SlideShare uma empresa Scribd logo
1 de 32
Copyright © 2018 Forcepoint | 1
Securing Your Cloud Applications
Managing Risk - Making the Invisible, Visible
Joakim (JK) Lialias
Sr. Director, Product Marketing, Cloud Security
Copyright © 2018 Forcepoint | 2
HOW DO YOU SECURE A WORLD WHERE YOU OPERATE
ON THE INTERNET BUT DON’T OWN THE INTERNET
Internet
Your Corporate Network
Employees
Suppliers
Partners
Customers
Copyright © 2018 Forcepoint | 3
THE CONTINUED TRANSITION TO CLOUD
PRIVATE
CLOUD
HYBRID
CLOUD
PUBLIC
CLOUD
85% of customers
have a multi-cloud
strategy
70% of IT Spend
will be cloud based by
2020
40% of
enterprises are
cloud first
Copyright © 2018 Forcepoint | 4
THE NEW NORMAL IN NUMBERS…
Up to 40% of IT spend is
Shadow IT (Unsanctioned)
>1,000 SaaSapps
used at a typical enterprise company
1/3 of enterprises will experience a
successful attack targeting their Shadow
IT resources by 2020
Copyright © 2018 Forcepoint | 5
ARE YOU READY FOR THE NEXT WAVE OF SHADOW IT INNOVATION?
Source: chiefmartec.com http://cdn.chiefmartec.com/wp-content/uploads/2016/03/marketing_technology_landscape_2016_3000px.jpg
Copyright © 2018 Forcepoint | 6
ARE YOU READY FOR THE NEXT WAVE
OF CLOUD APPLICATIONS OR YOUR CURRENT STATE?
Copyright © 2018 Forcepoint | 7
CUSTOMER SECURITY NEEDS AS THEY ADOPT THE CLOUD
I need visibility into what my users are doing in the
cloud to understand my risks and protect my users
I need to be able to monitor and control how my
users interact with my critical cloud applications
I need security that helps me safely embrace the cloud
Copyright © 2018 Forcepoint | 8
SO HOW DO CUSTOMERS ACHIEVE BALANCE AND FOCUS?
VISIBILITY CONTROL
THE ART OF MANAGING RISK: MAKING THE INVISIBLE, VISIBILE
CASB solution will help to eliminate security blind spots
and control security for cloud applications
Copyright © 2018 Forcepoint | 9
ELIMINATE SECURITY BLIND SPOTS FOR ANY CLOUD APPS
DISCOVERY
Insight into what apps are
being used by employees
ENFORCEMENT
Automated threat prevention and
context-aware policy enforcement
RISK ASSESSMENT
Contextual risk of apps, users,
and security configurations
ACCOUNT TAKE OVER DATA PROTECTION DEVICE ACCESS CONTROL
ACCOUNT CONTROL & MONITORING AUDIT OF USER ACTIVITIES
FORCEPOINT CASB
Copyright © 2018 Forcepoint | 10
▸ Full user activity
monitoring
▸ Full blocking and
alerting
▸ No API dependency
▸ Quickly add new apps
▸ Quick time to value
▸ No internal politics
▸ Certified by provider
▸ No end user impact
Cloud Apps
API
Cloud Apps
Proxy
FLEXIBLE CASB DEPLOYMENT OPTIONS - MULTI-MODAL
Pros
Pros
1. Cloud APIs
2. Cloud Proxy
Copyright © 2018 Forcepoint | 11
SECURITY USE CASES FOR UNSANCTIONED CLOUD APPS
2. Identify Risky Apps
4. Identify Users in Risk
1. Visibility into Shadow IT
3. Prevent Risky Usage
Copyright © 2018 Forcepoint | 12
SECURITY USE CASES FOR SANCTIONED CLOUD APPS
1. Prevent Cyber Threats
2. Prevent Data Leakage
3. Control External File Sharing
4. Manage Admins & Privileged Accounts
5. Manage BYOD Access
6. Monitor All User Activity
CONTROL
Copyright © 2018 Forcepoint | 13
CLOUD APP DISCOVERY
Copyright © 2018 Forcepoint | 14
USER RISK DASHBOARD
Delivering a quick view of overall risk posture to accelerate investigation
and remediation
Copyright © 2018 Forcepoint | 15
DETAILED LOG INFORMATION OF INDIVIDUAL USER
Copyright © 2018 Forcepoint | 16
TIMELINE OF FLAGGED INDIVIDUAL USER RISK ACTIVITIES
Drill down to an
individual incident
to determine what
actions to take
Copyright © 2018 Forcepoint | 17
DIVING DEEPER INTO A SINGLE USER INCIDENT
Easy drill down to determine exactly what happened to trigger incident and
learn the recommendations that Forcepoint offers to remediate.
Copyright © 2018 Forcepoint | 18
DATA CLASSIFICATION DASHBOARD (O365 EXAMPLE)
Copyright © 2018 Forcepoint | 19
ADDING DATA CLASSIFICATION POLICY
Easily add policies such as data types to be monitored, filters to be applied,
and actions to take when encountering specified data type
Copyright © 2018 Forcepoint | 20
ASSESSING RISK PROFILE OF DATA
Quick view and analysis of sensitive content
Copyright © 2018 Forcepoint | 21
MODIFYING ACCESS CONTROLS
Copyright © 2018 Forcepoint | 22
MANAGING ENDPOINT ACCESS
The Security Analyst can also set up manual enrollment for devices
