leveraging channel resources meet tbi
play

leveraging channel resources Meet TBI Jeff Newton Joe Fizor Vice - PowerPoint PPT Presentation

The New Approach to Security leveraging channel resources Meet TBI Jeff Newton Joe Fizor Vice President of Enterprise Sales Solutions Engineer linkedin.com/in/jeffmnewton/ linkedin.com/in/joefizor/ CYXTERA TECHNOLOGIES | TBI as a Resource


  1. The New Approach to Security leveraging channel resources

  2. Meet TBI Jeff Newton Joe Fizor Vice President of Enterprise Sales Solutions Engineer linkedin.com/in/jeffmnewton/ linkedin.com/in/joefizor/ CYXTERA TECHNOLOGIES |

  3. TBI as a Resource Founded in 1991 Established as a Master Agency (technology distributor) 225 employees Chicago HQ, International Sales Best-in-class technology solution for complete connectivity All we know is B2B Agnostic consultation on data, network, voice, cloud, mobility and security 3 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  4. TBI as a Resource As a Master Agent. A technology consultant. Direct agreements with 100+ solution providers For channel partners: supplying organizations a recurring revenue model Consultants Value-added Resellers (VARs) Managed Service Providers (MSPs) Software Developers System Integrators For end-users: SMB, Mid and Enterprise consultation and sales for telecommunications and cloud technologies 4 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  5. Empowering selling partners to solve their customers’ technology needs through: Training • TBI University - certification program, partner experience liaison, training events and stewardship Marketing • Sales enablement tools, white label solutions, collateral, case studies, promotions Back-office, sales support and operations • Back-office, operational support, highly technical Telco, Cable and Cloud pre- and post- sales support, provisioning, installation and commissioning Finance • Transparent commission tracking, proactive management and troubleshooting CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  6. Our Partners’ Security Appetite Recently we conducted a research study of our partners business needs, investments in education, portfolio additions, etc. • 50% of respondents citing security as having the greatest potential for industry influence, transformative power and revenue generation. • Virtually all respondent companies (95%) are currently investing in emerging technologies. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud solutions. • Security is included in more than two- thirds of respondents’ portfolios, followed by hybrid cloud solutions, which are part of nearly half of respondents’ respective portfolios, and one in three currently offer SDN/SD-WAN and/or IoT solutions. By 2020, more than three-quarters of respondents will be investing in security, and more than half in private cloud. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 6

  7. How a Software-Defined Perimeter Prevents Malicious Insiders, Over Privileged-Users and Compromised Third Party Access

  8. The Threat is REAL… Percentage of data breaches due to insider threat vary… Ponemon Institute/ 36 % 39 % CSO Online (2013) Symantec (2012) Online Trust Alliance 60 % 29 % Celent (2008) (2015) Central European University's 39 % 57 % Center for Media, Data and Forrester (2012) Society (2014) …but regardless of the number, the threat is real! 10 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  9. How are Networks Vulnerable Today?

  10. Yesterday’s network security doesn’t address today’s IT reality 1996 2017 Perimeter security has remained largely unchanged for the past 2 decades. CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA 12

  11. VPNs – It Isn’t Working… VPN - It Isn’t Working… KEY ISSUES: • VPNs Do NOT Equal Secure • Over-Privileged and Off To The Races CHALLENGES CREATED: • Lateral Movement • Horrible User Experience • Not Built for Cloud “60% of enterprises will phase out network VPNs by 2021.” - Gartner 13 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  12. Traditional Firewalls – It Isn’t Working... Firewalls - It Isn’t Working… KEY ISSUES: • Static - Configure and Forget • Ports and Addresses, Not Users CHALLENGES CREATED: • Over-Privileged Users • Exceptions Proliferation • Complex, Difficult to Manage • Not Designed for Cloud Architectures 14 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  13. NAC – It Isn’t Working... Network Access Control Its Complicated Complicated setup and management NAC Show Me The Money Generally very expensive and proprietary solutions. It Takes a Village LOTS of components and add-on solutions for it to work. 15 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  14. Common Weaknesses of Current Solutions… 1 Connect First, Authenticate Second 2 Static Controls for Dynamic Environments 3 Users are NOT IP Addresses or Devices 4 The Perimeter has Changed…and Continues to Change 5 The Bad Guys are Not Just on the Outside… 16 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  15. We Need a New Approach…

