Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global...

44
18 QUALYS SECURITY CONFERENCE 2018 Sumedh Thakar Chief Product Officer, Qualys, Inc. Regaining Our Lost Visibility

Transcript of Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global...

Page 1: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

18QUALYS SECURITY CONFERENCE 2018

Sumedh Thakar Chief Product Officer, Qualys, Inc.

Regaining Our Lost Visibility

Page 2: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Agenda

Why are we doing what we are doing?

The State of IT Now

Security Today

The Future of Security

How Qualys is Leading the Way

December 6, 2018 QSC Conference, 2018 2

Page 3: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

IT Transformation Infrastructure & Application

Page 4: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Digital Transformation

Holistic Transformation of Business to Digital

Cloud, Containers, IaaS, PaaS, OT, IIoT, IoT, Mobility, Web apps, APIs, Mobile Apps

December 6, 2018 QSC Conference, 2018 4

Page 5: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Clouds

East Coast Datacenter

NETWORKS

VMs

DB

STORAGE

BARE METAL

Work Stations

Mobile Workforce

Hybrid Cloud Overview Architecture

West Coast Datacenter

NETWORKS

VMs

DB

STORAGE

BARE METAL

On-Premise

Page 6: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Containers Real game changer

Hypervisor disappearing, bare metal is back

Kubernetes Infrastructure-as-code

Container-as-a-Service AWS Fargate

AWS Lambda function-as-a-service, serverless!

Kubefed?

“Priceline” for Containers?

December 6, 2018 QSC Conference, 2018 6

Page 7: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

DevOps This is real and highly contagious

Developer decides how infrastructure runs in production

Speeds up significantly how fast code goes to production

December 6, 2018 QSC Conference, 2018 7

Page 8: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

On-Prem Shrinking Datacenter Footprint

Increasing OT & IIoT

Corp IT – more distributed & mobile

More IoT!

December 6, 2018 QSC Conference, 2018 8

Page 9: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Enterprise Mobility != BYoD

Enterprise owned handheld devices

Indispensable to modern business

Running apps handling sensitive business & consumer data

Mobile!

December 6, 2018 QSC Conference, 2018 9

Page 10: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Web Apps & APIs

Web Apps for the humans

APIs for the inhumans

Wide window into all your data

December 6, 2018 QSC Conference, 2018 10

Page 11: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

SaaS More aaS everywhere

No infrastructure to manage

No Applications to code or manage

December 6, 2018 QSC Conference, 2018 11

Page 12: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

SaaS

December 6, 2018 QSC Conference, 2018 12

Page 13: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Security

Page 14: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

December 6, 2018 QSC Conference, 2018 14

IBM PC AT

Page 15: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

November 13, 1984 PC Magazine about IBM PC AT

“The AT provides the first real system for allowing executives to sleep at night:

A hard-to-duplicate ‘tubular’ key locks all but key holders out of the system”

December 6, 2018 QSC Conference, 2018 15

Page 16: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

34 years later No magic key = No sleep at night!

Same challenges x 10

No visibility across global hybrid infrastructure

Still need to do Vulnerability & Configuration management

Still need to monitor integrity of systems(?)

More data incoming into “SIEM” deployments

Basically no visibility to respond

Compliance demands on new infrastructure

December 6, 2018 QSC Conference, 2018 16

Page 17: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

December 6, 2018 QSC Conference, 2018 17

Page 18: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Future of Security

Transparent Orchestration

Built-in Automation the only real solution

Starts in DevOps

New generation of Security Analytics platforms

December 6, 2018 QSC Conference, 2018 18

Page 19: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys

Page 20: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Platform Approach Embracing our own Digital Transformation

Massive expansion of backend for visibility – 620 Billion security datapoints indexed

Comprehensive coverage of sensors – scanners, agents, cloud connectors, container sensors, passive sniffers and mobile agents

December 6, 2018 QSC Conference, 2018 20

Page 21: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Extending solutions into remediation & response

Building dedicated Data science team

Rapid expansion of R&D org

Key technology acquisitions & Investments

December 6, 2018 QSC Conference, 2018 21

Qualys Platform Approach

Page 22: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Acquisitions & Investments

December 6, 2018 QSC Conference, 2018 22

Nevis Passive Scanning & Secure Access Control

Netwatcher Event Correlation Platform

1Mobility Enterprise Mobility

Layered Insight Built-in Runtime Container Security

42Crunch Investment API Security

Frog 1

Frog 2

Page 23: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Cloud Apps

December 6, 2018 QSC Conference, 2018 23

Secure web applications with end-to-end protection

Web Application Scanning Web Application Firewall Block attacks and virtually patch web application vulnerabilities

