PC management with Windows Intune
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Security Delivery Platform for the Micro-segmented Data Center
Chapter # 3 COMPUTER AND INTERNET CRIME
SaaS Usage Report Guide
Security in SharePoint and Teams with DLP, IRM, and AIP
Cloud Computing for Wireless Networks
Presentation transcript:

BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS

2 | © 2015, Palo Alto Networks. Confidential and Proprietary. AGILITY DRIVING CHANGE Public Cloud (IaaS, PaaS) Software as a Service (SaaS) Private Cloud (SDN, NSX, ACI)

3 | © 2015, Palo Alto Networks. Confidential and Proprietary. DATA BREACHES SURGE Source: MALICIOUS INSIDER 15% ACCIDENTAL DATA LOSS 25% MALICIOUS OUTSIDER 55% 1,541

4 | © 2015, Palo Alto Networks. Confidential and Proprietary. BUSINESS IMPACTS OF SAAS SANCTIONED Fast to deploy Minimal cost Infinitely Scalable UNSANCTIONED Violates Compliance Loss of corporate IP Malware distribution

5 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SECURITY REQUIREMENTS ANALYSIS Data volume and direction, malware and threats ENFORCEMENT Granular policy based on function VISIBILITY Apps, users, usages, categories and statistics

6 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS DISCOVERY AND ANALYSIS New SaaS characteristics, ~400 apps, in 26 categories Leverage next-generation tools; NGFW, CASB, or CAP Build custom reports

7 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS REPORTING

8 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SPECIFIC RISKS MALICIOUS DATA EXFILTRATION ACCIDENTAL DATA EXPOSURE MALWARE PROPAGATION

9 | © 2015, Palo Alto Networks. Confidential and Proprietary. MALWARE PROPAGATION

10 | © 2015, Palo Alto Networks. Confidential and Proprietary. Share With: Marketing Mark (CFO) mark Anyone with the link ACCIDENTAL DATA EXPOSURE

11 | © 2015, Palo Alto Networks. Confidential and Proprietary. Share all files publicly! MALICIOUS DATA EXFILTRATION

12 | © 2015, Palo Alto Networks. Confidential and Proprietary. SOLUTION REQUIREMENTS CONTEXTUAL CONTROL OF DATA EXPOSURE PROGRAMABLE DOCUMENT CLASSIFICATION MALWARE DETECTION AND REMOVAL DETAILED CONTENT INSPECTION AND ANALYTICS

13 | © 2015, Palo Alto Networks. Confidential and Proprietary. CLOUD DELIVERED SECURITY USER AGNOSTIC No agents required or app limitations PREVENTS THREATS Malware detection RETROACTIVE POLICY Policy applies to past and future events DEPLOYMENT AGNOSTIC No network changes or new HW/SW to install APERTURE

14 | © 2015, Palo Alto Networks. Confidential and Proprietary. CLOUD DELIVERED SECURITY APERTURE WILDFIRE

15 | © 2015, Palo Alto Networks. Confidential and Proprietary. SAAS SECURITY PILLARS VISIBILITY Applications usage and statistics SAAS ACCESS Access to and from SaaS applications SAAS CONTROL Data exposure and threat protection NGFW PLATFORM CASB/CAP

16 | © 2015, Palo Alto Networks. Confidential and Proprietary. COMPLETE SAAS SECURITY APERTURE GLOBALPROTECT WILDFIRE

17 | © 2015, Palo Alto Networks. Confidential and Proprietary. COMPLETE DATA SECURITY Public Cloud Software as a Service Private Cloud GLOBALPROTECT APERTURE