SlideShare a Scribd company logo
Cloud	
  Security:	
  Threat	
  Detec3on	
  and	
  Predic3on	
  
	
  
	
  
	
  
	
  
Ganesh	
  Kir+,	
  CTO	
  and	
  Co-­‐Founder	
  Palerra	
  
	
  
Agenda
§  Cloud Security Challenges
§  Threat Detection and Prediction
§  Summary
2	
  
§  A leading Cloud Access
Security Broker (CASB)
§  Ensures visibility and
governance for cloud services
§  Secures cloud applications and
infrastructure
- all users
- from any device
- from anywhere / any network
§  Leading Investors include
Norwest Venture Partners, Wing
Ventures & August Capital
§  Investment Bank – 5,500
Box users
§  IT Infrastructure & Data
Center Products
Manufacturer – 18,000
Salesforce users
§  National Healthcare
Provider – 5,500 O365
users
§  IT Service Provider –
6,000 O365/Salesforce
users
Company Customers AccoladesSupported Services
About Palerra
3	
  
Cloud Computing Services Model
SaaS
	
  
§  Business data transaction
§  Sharing documents
§  Sensitive Emails
PaaS
	
  
§  Partner Applications
§  3rd party APIs integration
§  Databases, Web Services
IaaS
	
  
§  VPN/Network ACLs
§  Hosts/Server instances
§  Storage Services
4	
  
Security: Cloud Computing Services Model
§  Protect data from being shared
outside an org
§  Protect user accounts
§  Secure configurations
§  Detect malicious insiders
SaaS
	
   Business
User
3rd Party
Apps
Admin
§  Protect Data
§  Protect user accounts
§  Secure API Keys and tokens
§  Audit Activity
PaaS
	
  
Business
User
Developers
API Key
3rd Party
Apps
DevOps
§  Secure Network and Servers
§  Secure SSH Keys
§  Protect against rogue usage
§  Secure configurations
IaaS
	
  
Admin
Client
Machines
On-Demand
Processes
5	
  
Cloud	
  Service	
  Providers	
  own	
  the	
  Cloud	
  and	
  you	
  own	
  the	
  security	
  
Cloud Security: Multi-Step Process
§  Step 1: Visibility
§  Get visibility into your cloud services usage
§  Develop plan for monitoring and securing your
clouds
§  Step 2:Anomaly Detection/Prediction/Protection
§  Use multiple techniques (supervised and
unsupervised) to identify risky users and threats
§  Step 3: Remediate incidents and prevent it in future
§  Automate the process for continuous security
6	
  
CASB: ReferenceArchitecture
CSA SV Threat detection and prediction
AnomalousActivity Detection
§  Solution should support:
•  Supervised Feeds and Rules:
§  Allow the customer to configure specific use cases of interest for
their cloud applications:
§  Examples: whitelisting of IP addresses, Tag activities for certain
AWS machines, Tag certain users (employee about to be
terminated).
•  Machine learning forAnomaly detection:
•  User Behavior Analytics.
•  Anomaly Detection for IP addresses.
•  Anomaly Detection for non-human activities connecting to the
applications: Automated processes, unsanctioned applications.
•  Correlation of various threat feeds and contextual data.
9	
  
Supervised Feeds and Rules : Real use case
§  Trusted IP addresses:
§  Detection of any activity outside certain ranges of IP
addresses.
§  Helps security analyst to identify users who work
outside office (when they are not supposed to).
§  Helps detect compromised or shared credentials (if
the employee is physically located in the office but
activity is happening from outside the company IP
ranges).
Anomaly Detection: UBAuse cases
§  Over time, cloud users build repeatable action patterns. Profiling such patterns
helps identify anomalous activity.
§  For example:
§  a SFDC user logs daily from two IP addresses (one is the
company, and the other is home).
§  This user creates an average of 20 leads a day, changes about 7
lead status, and transfers an average of 3 leads per day to another
employee.
§  Profiling the aggregates of actions per user over a long period of time helps
identify the user’s expected volume of daily actions.
§  Profiling the IP addresses for this user helps identify any new unseen IP
address for this user.
§  Profiling certain sensitive actions such as data export with time of execution
helps detect unexpected execution of such sensitive action.
11	
  
UBAuse case: repeatable user actions over time
UBAuse case: User coming from a new IP address
Malicious Insiders
§  Most damaging attacks are more often caused
by insiders
§  Examples insider threats -
–  Employee negligence
–  Fraud, theft by insiders
–  Inappropriate sharing of data outside an
enterprise
§  What to protect and monitor -
–  Monitor for overly privileged user
accounts
–  Monitor transactional activities
–  Monitor administrator’ activities
–  Detect malicious user activities using
user behavior analytics (UEBA)
Summary
§  Get visibility into your cloud services usage
§  Develop plan for monitoring and securing your clouds
§  Find an automated solution to address challenges (threats
and risks)
15	
  