WEB APPLICATION SECURITY

Security Configuration Assessment Automate configuration assessment of global IT assets

Policy Compliance PCI Compliance

Security Assessment Questionnaire

Assess security configurations of IT systems throughout your network

Automate, simplify and attain PCI compliance quickly

Minimize the risk of doing business with vendors and other third parties

COMPLIANCE MONITORING

ASSET MANAGEMENT

Asset Inventory Maintain full, instant visibility of all your global IT assets

CMDB Sync Synchronize asset information from Qualys into ServiceNow CMDB

File Integrity Monitoring Log and track file changes across global IT systems

Cloud Security Assessment Get full visibility and control across all public cloud instances

Continuously detect and protect against attacks, anytime, anywhere

Vulnerability Management Threat Protection Continuous Monitoring Pinpoint your most critical threats and prioritize patching

Alerts you in real time about network irregularities

IT SECURITY

Indication of Compromise Continuously monitor endpoints to detect suspicious activity

Container Security Discover, track, and continuously protect containers

Certificate Assessment

Cloud Inventory Certificate Inventory Inventory of all your cloud assets across AWS, Azure, GCP and others

Inventory of TLS/SSL digital certificates on a global scale

Assess all your digital certificates for TLS/SSL vulnerabilities

FIM

IOC

AI

VM CMTP

PCI

WAS WAF

PC

SAQ

CI

CRA

CRI

CS

CSA

SCA

SYN

Page 24: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Q4 2018 – more apps to come

December 6, 2018 QSC Conference, 2018 24

2018 2019

Patch Management – beta

Passive Network Senor (unmanaged assets) – beta

Global IT Asset Management (managed assets) – GA

AMPM

PAS

Page 25: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

2019 – even more apps to come! Secure Enterprise Mobility

Secure Access Control

API Security

Software Composition Analysis

Breach and Attack Simulation

Security Data Lake & Correlation Platform

December 6, 2018 QSC Conference, 2018 25

Page 26: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Unified Dashboards

December 6, 2018 QSC Conference, 2018 26

Page 27: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

DEMO

Page 28: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

It’s the Platform! (a real one)

Page 29: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still
Page 30: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Cloud Platform Environment Security at scale on hybrid clouds

15+ products providing comprehensive suite of security solutions

10,300+ customers

7 shared cloud platforms across North America, Europe & Asia

70+ private clouds platforms deployed globally... on-prem, AWS, Azure, GCP

16+ PB storage and 16,000 cores

December 6, 2018 QSC Conference, 2018 30

Page 31: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Cloud Platform Highlights 1+ trillion security events annually

3+ billion scans annually

2.5+ billion messages daily across Kafka clusters

620+ billion data points indexed in our Elasticsearch clusters

December 6, 2018 QSC Conference, 2018 31

Unprecedented 2-second visibility

Page 32: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Cloud Platform Sensors, Data Platform, Microservices, DevOps

December 6, 2018 QSC Conference, 2018 32

Application Services / Shared Services / Stream & Batch Processing / Reporting / Analytics

Cloud Agents

Passive Scanners Scanners Appliances Virtual Scanners

Qualys Streaming Data Backbone

Service Service Service Service Service

. . .

UI Portal

API

Internet Scanners

Page 33: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Sensor Platform Scalable, self-updating & centrally managed

December 6, 2018 QSC Conference, 2018 33

Physical Legacy data centers Corporate infrastructure Continuous security and compliance scanning

Cloud/Container Commercial IaaS & PaaS clouds Pre-certified in market place Fully automated with API orchestration

Continuous security and compliance scanning

Cloud Agents Light weight, multi-platform On premise, elastic cloud & endpoints Real-time data collection Continuous evaluation on platform for security and compliance

Passive Passively sniff on network

Real-time device discovery & identification

Identification of APT network traffic Extract malware files from network for analysis

API Integration with Threat Intel feeds CMDB Integration Log connectors

Virtual

Private cloud infrastructure Virtualized Infrastructure

Continuous security and compliance scanning

Page 34: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Data Platform-as-a-Service

December 6, 2018 QSC Conference, 2018 34

•  Highly scalable architecture •  Predictable performance at scale •  Distributed and fault-tolerant •  Multi-datacenter support •  Open-source •  Commodity hardware

Right database for the right use case

Page 35: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Data Platform-as-a-Service

December 6, 2018 QSC Conference, 2018 35

Ceph Object storage Moving Oracle and in-house blob storage into Ceph

Redis In-memory cache Improved system performance for frequently accessed data

Cassandra Low latency storage Source of truth for data across multiple products

Elasticsearch Search for anything Over 620 billion data points indexed Estimating about 1 trillion data points be year end

