SlideShare a Scribd company logo
EFFICIENTLY MIGRATE YOUR
APPLICATIONS TO THE CLOUD
Edy Almer
GOALS FOR TODAY
• Will my organization’s applications be migrated to the cloud ? Why or
why not ?
• What/ How long will it take to move the security portion ?
• How can I expedite and reduce cost of the process ?
2 | Confidential
WHY MOVE ?
• Organizations want to reap the benefits of cloud adoption – cost,
agility, elasticity
• Process started by developers for new applications
• Biggest benefit may be for old applications
• The result is a security officer’s nightmare – a “jungle” of assets across
multiple environments, some of which are not even known to the
officer​
3 | Confidential
CONCERNS – WHY NOT ?
• Some organizations need to re-write older non virtualized applications
to facilitate the move
• Some applications are sensitive to latency – hard to move them
• Some applications are regulated in ways that will not allow moving
them off premises
4 | Confidential
REGULATION
• AWS already has over 15 zones, with the ability to prove data will not
leave the zone, including Australia, UK, EU
• Azure is following quickly
• Australian Banks encouraged to use local cloud services by regulator.
5 | Confidential
LATENCY
• AT&T’s Domain 2.0 , supported by additional Telcos aims to provide
very low latency data centers than can be dynamically configured –
solving even that use case
• Higher performance instances will also help reduce overall latency
• Advanced tools will allow moving parts of an application into the
cloud, while the sensitive parts stay on site.
6 | Confidential
MOVING APPLICATIONS TO THE CLOUD
• Average 20,000-50,000 person organization has
applications
7 | Confidential
500
MOVING APPLICATIONS TO THE CLOUD
• Average 20,000-50,000 person organization has
applications
8 | Confidential
800
MOVING APPLICATIONS TO THE CLOUD
• Average 20,000-50,000 person organization has
applications
9 | Confidential
1000
MOVING APPLICATIONS TO THE CLOUD
• Average 20,000-50,000 person organization has
applications
10 | Confidential
1300
MOVING APPLICATIONS TO THE CLOUD
• Average 20,000-50,000 person organization has
applications
• 85% are virtualized
11 | Confidential
1300
HOW LONG TO MAP ?
• A good consultant can do 5 applications a week
• 5 consultants can map over 90% of applications in under a year
• Good CMDBs are over 95% accurate – can validate 2 applications a day
• 6 months ?
12 | Confidential
HOW MANY FLOWS ?
• A simple application has 10 flows
• A medium application has 25 flows
• A complex application has over 100 flows
13 | Confidential
POLL
How many applications do you have ?
14 | Confidential
DO I HAVE TO MAP APPLICATIONS ?
• IF Security is a nice to have – two other methods are used – but they
introduce risks
• Map all active flows, without understanding them, and transfer all of
them (can’t do a gradual project)
• Move all applications, then open all traffic blocked by firewall in near
real time (big impact on organization)
15 | Confidential
IDENTIFYING THE CHALLENGES - SECURITY
• Visibility – what are the assets my organization has in the cloud?​
• Which cloud? What kind of assets? Where are they located within the cloud?
• What kind of security controls are in place if at all?​
• Security Policy Management and Governance
• Security policy definition and enforcement​
• Monitor the environment for changes and create alerts​
• Auditing and Adherence to Regulatory Compliance
• Analyze the environment​
• Identify risks and gaps​
• Remediate
16 | Confidential
SECURITY CHECK – AM I GOOD TO GO ?
• Application Connectivity
• Discover and map connectivity requirements of existing and migrated
workloads​
• Hybrid environments – distributed architecture​
• Troubleshooting connectivity​
• Change Management Process – Do I have the same in the cloud?​
• Define and enforce​
• Orchestration​
• Automation​
• Cloud is set! But…
• Multi-cloud environments​
• Hybrid environments​
17 | Confidential
TACKLING THE CHALLENGES
• Manually
• Slow​
• Time Consuming​
• Error Prone​
• Cloud Service Providers’ Native Tools
• Minimal, may not suffice​
• Address the cloud service provider’s environment only​
• Difficult to gain visibility across the entire estate​
• Cloud-Born 3rd Party Tools
• Maturity​
• Encompass the cloud environment only (sometimes only a single cloud
provider)​
• Do not address all use cases
18 | Confidential
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
AlgoSec Application Migration Webinar
SUMMARY
• Single pane of glass for your traditional, hybrid and multi-cloud estate​
• The experience gained through years of experience across traditional
environments is leveraged and put into practice​
• ​A single suite that addresses the most common, important concerns
and use cases rather than a multitude of small tools
• Automated discovery and security connectivity migration​
27 | Confidential
MORE RESOURCES
28
Thank you!
Questions can be emailed to
marketing@algosec.Com