  16. A better approach to network security: Software-Defined Perimeter 2 3 1 Colocation Zero-trust model Identity-centric Built like cloud, for cloud Authentication before connection User- or device- based access control Distributed, stateless and highly scalable Integrates with directory services and IAM Dynamically-provisioned 1:1 connectivity Programmable and adaptive Unauthorized resources completely dark Context sensitive Dynamic and on demand CYXTERA TECHNOLOGIES | 18

  17. SDP: An industry consensus “ SDP enables organizations to provide people-centric, manageable, secure and agile access to networked systems. It is easier and less costly to deploy than firewalls ,VPN concentrators and other bolt- in technologies.” “ Legacy, perimeter-based security models are ineffective against attacks. Security and risk pros must make security ubiquitous throughout the ecosystem.” “ BeyondCorp doesn’t gate access to services and tools based on a user’s physical location or the originating network; instead, access policies are based on information about a device, its state, and its associated user. ” “ The SDP security model has been shown to stop all forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) as well as Advanced Persistent Threat. ” CYXTERA TECHNOLOGIES | 19

  18. How Does a SDP Work? Traditional TCP/IP Not Identity Centric – Allows Anyone Access “Connect First, Authenticate Second” Software-Defined Perimeter Identity-Centric – Only Authorized Users “Authenticate First, Connect Second” CYXTERA TECHNOLOGIES |

  19. The Application View Executives Marketing Human Resources Research & Development Sales 21 CYXTERA TECHNOLOGIES |

  20. The Network View Executives Marketing Human Resources Users have too much network access… Research & Development Need to eliminate the gap between network Sales and application security 22 CYXTERA TECHNOLOGIES |

  21. What Does a SDP Look Like? Fine-grained Contextual Dynamically Consistent access Individualized Simplify authorization for awareness drives adjusts to new policies across perimeter for firewall and on-premises and access and cloud server heterogeneous each user security group cloud authentication instances environments rules 23 CYXTERA TECHNOLOGIES |

  22. Why Deploy Software Defined Perimeter Secure High Risk Users Secure and Compliant Alternative to Traditional and Assets Cloud Deployments Network Security • “Crown Jewels” • Extend to AWS & Azure • Simplify network • Third-party access • Manage users, not IP addresses • Reduce firewall rules • Privileged users • Improved compliance reporting • Eliminate NACs or VPNs 24 CYXTERA TECHNOLOGIES |

  23. Operational Benefits of SDP 90% 8 1 Social healthcare site reduced Multinational retailer Governmental agency reduced the number of firewall rules reduced the FTEs managing FTEs managing access to key systems by 90% firewall rules from 52 to 13 from 8 to 1 for over 15,000 users Financial services reporting body Cyber security consulting firm Global 50 financial replaced Cisco ISE to avoid $20K per reduced audit prep time from eliminated redundant firewalls switch upgrades as they expand 2.5 months to 17 days and VPNs into remote offices 25 CYXTERA TECHNOLOGIES |

  24. SUMMARY

  25. Summary Insider threats are Today’s Solutions A Software-Defined in your Network Do Not Work Perimeter Solves! • The perimeter is not a • Firewalls, VPNs and NAC • Creates a dynamic, unbreakable wall, as it was in solutions are yesterday’s individualized perimeter for the past. It is fuzzy (at best) and technology, and unable to meet each user and user-session – constantly changing. today’s insider threats. a network “segment of one”. • At least a quarter of all data • The dynamic nature of users and • Entitlements can be modified breaches are due to an insider cloud infrastructures demand an dynamically as necessary to threat. easier to manage, more flexible, meet environmental changes. and scalable solution. • The threats are not just on the • One solution to address security outside anymore. and compliance challenges – on premise and in the cloud. 27 CYXTERA TECHNOLOGIES CONFIDENTIAL | PROVIDED UNDER NDA

  26. TBI is an Agnostic Resource We offer several vendor-agnostic resources on security including our: Vendor-Agnostic Security Training Security EBook SDWAN Comparison Guide CYXTERA TECHNOLOGIES |

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend