using home-court advantage to transform your security approach · advantage to transform your...

37
Confidential ©2018 VMware, Inc. Using Home-Court Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services T: @RajivRamaswami September 27, 2018

Upload: others

Post on 25-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

Confidential │ ©2018 VMware, Inc.

Using Home-Court Advantage to Transform Your Security Approach

Rajiv Ramaswami

Chief Operating Officer,

Products and Cloud Services

T: @RajivRamaswami

September 27, 2018

Page 2: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

2Confidential │ ©2018 VMware, Inc.

Infrastructure

Apps Data

Agile

Threats

Data Center / Cloud Infrastructure

Compute Network Data

End User Infrastructure

Users Devices Access

Page 3: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

3Confidential │ ©2018 VMware, Inc.

Security Cost

Page 4: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

4Confidential │ ©2018 VMware, Inc.

Security Results

Source: Information is Beautiful, “The World’s Biggest Data Breaches” Webpage.

Retrieved on August 23, 2018. Data sources: DataBreaches.net, IdTheftCentre, press reports.

Page 5: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

5Confidential │ ©2018 VMware, Inc.

Transformation

Page 6: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

6Confidential │ ©2018 VMware, Inc.

Asymmetric Battle

Page 7: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

7Confidential │ ©2018 VMware, Inc.

Asymmetric Battle

How do you transform an

?

Page 8: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

8Confidential │ ©2018 VMware, Inc.

AMERICAN

REVOLUTION

Take Advantage of Your Terrain

Confidential │ ©2018 VMware, Inc. 8

Page 9: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

Confidential │ ©2018 VMware, Inc. 9

Page 10: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

Confidential │ ©2018 VMware, Inc. 10

Page 11: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

11Confidential │ ©2018 VMware, Inc.

Playroom

Courtyard

Outdoor Kitchen

Garage

Bedroom Kitchen Living Room

Bathroom

StudyMaster

Bedroom

Courtyard Outdoor

Kitchen

Garage

Family

Page 12: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

12Confidential │ ©2018 VMware, Inc.

Knowing how our family uses our home

gives us a “home court advantage”

Page 13: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

13Confidential │ ©2018 VMware, Inc.

noun

the advantage that you have over an

opponent when a contest takes place

at your own fieldWhy don’t we use this advantage?

Knowing how our family uses our home

gives us a “home court advantage”

Page 14: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

14Confidential │ ©2018 VMware, Inc.

We Keep All the Lights On, and All the Rooms Open

Playroom

Courtyard

Outdoor Kitchen

Garage

Bedroom Kitchen Living Room

Bathroom

StudyMaster

Bedroom

Room

Room Room Room

Room

Room

Room

Room

Room

Family

Page 15: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

15Confidential │ ©2018 VMware, Inc.

Page 16: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

16Confidential │ ©2018 VMware, Inc.

We See Through an Infrastructure Lens

Monitor

Perimeter

For Threats

Monitor

Endpoint

For Threats

Monitor

Network

For Threats

16Confidential │ ©2018 VMware, Inc.

Page 17: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

17Confidential │ ©2018 VMware, Inc.

Attack Surface

Attacks

Page 18: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

18Confidential │ ©2018 VMware, Inc.

Gartner Market Guide for Cloud Workload Protection Framework

Focusing on Risk

Source: Gartner, Market Guide for Cloud Workload Protection Platforms, Neil MacDonald, March 26th 2018. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research

publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of

a larger research document and should be evaluated in the context of the entire document. Charts/graphics created by VMware based on Gartner research.

AV

Deception

HIPS withVulnerability Shielding

Server Workload EDRBehavioral Monitoring

IaaS Data at Rest Encryption

Exploit Prevention / Memory Protection

Application Control / Whitelisting

System Integrity Monitoring / Management

Network Firewalling, Segmentation and Visibility

Hardening, Configuration and Vulnerability Management

Foundational

Less Critical

Optional Server Protection Strategies

Core Server Protection Strategies

Important, but often provided outside of CWPP

Operations Hygiene

No arbitrary code

No email, web client

Admin Privilege

Management

Change

Management

Log

Management

Restricted Physical and Logical Perimeter Access

Figure 1. Cloud Workload Protection Controls Hierarchy, © 2018 Gartner, Inc.