More Related Content

PDF
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
PPT
Create and Manage a Micro-Segmented Data Center – Best Practices
PPTX
Tying cyber attacks to business processes, for faster mitigation
PDF
Migrating and Managing Security Policies in a Segmented Data Center
PDF
Managing application connectivity securely through a merger or acquisition – ...
PPTX
Algosec security policy management for financial institutions
PPT
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
PDF
Movin' On Up to the Cloud: How to Migrate your Application Connectivity
Algosec 5 more_things_you_can_do_with_a_security_policy_management_solution
Create and Manage a Micro-Segmented Data Center – Best Practices
Tying cyber attacks to business processes, for faster mitigation
Migrating and Managing Security Policies in a Segmented Data Center
Managing application connectivity securely through a merger or acquisition – ...
Algosec security policy management for financial institutions
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Movin' On Up to the Cloud: How to Migrate your Application Connectivity

What's hot (20)

PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PPTX
2018 10-11 automating network security policy management allows financial ins...
PDF
Cisco aci and AlgoSec webinar
PPTX
Application visibility across the security estate the value and the vision ...
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
Ransomware Attack: Best Practices to proactively prevent contain and respond
PDF
Webinar: How automation can transform the way you manage your network securit...
PDF
Radically reduce firewall rules with application-driven rule recertification
PPT
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
PDF
Migrating and Managing Security in an AWS Environment- Best Practices
PDF
Cloud migrations made simpler safe secure and successful migrations
PPTX
SDN's managing security across the virtual network final
PDF
best practices-managing_security_in_the hybrid cloud
PPTX
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
PDF
compliance made easy. pass your audits stress-free webinar
PPTX
2019 02-20 micro-segmentation based network security strategies (yoni geva)
PPTX
Migrating Application Connectivity and Network Security to AWS
PDF
Putting the Sec into DevOps
PDF
DevSecOps: Putting the Sec into the DevOps
PDF
Firewall Rule Recertification - An Application-Centric Approach
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
2018 10-11 automating network security policy management allows financial ins...
Cisco aci and AlgoSec webinar
Application visibility across the security estate the value and the vision ...
Avoid outages-from-misconfigured-devices-webinar-slides
Ransomware Attack: Best Practices to proactively prevent contain and respond
Webinar: How automation can transform the way you manage your network securit...
Radically reduce firewall rules with application-driven rule recertification
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Migrating and Managing Security in an AWS Environment- Best Practices
Cloud migrations made simpler safe secure and successful migrations
SDN's managing security across the virtual network final
best practices-managing_security_in_the hybrid cloud
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
compliance made easy. pass your audits stress-free webinar
2019 02-20 micro-segmentation based network security strategies (yoni geva)
Migrating Application Connectivity and Network Security to AWS
Putting the Sec into DevOps
DevSecOps: Putting the Sec into the DevOps
Firewall Rule Recertification - An Application-Centric Approach
Ad

Viewers also liked (15)

PPT
Šampóny TianDe
PDF
Application IE - Question K
PPT
E twinninglive
PPTX
3Com 3C16900A-UK
PPTX
національне виховання
PPTX
Закарпатський осередок ВМГО “Асоціація молодих донорів України”
PDF
DIÁRIO OFICIAL DE ILHÉUS DO DIA 08-03-2017
PPTX
житченко в.і математика
PPTX
Storinky zhyttya t._shevchenka
PDF
Drees dépenses sociales en faveur des personnes handicapées
PDF
Report of Geographer Cafe (Methods of Documentation and Measured Drawings)
PDF
Espoir 93 projet de service 2016-2020
PDF
C1 keynote creating_your_enterprise_cloud_strategy
PPTX
3Com 3C16630A I
PPTX
3Com 3C605C-TXM
Šampóny TianDe
Application IE - Question K
E twinninglive
3Com 3C16900A-UK
національне виховання
Закарпатський осередок ВМГО “Асоціація молодих донорів України”
DIÁRIO OFICIAL DE ILHÉUS DO DIA 08-03-2017
житченко в.і математика
Storinky zhyttya t._shevchenka
Drees dépenses sociales en faveur des personnes handicapées
Report of Geographer Cafe (Methods of Documentation and Measured Drawings)
Espoir 93 projet de service 2016-2020
C1 keynote creating_your_enterprise_cloud_strategy
3Com 3C16630A I
3Com 3C605C-TXM
Ad

Similar to AlgoSec Application Migration Webinar (20)

