#MicroFocusCyberSummit
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS
Rob Aragao & Stan Wisseman
On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman - - PowerPoint PPT Presentation
The Hybrid Enterprise: Working Across On-premises, IaaS, PaaS and SaaS Rob Aragao & Stan Wisseman #MicroFocusCyberSummit Primary Goal of Businesses Today Drive Digital Transformation !! 2 For Most Organizations, Digital Transformation =
#MicroFocusCyberSummit
Rob Aragao & Stan Wisseman
2
3
Hybrid means working with a wide variety of deployment models Designing a payment structure that works within OpEx and CapEx budgets Transformations even with increased demands to drive down IT costs Downward pressure to implement the latest features and functionality into systems Huge increase in data coming into and through your environments
Multiple consumption and financing options Lower IT run budgets Multiple deployment models Pressures to innovate IoT proliferation
Cloud Apps
Traditional Apps How can I support both?
However, many have bi-modal IT operations that won’t scale
Percentage of IT Spend
60% 1 40% 1
Budget Owners Head of IT /CIO Finance, HR, Marketing, Operations, Engineering 2015 Budget Growth 3% 1 12% 1 Managed Systems
Core IT Systems, Data Centers, Infrastructure, ERP
App Dev, Mobile Sites, e-Commerce Sites, Web Business Apps Business Outcome Business as Usual, Keep the Lights On, Improved User Experience Disruptive Innovation, New Business Process, Competitive Advantage
1= Source CEB Analyst Group (UK based)
5
Multiple pools of IT resources
Regulatory & compliance challenges
Unique management and security
High long-term cost of ownership
PaaS
IaaS is adopted for rapid provisioning of compute, storage, and network resources Common business processes (such as CRM, marketing, and human resources) are migrated to various SaaS services
On-premises servers, storage, and networks are maintained for high-value/high-risk workloads (such as financial data and intellectual property)
PaaS is used for rapid application development and testing before apps are moved to their best execution venue
Source: Dimensional Research – Hybrid Cloud Usage Poses New Challenges for Monitoring Solutions – March 2018
multiple cloud vendors
and services with on-premise apps
and services with other cloud-based apps
environments is Security Monitoring
7
Source: Dimensional Research – Hybrid Cloud Usage Poses New Challenges for Monitoring Solutions – March 2018
8
Source: 451 Research
Cloud
On-Premises
10
Maintain consistent access security and authorization controls across environments Secure movement of data and workloads across environments Secure data residing and processed in a third-party or hosted environment Maintain consistent network security policies for security domains Ensure compliance with regulatory and policy requirements
Source: 451 Research
Cloud Infrastructure Internet Inbound Attacks: Port Scanning Distributed Denial Of Service SSH/RDP Brute-Force Poor Configurations Advanced Persistent Threats Zero Day Exploits Unpatched VM images Targeting Trust Perimeter: Hypervisor Breakout Exposed Servers Default Configurations Data Exposure Weak Internal Security On-Cloud Services (Workloads, Systems, Applications, Data) Targeting Cloud Services: On-Cloud Pivot Cross-Tenant Attack Insecure Usage Outbound Attacks: Bot Net Zombies Distributed Denial of Service Port Scanning SSH/RDP Brute Force Advanced Persistent Threat Zero Day Phishing / Malware Hosting Infrastructure Attacks: Privilege Escalation Stolen Credentials Known Attack Vectors Poor System Configurations Under-Cloud Pivot Isolation Failures
Assess security investments and posture
platform? What corrective action will you take?
Transform from silos to a comprehensive view
should fall under the same security umbrella
Optimize to proactively improve security posture Manage security effectively
in the context of your security program
Actionable Security Intelligence
Moving from Reactive to Proactive Information Security & Risk Management
13
Secure and enable the relationships between identities, applications, and data… regardless of how
Cloud
On-Premises
15
Need a single security toolset that covers public, private, and on-premises systems
Source: David Linthicum, “How to choose the right security toolset for hybrid cloud”
A Desired State
providing a single view
(on-prem, SaaS, hybrid)
modelled
architecture
privacy controls and privilege management implementations
beginning
Employees
Identity Powered Security
Customers
B2C
Partners
B2B
IDENTITY IDENTITY IDENTITY
CLOUD
Data hosted in the cloud Less staff required to maintain Often limited to cloud access management Not suited to complex on-premise use case Standard solution
HYBRID
Data hosted where desired Less staff required to maintain Support for cloud, on-prem, and custom applications and processes Well suited for complex on-premises use cases Standard though extensible solution
ON-PREMISE
Data hosted on-prem Internal staff to maintain Support for cloud, on-prem, and custom applications and processes Well suited for complex on-premises use cases Flexible/extensible solution
Hybrid IAM as a Service Solution
Client Premises
Secure Connection
Cloud
SSO
Provisioning De- Provisioning Access Management Governance
SSPR 2FA Federation PAM
LDAP JDBC
Customized Connectors
Password Update
On Premise IDP
Hosted Apps
Customers, Clients, External and Remote Users
Authenticate Browser Mobile Device
Enterprise Clients
Local/Internal Authentication
On Premise Resources
Resource 1 Resource 2 Resource 3 Contractor Database Authentication and Self Service in cloud IAS for accessing internal, external and SaaS applications Secure communication to execute policies on premise Identity Synchronization to cloud
Design apps securely and to run in Hybrid IT environments
Attacker Software & data Hardware Network
Intellectual property Customer data Business processes Trade secrets
Protecting information wherever it resides
Your Telco’s information about your account Banks’ data about your finances and accounts Your interactions with SaaS applications
Your private email to and from your smartphone Your credit rating information Your email correspondence Health records your care provider manages for you Payments made to you
21
Securing government & defense health data privacy Private-public data sharing for AI insights and big data & IoT Adopt xaaS IT solutions for hybrid computing opex economies Modernizing security for legacy data security risks
(C) 2017 Micro Focus
Enabling security leaders to say “Yes” to business demands
legacy systems
mechanisms and approaches can spot and fight attacks in a timely manner
automation, and response (SOAR) solutions can provide efficiencies and repeatability in the handling of high fidelity alerts
22
AWS IAM Amazon EC2 AWS CloudTrail Amazon CloudWatch
Security Monitoring
23
ANALYTICS & MACHINE LEARNING APP SECURITY DATA SECURITY SECURITY OPERATIONS IDENTITY & ACCESS ENDPOINT SECURITY
(encryption/tokenization)
application testing
service
#MicroFocusCyberSummit
#MicroFocusCyberSummit