Copyright © 2018 Forcepoint | 23
FORCEPOINT DELIVERY OF CASB FUNCTIONALITY
Forcepoint
DLP
Forcepoint
CASB
Forcepoint
Web Security
Forcepoint
NGFW
Copyright © 2018 Forcepoint | 24
EXTENDING CASB FUNCTIONALITY TO WEB SECURITY
Integrating Secure Web Gateway and CASB
• Visibility and control for unsanctioned cloud applications (version 8.3 and 8.4)
• With version 8.5 introducing a module called Cloud Application Control
What is the Cloud Application Control Module?
• CASB capabilities for Cloud Application traffic as it traverses the Forcepoint Web Security Solution.
• Proxy based activity visibility
• Anomaly detection + UEBA + Risk analysis
• Real-time mitigation options
• AD and SIEM integration
• Seamless and smooth implementation of CASB with one proxy
All CASB supported cloud apps & automatic
update of additional applications
Copyright © 2018 Forcepoint | 25
Copyright © 2018 Forcepoint | 26
DLP CLOUD APPLICATIONS POWERED BY FORCEPOINT CASB
Data in motion AND data discovery
Inline & platform native APIs
Upload; Download; Sharing
Enterprise DLP features:
GDPR; Fingerprinting; Machine Learning;
Incident Risk Ranking; OCR (8.6);
Forcepoint hosted solution
1
2
3
4
5
Supported
Applications
Copyright © 2018 Forcepoint | 27
FOUR CORE DLP USE CASES FOR CLOUD APPLICATIONS
1. Prevent sensitive data being uploaded and
stored in authorized cloud applications
2. Prevent sensitive data being shared with
unauthorized external parties or employees.
3. Discover (audit) then remediate sensitive data
that is stored in authorized cloud applications.
4. Prevent employees or external actors
downloading sensitive data to unauthorized
devices
Copyright © 2018 Forcepoint | 28
FORCEPOINT CASB VS DLP 8.5
Forcepoint CASB
Security Suite
Forcepoint DLP 8.5
(w/ Cloud Applications)
Monitor, audit and control access to IT approved
cloud applications
Monitor, audit and control access to applications not
approved by IT
Monitor, audit and control access to IaaS
infrastructure and in-house cloud applications.
Real-time Activity Monitoring & Analytics
Provide DLP visibility and control over regulatory
compliance data sets (PCI DSS + EU GDPR)
Provide DLP visibility and control over IP and
regulated data set using data fingerprinting.
DLP Incident Risk Ranking to prioritize DLP activity
for security operations teams
Protect regulated data and IP from data loss across
cloud applications; endpoints; web and email traffic.
Copyright © 2018 Forcepoint | 29
FORCEPOINT ADVANCED MALWARE DETECTION (AMD) ADDS…
• Unmatched accuracy that eliminates
crippling false positives
• Comprehensive and actionable
intelligence to optimize remediation
efforts for incident response teams
• Full system emulation to effectively
counter advanced evasions
• Shared global threat intelligence that
can update other solutions
+100% efficacy in advanced
malware detection1
Zero false positives when
convicting or exonerating advanced
malware3
1. NSS Labs 2016 APT Test (Lastline)
Seamless integration with CASB, Email, NGFW, and Web Security
solutions for a comprehensive defense
Copyright © 2018 Forcepoint | 30
CUSTOMERS TRUST FORCEPOINT FOR CLOUD APP VISIBILITY
AND CONTROL
“Forcepoint CASB has given
us the visibility and control
that we need in order to fully
leverage the potential of
cloud applications on mobile
devices.”
Luis Aguiar, Manager –
Infrastructure Delivery Team
Leader, Metro Bank
Copyright © 2018 Forcepoint | 31
ELIMINATE SECURITY BLIND SPOTS FOR CLOUD APPLICATIONS
• Support for ANY cloud application (IaaS, PaaS,
SaaS, or homegrown cloud application)
• Discover Shadow IT applications and assess risk
• Centrally assess and control users, data, and
security policies
• Unique real-time behavioral anomalies and user
activity monitoring (Cloud UEBA)
• Flexibility to add cloud applications by being
deployed in both API (offline) and Proxy (inline)
• Enforce risk-based multi-factor authentication
Forcepoint CASB eliminates security blind spots for cloud applications by
following the rhythm of your people and flow of your data
DISCOVERY
ENFORCEMENT
RISK ASSESSMENT
Copyright © 2018 Forcepoint | 32
READY TO FIND YOUR RISKIEST CLOUD USER?
https://www.forcepoint.com/cloud-threat-assessment
Register for a FREE Cloud Threat Assessment

