hk vforum f5 apps centric security nov 4, 2016 - final

20
Secure the Next…

Upload: juni-yan

Post on 15-Apr-2017

217 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: HK VForum F5 apps centric security nov 4, 2016 - final

Secure the Next…

Page 2: HK VForum F5 apps centric security nov 4, 2016 - final
Page 3: HK VForum F5 apps centric security nov 4, 2016 - final
Page 4: HK VForum F5 apps centric security nov 4, 2016 - final
Page 5: HK VForum F5 apps centric security nov 4, 2016 - final
Page 6: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc 6

The Complexity of Application Delivery in a Hybrid World

Page 7: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc 7

The traditional approach to security is inadequate.Blind, inflexible point solutions

Page 8: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc

44% OF DATA BREACHES

FROM WEB APP COMPROMISE

OPEN SOURCE INTRODUCES 24

VULNERABILITIES PER WEB APP

13% OF USERS TESTED WOULD

OPEN A PHISHING ATTACHMENT

Insufficient application security

puts your data at risk

72%

Security breaches caused by

USER IDENTITY AND

APPLICATIONS

90%

Security budget goes to

TRADITIONAL NETWORK

PERIMETER

However, the existing Cyber Security

Investment is…

Page 9: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc

WE NEEDA DIFFERENTAPPROACH

Page 10: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc

GOVERN YOUR APPS ACCESS

PROTECT YOUR APPS

TO SECURE YOUR DATA

Page 11: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc

USER APPLICATIONS

Page 12: HK VForum F5 apps centric security nov 4, 2016 - final

A P P S G AT E WAY TO Y O U R D ATAF 5 G AT E WAY TO Y O U R A P P S

CLOUD APPS AND DATA

ON-PREMISES APPS AND DATA

FUTURE APPS AND DATA

Page 13: HK VForum F5 apps centric security nov 4, 2016 - final

A F L E X I B L E A R C H I T E C T U R E F O R C O O R D I N AT E D S E C U R I T Y

APPLY THE SECURITY CONTROLS YOU CHOOSE BASED ON THE CONDITIONS YOU DEFINE.

CONTEXT SHARING AND VISIBILITY

ASSESS CONTROL PROTECT

Page 14: HK VForum F5 apps centric security nov 4, 2016 - final

A B R O A D S E T O F C A PA B I L I T I E S A N D R O B U S T E C O - S Y S T E M

CONTEXT SHARING AND VISIBILITY

APPLICATION ACCESS SSL VISIBILITY APPLICATION PROTECTION

FEDERATED IDENTITY

SSO

GRANULAR ACCESS CONTROL

INBOUND / OUTBOUND

DYNAMIC SERVICE CHAINING

BROAD ECOSYSTEM SUPPORT

WEB APPLICATION FIREWALL

ANTI-DDOS

WEB FRAUD

Page 15: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc 15

A different approach to Application Security

APPLICATION ACCESS APPLICATION PROTECTION

Protecting your most critical business assets

Page 16: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc 16

SDN (L1-L3) + SDAS (L4-L7) = SDDC

Control

Plane

Data

PlaneSo

ftw

are

-De

fin

ed

Da

taC

en

ter

BIG-IQ

(SDAS Controller)

SDDC Orchestrator

SDN Controller

SDN Applications

LAYER 2-4

Stateless Fabric

F5 L4-7 SDAS Stateful Fabric

NVGREVXLAN

Service Chaining

iApps

Applications

OPEN

APIs

Architect / Lines of Business

16© F5 Networks, Inc CONFIDENTIAL

Page 17: HK VForum F5 apps centric security nov 4, 2016 - final

© F5 Networks, Inc 17

F5 and Vmware PartnershipCustomers Demanding Seamless Product Integration

TECHNOLOGY ALLIANCE PARTNERS

• VMware 2015 Technical Partner Award

• VMware 2014 Best Cloud Management Marketplace Solution Award for Cloud Automation category

• AirWatch Connect 2014 Enterprise Mobility Excellence Award

• VMware 2010 Technology Innovator Partner of the Year

Page 18: HK VForum F5 apps centric security nov 4, 2016 - final

VIS ION

Page 19: HK VForum F5 apps centric security nov 4, 2016 - final

RETHINK YOUR

SECURITY ARCHITECTURE

APPLICATION-CENTRIC

APPROACH

Page 20: HK VForum F5 apps centric security nov 4, 2016 - final