Download presentation
Presentation is loading. Please wait.
Published byKathryn Dean Modified over 9 years ago
1
DIRECT-TO-CLOUD Issues & Implications Dale McCarty
2
DTC IN THE NEWS “Just Like Everything Else in the Enterprise Space, Security is About to be Disrupted”
3
Users work from home or on-the-go Users who BYOD Cloud-based applications used by an enterprise employees use Facebook at work TRENDS TRANSFORMING IT This is the biggest transformation in IT security in the last 20 years.
4
MPLS backhaul kept life under control for IT Internet Backhaul On the Road/Mobile Regional Gateway Headquarters Branch Internet VPN Backhaul MPLS Home/Hotspot No policy or protection TRADITIONAL IT Servers, applications & Data at Corp HQ or DC Protect the perimeter with firewalls Gateway proxies to protect Users MPLS backbone connected various offices
5
Internet breakout off-loaded MPLS circuits for ”trivial” applications On the Road/Mobile Regional Gateway Headquarters Branch Internet VPN Backhaul MPLS Home/Hotspot No policy or protection Internet Backhaul THE NET EFFECT Perimeter becomes dynamic Applications & data are moving to the cloud Users embrace mobile apps Gateway proxies and firewalls get bypassed
6
Internet DISAPPEARING PERIMETER Full policy & protection MPLS On the Road/Mobile Headquarters Branch Home/Hotspot Direct-to-Cloud reduces MPLS backhaul & improves user experience Regional Gateway Perimeter becomes “the world wide web” The Cloud becomes a Data Center Users are going direct to net for applications Policy can only be enforced in the Cloud
7
G EO IP & “REAL” CLOUDS Los Angeles Dallas Chicago (East) Denver Toronto New York Washington DC Atlanta (South) S. Amer. Hub (Miami) Paris Sao Paulo Johannesburg London Amsterdam Oslo Bern Frankfurt (West) Gdansk Stockholm Moscow Mumbai Chennai Singapore Sydney Hong Kong Tokyo Madrid Taipei Dubai Riyadh Cairo Kuwait City Kuala Lumpur Cape Town San Francisco Sunnyvale Santiago Lima Amman Atlanta (North) Herndon Ft. Worth Chicago (West) Frankfurt (South) Nigeria
8
DIRECT-TO-CLOUD TOPOLOGY Block the bad, protect the good Regional Office Home or Hotspot HQ On-the-go Social Media Cloud Apps Mobile Apps Botnet Exploits Compliance-based security: URL filters & A/V Protection Risk-based security: Behavioral Analysis & Data Loss Prevention
9
Not Infrastructure! (That is the role of traditional firewalls, IPS, etc.) Secure Users Proxy-based Data Loss Prevention and SSL Intercept & Decrypt Protect Data Improve Response Time and Selective Access Enable Applications Prioritize bandwidth by application and reduce backhaul Streamline WAN WHAT DIRECT-TO-CLOUD CAN …AND CAN’T DO
10
QUESTIONS? (and thank you for your attention!)
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.