Mais conteúdo relacionado

Mais procurados

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and ComplianceQuadrisk
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
Introduction To IPaaS: Drivers, Requirements And Use Cases
Introduction To IPaaS: Drivers, Requirements And Use CasesIntroduction To IPaaS: Drivers, Requirements And Use Cases
Introduction To IPaaS: Drivers, Requirements And Use CasesSynerzip
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information ProtectionAndrew Bettany
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMSAkesh Patil
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 

Mais procurados (20)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Azure storage
Azure storageAzure storage
Azure storage
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Introduction To IPaaS: Drivers, Requirements And Use Cases
Introduction To IPaaS: Drivers, Requirements And Use CasesIntroduction To IPaaS: Drivers, Requirements And Use Cases
Introduction To IPaaS: Drivers, Requirements And Use Cases
 
2 Modern Security - Microsoft Information Protection
2   Modern Security - Microsoft Information Protection2   Modern Security - Microsoft Information Protection
2 Modern Security - Microsoft Information Protection
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMS
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Cost Optimization on AWS
Cost Optimization on AWSCost Optimization on AWS
Cost Optimization on AWS
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 

Semelhante a CASB: Securing your cloud applications

Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaCristian Garcia G.
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityDoug Copley
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityForcepoint LLC
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Technologies
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 

Semelhante a CASB: Securing your cloud applications (20)

Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificadaProteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Cloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & SecurityCloudy with a Chance of...Visibility, Accountability & Security
Cloudy with a Chance of...Visibility, Accountability & Security
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 

Mais de Forcepoint LLC

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIForcepoint LLC
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesForcepoint LLC
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint LLC
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?Forcepoint LLC
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouForcepoint LLC
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksForcepoint LLC
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial TsunamiForcepoint LLC
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryForcepoint LLC
 

Mais de Forcepoint LLC (20)

Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)Rethinking the concept of trust (DoDIIS 2019 presentation)
Rethinking the concept of trust (DoDIIS 2019 presentation)
 
Sparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security BehaviorsSparking Curiosity to Change Security Behaviors
Sparking Curiosity to Change Security Behaviors
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Using Language Modeling to Verify User Identities
Using Language Modeling to Verify User IdentitiesUsing Language Modeling to Verify User Identities
Using Language Modeling to Verify User Identities
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Forcepoint Advanced Malware Detection
Forcepoint Advanced Malware DetectionForcepoint Advanced Malware Detection
Forcepoint Advanced Malware Detection
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
A Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human FocusA Predictive “Precrime” Approach Requires a Human Focus
A Predictive “Precrime” Approach Requires a Human Focus
 
Cyber Convergence, Warfare and You
Cyber Convergence, Warfare and YouCyber Convergence, Warfare and You
Cyber Convergence, Warfare and You
 
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)
 
Security Insights for Mission-Critical Networks
Security Insights for Mission-Critical NetworksSecurity Insights for Mission-Critical Networks
Security Insights for Mission-Critical Networks
 
Maintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps ScatterMaintaining Visibility and Control as Workers and Apps Scatter
Maintaining Visibility and Control as Workers and Apps Scatter
 
Embracing the Millennial Tsunami
Embracing the Millennial TsunamiEmbracing the Millennial Tsunami
Embracing the Millennial Tsunami
 
Shift the Burden
Shift the BurdenShift the Burden
Shift the Burden
 
Revolutionary, Not Evolutionary
Revolutionary, Not EvolutionaryRevolutionary, Not Evolutionary
Revolutionary, Not Evolutionary
 

Último

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

CASB: Securing your cloud applications

  • 1. Copyright © 2018 Forcepoint | 1 Securing Your Cloud Applications Managing Risk - Making the Invisible, Visible Joakim (JK) Lialias Sr. Director, Product Marketing, Cloud Security
  • 2. Copyright © 2018 Forcepoint | 2 HOW DO YOU SECURE A WORLD WHERE YOU OPERATE ON THE INTERNET BUT DON’T OWN THE INTERNET Internet Your Corporate Network Employees Suppliers Partners Customers
  • 3. Copyright © 2018 Forcepoint | 3 THE CONTINUED TRANSITION TO CLOUD PRIVATE CLOUD HYBRID CLOUD PUBLIC CLOUD 85% of customers have a multi-cloud strategy 70% of IT Spend will be cloud based by 2020 40% of enterprises are cloud first
  • 4. Copyright © 2018 Forcepoint | 4 THE NEW NORMAL IN NUMBERS… Up to 40% of IT spend is Shadow IT (Unsanctioned) >1,000 SaaSapps used at a typical enterprise company 1/3 of enterprises will experience a successful attack targeting their Shadow IT resources by 2020
  • 5. Copyright © 2018 Forcepoint | 5 ARE YOU READY FOR THE NEXT WAVE OF SHADOW IT INNOVATION? Source: chiefmartec.com http://cdn.chiefmartec.com/wp-content/uploads/2016/03/marketing_technology_landscape_2016_3000px.jpg
  • 6. Copyright © 2018 Forcepoint | 6 ARE YOU READY FOR THE NEXT WAVE OF CLOUD APPLICATIONS OR YOUR CURRENT STATE?
  • 7. Copyright © 2018 Forcepoint | 7 CUSTOMER SECURITY NEEDS AS THEY ADOPT THE CLOUD I need visibility into what my users are doing in the cloud to understand my risks and protect my users I need to be able to monitor and control how my users interact with my critical cloud applications I need security that helps me safely embrace the cloud
  • 8. Copyright © 2018 Forcepoint | 8 SO HOW DO CUSTOMERS ACHIEVE BALANCE AND FOCUS? VISIBILITY CONTROL THE ART OF MANAGING RISK: MAKING THE INVISIBLE, VISIBILE CASB solution will help to eliminate security blind spots and control security for cloud applications
  • 9. Copyright © 2018 Forcepoint | 9 ELIMINATE SECURITY BLIND SPOTS FOR ANY CLOUD APPS DISCOVERY Insight into what apps are being used by employees ENFORCEMENT Automated threat prevention and context-aware policy enforcement RISK ASSESSMENT Contextual risk of apps, users, and security configurations ACCOUNT TAKE OVER DATA PROTECTION DEVICE ACCESS CONTROL ACCOUNT CONTROL & MONITORING AUDIT OF USER ACTIVITIES FORCEPOINT CASB
  • 10. Copyright © 2018 Forcepoint | 10 ▸ Full user activity monitoring ▸ Full blocking and alerting ▸ No API dependency ▸ Quickly add new apps ▸ Quick time to value ▸ No internal politics ▸ Certified by provider ▸ No end user impact Cloud Apps API Cloud Apps Proxy FLEXIBLE CASB DEPLOYMENT OPTIONS - MULTI-MODAL Pros Pros 1. Cloud APIs 2. Cloud Proxy
  • 11. Copyright © 2018 Forcepoint | 11 SECURITY USE CASES FOR UNSANCTIONED CLOUD APPS 2. Identify Risky Apps 4. Identify Users in Risk 1. Visibility into Shadow IT 3. Prevent Risky Usage
  • 12. Copyright © 2018 Forcepoint | 12 SECURITY USE CASES FOR SANCTIONED CLOUD APPS 1. Prevent Cyber Threats 2. Prevent Data Leakage 3. Control External File Sharing 4. Manage Admins & Privileged Accounts 5. Manage BYOD Access 6. Monitor All User Activity CONTROL
  • 13. Copyright © 2018 Forcepoint | 13 CLOUD APP DISCOVERY
  • 14. Copyright © 2018 Forcepoint | 14 USER RISK DASHBOARD Delivering a quick view of overall risk posture to accelerate investigation and remediation
  • 15. Copyright © 2018 Forcepoint | 15 DETAILED LOG INFORMATION OF INDIVIDUAL USER
  • 16. Copyright © 2018 Forcepoint | 16 TIMELINE OF FLAGGED INDIVIDUAL USER RISK ACTIVITIES Drill down to an individual incident to determine what actions to take
  • 17. Copyright © 2018 Forcepoint | 17 DIVING DEEPER INTO A SINGLE USER INCIDENT Easy drill down to determine exactly what happened to trigger incident and learn the recommendations that Forcepoint offers to remediate.
  • 18. Copyright © 2018 Forcepoint | 18 DATA CLASSIFICATION DASHBOARD (O365 EXAMPLE)
  • 19. Copyright © 2018 Forcepoint | 19 ADDING DATA CLASSIFICATION POLICY Easily add policies such as data types to be monitored, filters to be applied, and actions to take when encountering specified data type
  • 20. Copyright © 2018 Forcepoint | 20 ASSESSING RISK PROFILE OF DATA Quick view and analysis of sensitive content
  • 21. Copyright © 2018 Forcepoint | 21 MODIFYING ACCESS CONTROLS