Q&A	
  
16	
  Please	
  send	
  ques+ons	
  regarding	
  this	
  webinar	
  to:	
  info@palerra.com	
  
hMp://palerra.com/locked_item/white-­‐paper-­‐t12/	
  

More Related Content

PPTX
CSA Presentation - Software Defined Perimeter
PDF
Cloud Access Security Brokers
DOCX
Cloud Access Security Broker (CASB)
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
PPTX
Webinar Express: What is a CASB?
PDF
Workshop on CASB Part 2
PPTX
The Future of CASBs - A Cloud Security Force Awakens
PDF
Cloud Security Governance
CSA Presentation - Software Defined Perimeter
Cloud Access Security Brokers
Cloud Access Security Broker (CASB)
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Webinar Express: What is a CASB?
Workshop on CASB Part 2
The Future of CASBs - A Cloud Security Force Awakens
Cloud Security Governance

What's hot (19)

PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
Workshop: Threat Intelligence - Part 1
PDF
Microservices security CSA meetup ppt 10_21_2015_v2-2
PPTX
Technologies You Need to Safely Use the Cloud
PDF
How VPNs and Firewalls Put Your Organization at Risk
PDF
How Zero Trust Changes Identity & Access
PDF
SDP Glossary v2.0
PDF
Securing Healthcare Data on AWS for HIPAA
PDF
Cloud Security & Cloud Encryption Explained
PDF
Tour to Azure Security Center
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PDF
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
PDF
Cloud security
PDF
Zero Trust Enterprise Network at Adobe
PPTX
How sdp delivers_zero_trust
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PDF
Take It to the Cloud: The Evolution of Security Architecture
PDF
Secure Cloud Development Resources with DevOps
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Workshop: Threat Intelligence - Part 1
Microservices security CSA meetup ppt 10_21_2015_v2-2
Technologies You Need to Safely Use the Cloud
How VPNs and Firewalls Put Your Organization at Risk
How Zero Trust Changes Identity & Access
SDP Glossary v2.0
Securing Healthcare Data on AWS for HIPAA
Cloud Security & Cloud Encryption Explained
Tour to Azure Security Center
Cloud security for banks - the central bank of Israel regulations for cloud s...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Cloud security
Zero Trust Enterprise Network at Adobe
How sdp delivers_zero_trust
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Take It to the Cloud: The Evolution of Security Architecture
Secure Cloud Development Resources with DevOps
Ad

Similar to CSA SV Threat detection and prediction (20)

PPTX
Splunk for Security: Background & Customer Case Study
PPTX
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
PDF
Leverage Big Data for Security Intelligence
PPTX
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
PPT
Open Science Grid security-atlas-t2 Bob Cowles
PPTX
Scan Website Vulnerability - Project Presentation
PPTX
Understanding Network Security and Vulnerability Assessment
PDF
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
PPTX
What’s New: Splunk App for Stream and Splunk MINT
PPTX
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Application Security - Your Success Depends on it
PPT
Lumeta IPsonar Aligned to ITIL v3
PPT
Sean White- Kansas City
PPTX
Presentacion de solucion cloud de navegacion segura
PPTX
IBM QRadar UBA
PPTX
Security crawl walk run presentation mckay v1 2017
PDF
Third Party Public Auditing Scheme for Security in Cloud Storage
PPTX
User and entity behavior analytics: building an effective solution
PDF
SplunkLive! London - Splunk App for Stream & MINT Breakout
Splunk for Security: Background & Customer Case Study
FINAL_SCFm50000_JonPapp_CAA_The_Practical_Benefits_of_a_Behavioral_Solution_f...
Leverage Big Data for Security Intelligence
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream
Open Science Grid security-atlas-t2 Bob Cowles
Scan Website Vulnerability - Project Presentation
Understanding Network Security and Vulnerability Assessment
Endpoint Agent Part 3: LAN, Wireless, Gateways and Proxies
What’s New: Splunk App for Stream and Splunk MINT
Splunk MINT for Mobile Intelligence and Splunk App for Stream for Enhanced Op...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Application Security - Your Success Depends on it
Lumeta IPsonar Aligned to ITIL v3
Sean White- Kansas City
Presentacion de solucion cloud de navegacion segura
IBM QRadar UBA
Security crawl walk run presentation mckay v1 2017
Third Party Public Auditing Scheme for Security in Cloud Storage
User and entity behavior analytics: building an effective solution
SplunkLive! London - Splunk App for Stream & MINT Breakout
Ad