Kafka Asynchronous, event-driven architecture Foundation for Qualys Cloud Platform Over 2.5 billion messages per day

Page 36: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Microservices & Cloud Native Architectures Reduce risk and ship faster

December 6, 2018 QSC Conference, 2018 36

Change how we design and build applications and services

Service Service

Service Service

•  Monoliths to microservices •  Well defined APIs •  Packaged in containers •  Deployed on elastic infrastructure •  12-Factor apps •  CI/CD, Service Registry, Config Servers

Page 37: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

DevOps – Increased Efficiency

December 6, 2018 QSC Conference, 2018 37

Goal is to make software delivery vastly more efficient

Supporting about 80 shared and private cloud deployments

Page 38: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Automation - Infrastructure as Code

December 6, 2018 QSC Conference, 2018 38

Treat systems running your software as if they themselves are software Automate •  Infra provisioning •  Configuration management •  Deployments…

….all using code

Page 39: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Monitoring Systems - Observability

December 6, 2018 QSC Conference, 2018 39

Centrally monitor across all platforms using a single-pane view

End-to-end monitoring using •  Time series metrics •  Distributed tracing •  Log aggregation & analytics •  Alerting

Page 40: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Integrated Security - DevSecOps

December 6, 2018 QSC Conference, 2018 40

Built-in security practices across the DevOps lifecycle

Qualys-on-Qualys •  Manage vulnerabilities •  Comply with policies •  Secure and shield web apps •  Validate file integrity •  Monitor systems

Page 41: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Cloud Platform

December 6, 2018 QSC Conference, 2018 41

Messaging, Data, Analytics Platform

Integrated Suite of Applications FIM IOCCA AI VM CM TP PCI WAS WAFPC SAQIntegrated Suite of Applications

Shared Services

Subscription

Service

Authentication

Service

Authorization

Service

Indexing Service

Data Sync

Service

Tagging Service

Infrastructure and DevOps Toolchain

Logging

Monitoring

Config Mgmt.

Service Registry

CI/CD Docker/ Kubernetes

Page 42: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Qualys Cloud Applications

December 6, 2018 QSC Conference, 2018 42

Secure web applications with end-to-end protection

Web Application Scanning

Web Application Firewall Block attacks and virtually patch web application vulnerabilities

WEB APPLICATION SECURITY

Security Configuration Assessment Automate configuration assessment of global IT assets

Policy Compliance PCI Compliance

Security Assessment Questionnaire

Assess security configurations of IT systems throughout your network

Automate, simplify and attain PCI compliance quickly

Minimize the risk of doing business with vendors and other third parties

COMPLIANCE MONITORING

ASSET MANAGEMENT

Asset Inventory Maintain full, instant visibility of all your global IT assets

CMDB Sync Synchronize asset information from Qualys into ServiceNow CMDB

File Integrity Monitoring Log and track file changes across global IT systems

Cloud Security Assessment Get full visibility and control across all public cloud instances

Continuously detect and protect against attacks, anytime, anywhere

Vulnerability Management Threat Protection Continuous Monitoring Pinpoint your most critical threats and prioritize patching

Alerts you in real time about network irregularities

IT SECURITY

Indication of Compromise Continuously monitor endpoints to detect suspicious activity

Container Security Discover, track, and continuously protect containers

Certificate Assessment

Cloud Inventory Inventory of all your cloud assets across AWS, Azure, GCP and others

Inventory of TLS/SSL digital certificates on a global scale

Assess all your digital certificates for TLS/SSL vulnerabilities

FIM

IOC

AI

VM CMTP

PCI

WAS WAF

PC

SAQ

CI

CRA

CRI

CS

CSA

SCA

SYN Certificate Inventory

Patch Management (Beta) Select, manage, and deploy patches to remediate vulnerabilities

Page 43: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

Advanced Correlation & Analytics

December 6, 2018 QSC Conference, 2018 43

Network Security End Point Apps Cloud Users IoT Server Qualys Apps

Qualys Security Data Lake Platform Data Ingestion | Normalization | Enrichment | Governance

Threat Hunting Search | Exploration | Behavior Graph

ML/AI Service Patterns | Outlier | Predictive SoC

Security Analytics Anomaly | Visualization | Dashboard

UEBA User & Entity Behavior Analytics

Advanced Correlation Actionable Insights | Out-of-box Rules

Orchestration & Automation Integration | Playbooks | Response

Qualys Quick Connectors

IOCCA VM WAS WAFAI PC

Page 44: Regaining Our Lost Visibility - qualys.com · Same challenges x 10 No visibility across global hybrid infrastructure Still need to do Vulnerability & Configuration management Still

18QUALYS SECURITY CONFERENCE 2018

Thank You Sumedh Thakar

[email protected]