  • 22. Copyright © 2018 Forcepoint | 22 MANAGING ENDPOINT ACCESS The Security Analyst can also set up manual enrollment for devices
  • 23. Copyright © 2018 Forcepoint | 23 FORCEPOINT DELIVERY OF CASB FUNCTIONALITY Forcepoint DLP Forcepoint CASB Forcepoint Web Security Forcepoint NGFW
  • 24. Copyright © 2018 Forcepoint | 24 EXTENDING CASB FUNCTIONALITY TO WEB SECURITY Integrating Secure Web Gateway and CASB • Visibility and control for unsanctioned cloud applications (version 8.3 and 8.4) • With version 8.5 introducing a module called Cloud Application Control What is the Cloud Application Control Module? • CASB capabilities for Cloud Application traffic as it traverses the Forcepoint Web Security Solution. • Proxy based activity visibility • Anomaly detection + UEBA + Risk analysis • Real-time mitigation options • AD and SIEM integration • Seamless and smooth implementation of CASB with one proxy All CASB supported cloud apps & automatic update of additional applications
  • 25. Copyright © 2018 Forcepoint | 25
  • 26. Copyright © 2018 Forcepoint | 26 DLP CLOUD APPLICATIONS POWERED BY FORCEPOINT CASB Data in motion AND data discovery Inline & platform native APIs Upload; Download; Sharing Enterprise DLP features: GDPR; Fingerprinting; Machine Learning; Incident Risk Ranking; OCR (8.6); Forcepoint hosted solution 1 2 3 4 5 Supported Applications
  • 27. Copyright © 2018 Forcepoint | 27 FOUR CORE DLP USE CASES FOR CLOUD APPLICATIONS 1. Prevent sensitive data being uploaded and stored in authorized cloud applications 2. Prevent sensitive data being shared with unauthorized external parties or employees. 3. Discover (audit) then remediate sensitive data that is stored in authorized cloud applications. 4. Prevent employees or external actors downloading sensitive data to unauthorized devices
  • 28. Copyright © 2018 Forcepoint | 28 FORCEPOINT CASB VS DLP 8.5 Forcepoint CASB Security Suite Forcepoint DLP 8.5 (w/ Cloud Applications) Monitor, audit and control access to IT approved cloud applications Monitor, audit and control access to applications not approved by IT Monitor, audit and control access to IaaS infrastructure and in-house cloud applications. Real-time Activity Monitoring & Analytics Provide DLP visibility and control over regulatory compliance data sets (PCI DSS + EU GDPR) Provide DLP visibility and control over IP and regulated data set using data fingerprinting. DLP Incident Risk Ranking to prioritize DLP activity for security operations teams Protect regulated data and IP from data loss across cloud applications; endpoints; web and email traffic.
  • 29. Copyright © 2018 Forcepoint | 29 FORCEPOINT ADVANCED MALWARE DETECTION (AMD) ADDS… • Unmatched accuracy that eliminates crippling false positives • Comprehensive and actionable intelligence to optimize remediation efforts for incident response teams • Full system emulation to effectively counter advanced evasions • Shared global threat intelligence that can update other solutions +100% efficacy in advanced malware detection1 Zero false positives when convicting or exonerating advanced malware3 1. NSS Labs 2016 APT Test (Lastline) Seamless integration with CASB, Email, NGFW, and Web Security solutions for a comprehensive defense
  • 30. Copyright © 2018 Forcepoint | 30 CUSTOMERS TRUST FORCEPOINT FOR CLOUD APP VISIBILITY AND CONTROL “Forcepoint CASB has given us the visibility and control that we need in order to fully leverage the potential of cloud applications on mobile devices.” Luis Aguiar, Manager – Infrastructure Delivery Team Leader, Metro Bank
  • 31. Copyright © 2018 Forcepoint | 31 ELIMINATE SECURITY BLIND SPOTS FOR CLOUD APPLICATIONS • Support for ANY cloud application (IaaS, PaaS, SaaS, or homegrown cloud application) • Discover Shadow IT applications and assess risk • Centrally assess and control users, data, and security policies • Unique real-time behavioral anomalies and user activity monitoring (Cloud UEBA) • Flexibility to add cloud applications by being deployed in both API (offline) and Proxy (inline) • Enforce risk-based multi-factor authentication Forcepoint CASB eliminates security blind spots for cloud applications by following the rhythm of your people and flow of your data DISCOVERY ENFORCEMENT RISK ASSESSMENT
  • 32. Copyright © 2018 Forcepoint | 32 READY TO FIND YOUR RISKIEST CLOUD USER? https://www.forcepoint.com/cloud-threat-assessment Register for a FREE Cloud Threat Assessment

