Shift happens webinar deck

54

Transcript of Shift happens webinar deck

Page 1: Shift happens webinar deck
Page 2: Shift happens webinar deck

“The Only Thing That Is

Constant Is Change”

- Heraclitus of Ephesus

Around 500 B.C.

Page 3: Shift happens webinar deck

A (Very) Brief History of Network Security

Page 4: Shift happens webinar deck

A (Very) Brief History of Network Security

1837

Page 5: Shift happens webinar deck

A (Very) Brief History of Network Security

1837 1969

Page 6: Shift happens webinar deck

A (Very) Brief History of Network Security

1837 1969 1971

Page 7: Shift happens webinar deck

A (Very) Brief History of Network Security

1837 1969 1971 1994

Page 8: Shift happens webinar deck

A (Very) Brief History of Network Security

1837 1969 1971 1994 Present day

Page 9: Shift happens webinar deck

SHIFT HAPPENS

Page 10: Shift happens webinar deck
Page 11: Shift happens webinar deck

POLL

Page 12: Shift happens webinar deck

105 A.D.

Page 13: Shift happens webinar deck

105 A.D. 1564 1974

Page 14: Shift happens webinar deck

We are Using Yesterday’s

Technologies to Solve

Tomorrow’s Problems

Page 15: Shift happens webinar deck

What Happens When SHIFT Hits the Fan?

Page 16: Shift happens webinar deck

What Happens When SHIFT Hits the Fan?

“95% of Firewall breaches are the result of misconfiguration, not firewall flaws”

We put ourbusiness at

Risk

Page 17: Shift happens webinar deck

What Happens When SHIFT Hits the Fan?

We Disruptour business

Source: The State of Network Security 2014

Page 18: Shift happens webinar deck

What Happens When SHIFT Hits the Fan?

We Slow down

our business(Time=Money) Source: Examining the Impact of Security Management on the Business

Page 19: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Page 20: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Accelerated Application Delivery

Page 21: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Changing Network Architecture

Page 22: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Changing Threat Landscape

Page 23: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Changing Threat Landscape

Changing Network Architecture

Accelerated Application Delivery

Page 24: Shift happens webinar deck

Why Do We Deal with So Much (network security) SHIFT?

Changing Threat Landscape

Changing Network Architecture

Accelerated Application Delivery

Nothing to do with “Pure” Security

Page 25: Shift happens webinar deck

7 Deadly Sins of Security Change Management

Page 26: Shift happens webinar deck

Focusing on the “plumbing” instead of the business applications

7 Deadly Sins of Security Change Management

Page 27: Shift happens webinar deck

Not Removing Rules for Decommissioned Applications

7 Deadly Sins of Security Change Management

Page 28: Shift happens webinar deck

Ineffective Communication Between Teams

7 Deadly Sins of Security Change Management

Page 29: Shift happens webinar deck

Not documenting enough (or at all!)

7 Deadly Sins of Security Change Management

Page 30: Shift happens webinar deck

Not Reusing Existing Rules and ObjectsDB_srv = dbserver = databasesrv

7 Deadly Sins of Security Change Management

Page 31: Shift happens webinar deck

Not Performing Change Reconciliation

(no cowboy changes!)

7 Deadly Sins of Security Change Management

Page 32: Shift happens webinar deck

Manual “fat finger” input mistakes

(port 443 ≠ port 433)

7 Deadly Sins of Security Change Management

Page 33: Shift happens webinar deck

Best Practices for Security Change Management

Page 34: Shift happens webinar deck

Think Process First(Not just for adding rules!)

Best Practices for Security Change Management

Page 35: Shift happens webinar deck

Single Pane of GlassAcross Teams

-Security, Ops, Apps

Across Environments- Physical, Virtual, Cloud

Across Devices and Vendors- Firewalls, Router, Proxies

Best Practices for Security Change Management

Page 36: Shift happens webinar deck

Application-Centric Approach

- map application flows

Best Practices for Security Change Management

Page 37: Shift happens webinar deck
Page 38: Shift happens webinar deck
Page 39: Shift happens webinar deck
Page 40: Shift happens webinar deck
Page 41: Shift happens webinar deck
Page 42: Shift happens webinar deck
Page 43: Shift happens webinar deck
Page 44: Shift happens webinar deck

Proactively Assess Risk (what-if)

Best Practices for Security Change Management

Page 45: Shift happens webinar deck

Network Segmentation Seamlessly Enforced

Page 46: Shift happens webinar deck

Perform Validation and Reconciliation

Best Practices for Security Change Management

Page 47: Shift happens webinar deck
Page 48: Shift happens webinar deck
Page 49: Shift happens webinar deck

Automate EVERYTHING that can be automated- Change design- Policy Push- Risk Analysis- Documentation- More…

Best Practices for Security Change Management

Page 50: Shift happens webinar deck

Managing Security at the Speed of Business

Page 51: Shift happens webinar deck

Company Overview

5

1

1000+ Customers in 50 countries including 15 of the Fortune 50

The Leader in Security Policy Management

“Obsession” for Customer Satisfaction

Award-Winning Security Management Suite

Technology Partner Ecosystem

Page 52: Shift happens webinar deck

Firewall Analyzer

Security Policy Analysis & Audit

FireFlow

Security Policy Change Automation

BusinessFlow

Application ConnectivityManagementBusiness

ApplicationsSecurity

Infrastructure

The AlgoSec Suite

5

2

Application Owners

AlgoSec Security Management Suite

SecurityNetwork Operations

Page 53: Shift happens webinar deck

5

3

Page 54: Shift happens webinar deck

Learn more algosec.comLearn even more blog.algosec.comSeeing is believing algosec.com/demo

Q&A