Page 19: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

19Confidential │ ©2018 VMware, Inc.

Apps Data

EncryptionMicro-Segmentation

PatchingLeastPrivilege

Multi-FactorAuthentication

Attack Surface

Attacks

Page 20: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

20Confidential │ ©2018 VMware, Inc.

MobilityVirtualization

Apps Data

Page 21: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

21Confidential │ ©2018 VMware, Inc.

Mobility

Security Ecosystem

Context

Control

Secure

Infrastructure

SDDC User Access Layer

Compute DataNetwork AccessUsers Devices

Apps Data

Enabling Richer Security Controls

Page 22: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

22Confidential │ ©2018 VMware, Inc.

SDDC

Compute Network Data

Apps Data

Compute / App

APP

Page 23: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

23Confidential │ ©2018 VMware, Inc.

Apps Data

VM Manifest

Storage

APP

Page 24: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

24Confidential │ ©2018 VMware, Inc.

Enforcing the Intended State

Detect RespondCapture & Analyze

Learn Protect

&

Apps Data Apps Data

Page 25: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

25Confidential │ ©2018 VMware, Inc.

Snapshot Suspend Block/Alarm

Quarantine Network Blocking

Service Insertion…

Compute Network

Adapt

VM Manifest

VM Manifest

VM Manifest

Intended

State Engine

vCenter ESX

App

Scope

Off-the-shelf apps

OTS

Software

Database

Custom apps

CI/CD pipeline

[Provisioning systems]

[Automation frameworks]Machine Learning

Capture & Analyze Detect Respond&

Learn

Pro

cesses

Pro

cesses

Pro

cesses

OS

AppDefense

Monitor

Protected zone

VM Manifest

Protect

Agile

Apps Data

Page 26: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

26Confidential │ ©2018 VMware, Inc.

SDDC

Compute Network Data

Apps Data

Network

APP

Page 27: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

27Confidential │ ©2018 VMware, Inc.

Page 28: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

28Confidential │ ©2018 VMware, Inc.

Page 29: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

29Confidential │ ©2018 VMware, Inc.

Hacker

Page 30: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

30Confidential │ ©2018 VMware, Inc.

Hacker

Page 31: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

31Confidential │ ©2018 VMware, Inc.

Hacker

Page 32: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

32Confidential │ ©2018 VMware, Inc.

Applications

Page 33: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

33Confidential │ ©2018 VMware, Inc.

Are they allowed

access?

Are they on a trusted

device?

Are they who they

say they are?

PostureAccess List Credentials

Page 34: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

34Confidential │ ©2018 VMware, Inc.

Mobility

Security Ecosystem

Context

Control

Secure

Infrastructure

SDDC User Access Layer

Compute DataNetwork AccessUsers Devices

Apps Data

Enabling Richer Security Controls

Page 35: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

35Confidential │ ©2018 VMware, Inc.

Security Ecosystem

Context

Control

Secure

Infrastructure

SDDC User Access Layer

Compute DataNetwork AccessUsers Devices

Apps Data

Transforming CyberSecurity

Source: Momentum Partners Cyberscape 2017Confidential │ ©2018 VMware, Inc.

Page 36: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

Confidential │ ©2018 VMware, Inc. 36

Home-court advantage

noun

the advantage that you have

over an opponent when a

contest takes place at your

own sports field or court.

Macmillan Dictionary

Transforming CyberSecurity

Confidential │ ©2018 VMware, Inc. 36

Page 37: Using Home-Court Advantage to Transform Your Security Approach · Advantage to Transform Your Security Approach Rajiv Ramaswami Chief Operating Officer, Products and Cloud Services

Confidential │ ©2018 VMware, Inc.

Thank You