Notas do Editor

  1. The DIGITIAL TRANSFORMATION has changed the IT Landscape In the past, customers had to be primarily concerned about securing their on-premises environment Today, data is stored and used across multiple-cloud providers, with an environment that has made sanctioned and unsanctioned pervasive to the enterprise 85% of enterprises have a multi-cloud strategy, meaning that they have deployments across multiple XaaS architectures, coupled with private-cloud environments mostly deployed on-premises Up to 40% of IT spend is shadow IT - many of these application environments are delivering productivity gains to enterprises, but at what cost? And, an average enterprise company today uses more than 1,000 SaaS applications So the world is much more complicated - however, there are ways to get insight and control into this “new IT world order” where security, innovation and productivity can co-exist.
  2. “By 2017 the CMO will spend more on IT than the CIO” - Gartner (2012) This is a map of marketing technology “martech” applications that CMO’s are purchasing today. Talk about the impact to GDPR – lack of visibility around cloud supplier relationships.. Slide outcome: it’s impossible to know every app that’s out their, but users have a habit of finding them and using them!! – but they are generally trying to innovate, vs. be malicious.. – IT security needs to support business innovation – uncover shadow IT and bring it back under governance if it’s really required by the business..
  3. Faced with an increasing number of apps and increasingly sophisticated threats, the humans become the common denominator. Where historically user may have been considered a liability, changing conditions require a new way of thinking about the solution. Forcepoint believes understanding the human behavior at a deep level will help organizations remain secure. How?
  4. Customers are looking for two important things as they adopt the cloud: Visibility into what their users are doing in the cloud. Users may be using cloud applications that have not been approved or vetted by IT or the security team. The use of these unsanctioned cloud applications can also be referred to as “Shadow IT”, and getting visibility in order to understand risk is key. For the applications that are approved, ie: sanctioned by IT, customers need to be able to monitor and control them in order to protect their users and data
  5. Discover unsanctioned [Shadow IT] applications and assess risk Centrally assess and control users, data, and security policies Unique real-time behavioral anomalies and user activity monitoring (Cloud UEBA) Extend and support compliance mandates to cloud applications Implement risk-based multi-factor authentication Support for ANY cloud / web application whether API / Inline (proxy)
  6. We offer flexibility and choice around deployment methods: Cloud APIs: with Cloud API integration, our CASB portal can be set up to leverage the cloud application provider’s APIs in order to interact with the provider in question. This can happen very quickly – with a few clicks you can get going. Forcepoint CASB comes ready to interface with the cloud application provider’s API, out of the box. One thing to note: what you can do with this deployment option depends on the APIs that the cloud application provider makes available for use Cloud Proxy: this means inline – which allows for full monitoring, blocking and alerting. Inline deployment is compatible and coexists with Forcepoint Web Security as well
  7. These are some of the security use cases you’ll want to satisfy with regards to unsanctioned cloud applications Visibility into Shadow IT: determining whether your users are using cloud applications that you don’t know about and whether or not sensitive company data now resides in these Identify Risky Apps: you’ll want to know whether or not your users are using applications known to be risky / dangerous Prevent Risky Usage: you’ll want to stop users from using these risky / dangerous apps Identify Users in Risk: you’ll want to identify which users are exhibiting behaviors they should not be exhibiting, so that you can correct the issue
  8. Quick refresher on CASB for those who are new or aren’t real familiar with the space – CASB, or Cloud Access Security Broker (Gartner term) is a category of security products PURPOSE BUILT FOR CLOUD. Designed to sit physically or logically between the cloud apps and the users accessing those cloud apps in order to provide visibility into the use of those cloud apps, and security control. While organizations are in fact, using apps hosted in the cloud more and more, that does not mean they are that they want to outsource their security to the app provider. Importantly, CASB products provide centralized controls for cloud applications
  9. New chargeable AP-DATA license which will sit alongside: AP-DATA Gateway; AP-DATA Discover and AP-ENDPOINT DLP Extend DLP policies to files stored in Enterprise cloud platforms Deployment in Azure and AWS Integration using cloud native APIs Prioritized scanning of new, edited and shared files Comprehensive range of out-of-the-box remediation actions: Scalable – on-board virtual scanning units without interrupting service provision.
  10. Forcepoint CASB is widely deployed, and in use by some of the largest organizations across a wide variety of verticals. Customers range across pharma, tech, finance, healthcare, manufacturing, defense, media, internet…while the industries are all different, what they all have in common is they are transitioning their enterprise apps to the cloud – and they are looking for help to secure their users, their data and their apps in the cloud.