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Cloud computing and distributed systems.
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PPTX
Big Data Technologies - Introduction.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
NewMind AI Monthly Chronicles - July 2025
Cloud computing and distributed systems.
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
A Presentation on Artificial Intelligence
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Big Data Technologies - Introduction.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx

CSA SV Threat detection and prediction

  • 1. Cloud  Security:  Threat  Detec3on  and  Predic3on           Ganesh  Kir+,  CTO  and  Co-­‐Founder  Palerra    
  • 2. Agenda §  Cloud Security Challenges §  Threat Detection and Prediction §  Summary 2  
  • 3. §  A leading Cloud Access Security Broker (CASB) §  Ensures visibility and governance for cloud services §  Secures cloud applications and infrastructure - all users - from any device - from anywhere / any network §  Leading Investors include Norwest Venture Partners, Wing Ventures & August Capital §  Investment Bank – 5,500 Box users §  IT Infrastructure & Data Center Products Manufacturer – 18,000 Salesforce users §  National Healthcare Provider – 5,500 O365 users §  IT Service Provider – 6,000 O365/Salesforce users Company Customers AccoladesSupported Services About Palerra 3  
  • 4. Cloud Computing Services Model SaaS   §  Business data transaction §  Sharing documents §  Sensitive Emails PaaS   §  Partner Applications §  3rd party APIs integration §  Databases, Web Services IaaS   §  VPN/Network ACLs §  Hosts/Server instances §  Storage Services 4  
  • 5. Security: Cloud Computing Services Model §  Protect data from being shared outside an org §  Protect user accounts §  Secure configurations §  Detect malicious insiders SaaS   Business User 3rd Party Apps Admin §  Protect Data §  Protect user accounts §  Secure API Keys and tokens §  Audit Activity PaaS   Business User Developers API Key 3rd Party Apps DevOps §  Secure Network and Servers §  Secure SSH Keys §  Protect against rogue usage §  Secure configurations IaaS   Admin Client Machines On-Demand Processes 5   Cloud  Service  Providers  own  the  Cloud  and  you  own  the  security  
  • 6. Cloud Security: Multi-Step Process §  Step 1: Visibility §  Get visibility into your cloud services usage §  Develop plan for monitoring and securing your clouds §  Step 2:Anomaly Detection/Prediction/Protection §  Use multiple techniques (supervised and unsupervised) to identify risky users and threats §  Step 3: Remediate incidents and prevent it in future §  Automate the process for continuous security 6  
  • 9. AnomalousActivity Detection §  Solution should support: •  Supervised Feeds and Rules: §  Allow the customer to configure specific use cases of interest for their cloud applications: §  Examples: whitelisting of IP addresses, Tag activities for certain AWS machines, Tag certain users (employee about to be terminated). •  Machine learning forAnomaly detection: •  User Behavior Analytics. •  Anomaly Detection for IP addresses. •  Anomaly Detection for non-human activities connecting to the applications: Automated processes, unsanctioned applications. •  Correlation of various threat feeds and contextual data. 9  
  • 10. Supervised Feeds and Rules : Real use case §  Trusted IP addresses: §  Detection of any activity outside certain ranges of IP addresses. §  Helps security analyst to identify users who work outside office (when they are not supposed to). §  Helps detect compromised or shared credentials (if the employee is physically located in the office but activity is happening from outside the company IP ranges).
  • 11. Anomaly Detection: UBAuse cases §  Over time, cloud users build repeatable action patterns. Profiling such patterns helps identify anomalous activity. §  For example: §  a SFDC user logs daily from two IP addresses (one is the company, and the other is home). §  This user creates an average of 20 leads a day, changes about 7 lead status, and transfers an average of 3 leads per day to another employee. §  Profiling the aggregates of actions per user over a long period of time helps identify the user’s expected volume of daily actions. §  Profiling the IP addresses for this user helps identify any new unseen IP address for this user. §  Profiling certain sensitive actions such as data export with time of execution helps detect unexpected execution of such sensitive action. 11  
  • 12. UBAuse case: repeatable user actions over time
  • 13. UBAuse case: User coming from a new IP address
  • 14. Malicious Insiders §  Most damaging attacks are more often caused by insiders §  Examples insider threats - –  Employee negligence –  Fraud, theft by insiders –  Inappropriate sharing of data outside an enterprise §  What to protect and monitor - –  Monitor for overly privileged user accounts –  Monitor transactional activities –  Monitor administrator’ activities –  Detect malicious user activities using user behavior analytics (UEBA)
  • 15. Summary §  Get visibility into your cloud services usage §  Develop plan for monitoring and securing your clouds §  Find an automated solution to address challenges (threats and risks) 15  
  • 16. Q&A   16  Please  send  ques+ons  regarding  this  webinar  to:  info@palerra.com   hMp://palerra.com/locked_item/white-­‐paper-­‐t12/