PDF
Extensibility: The Key To Managing Your Entire Cloud Portfolio
PDF
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
PPTX
Webinar compiled powerpoint
PPTX
Are you REALLY ready for the cloud?
PDF
Scaling Your Applications with Engine Yard Cloud
PPTX
Hybrid Cloud Transformation Fast Track.pptx
PPSX
Say no to microservices slideshare
PDF
Capacity Management for a Digital and Agile World
PPTX
Trust, security and privacy issues with cloud erp
PDF
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
PDF
RightScale Webinar - Taming Cloud- See and Manage All Your Cloud Usage
PDF
Get Loose! Microservices and Loosely Coupled Architectures
PDF
Get Loose! Microservices and Loosely Coupled Architectures
PPTX
Tech Talks Microservices
PPTX
How to make the move towards hybrid cloud computing
PPTX
The wonders of Cloud Computing.pptx
PDF
Introduction-to-Cloud-Computing.pdf
PDF
RightScale Roadtrip - Accelerate to Cloud
PDF
Applying systems thinking to AWS enterprise application migration
PPTX
What is Cloud Security, and Can I Have Some?
Extensibility: The Key To Managing Your Entire Cloud Portfolio
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
Webinar compiled powerpoint
Are you REALLY ready for the cloud?
Scaling Your Applications with Engine Yard Cloud
Hybrid Cloud Transformation Fast Track.pptx
Say no to microservices slideshare
Capacity Management for a Digital and Agile World
Trust, security and privacy issues with cloud erp
RightScale Webinar: The Five Critical Steps to Develop a Cloud Strategy
RightScale Webinar - Taming Cloud- See and Manage All Your Cloud Usage
Get Loose! Microservices and Loosely Coupled Architectures
Get Loose! Microservices and Loosely Coupled Architectures
Tech Talks Microservices
How to make the move towards hybrid cloud computing
The wonders of Cloud Computing.pptx
Introduction-to-Cloud-Computing.pdf
RightScale Roadtrip - Accelerate to Cloud
Applying systems thinking to AWS enterprise application migration
What is Cloud Security, and Can I Have Some?

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

AlgoSec Application Migration Webinar

  • 1. EFFICIENTLY MIGRATE YOUR APPLICATIONS TO THE CLOUD Edy Almer
  • 2. GOALS FOR TODAY • Will my organization’s applications be migrated to the cloud ? Why or why not ? • What/ How long will it take to move the security portion ? • How can I expedite and reduce cost of the process ? 2 | Confidential
  • 3. WHY MOVE ? • Organizations want to reap the benefits of cloud adoption – cost, agility, elasticity • Process started by developers for new applications • Biggest benefit may be for old applications • The result is a security officer’s nightmare – a “jungle” of assets across multiple environments, some of which are not even known to the officer​ 3 | Confidential
  • 4. CONCERNS – WHY NOT ? • Some organizations need to re-write older non virtualized applications to facilitate the move • Some applications are sensitive to latency – hard to move them • Some applications are regulated in ways that will not allow moving them off premises 4 | Confidential
  • 5. REGULATION • AWS already has over 15 zones, with the ability to prove data will not leave the zone, including Australia, UK, EU • Azure is following quickly • Australian Banks encouraged to use local cloud services by regulator. 5 | Confidential
  • 6. LATENCY • AT&T’s Domain 2.0 , supported by additional Telcos aims to provide very low latency data centers than can be dynamically configured – solving even that use case • Higher performance instances will also help reduce overall latency • Advanced tools will allow moving parts of an application into the cloud, while the sensitive parts stay on site. 6 | Confidential
  • 7. MOVING APPLICATIONS TO THE CLOUD • Average 20,000-50,000 person organization has applications 7 | Confidential 500
  • 8. MOVING APPLICATIONS TO THE CLOUD • Average 20,000-50,000 person organization has applications 8 | Confidential 800
  • 9. MOVING APPLICATIONS TO THE CLOUD • Average 20,000-50,000 person organization has applications 9 | Confidential 1000
  • 10. MOVING APPLICATIONS TO THE CLOUD • Average 20,000-50,000 person organization has applications 10 | Confidential 1300
  • 11. MOVING APPLICATIONS TO THE CLOUD • Average 20,000-50,000 person organization has applications • 85% are virtualized 11 | Confidential 1300
  • 12. HOW LONG TO MAP ? • A good consultant can do 5 applications a week • 5 consultants can map over 90% of applications in under a year • Good CMDBs are over 95% accurate – can validate 2 applications a day • 6 months ? 12 | Confidential
  • 13. HOW MANY FLOWS ? • A simple application has 10 flows • A medium application has 25 flows • A complex application has over 100 flows 13 | Confidential
  • 14. POLL How many applications do you have ? 14 | Confidential
  • 15. DO I HAVE TO MAP APPLICATIONS ? • IF Security is a nice to have – two other methods are used – but they introduce risks • Map all active flows, without understanding them, and transfer all of them (can’t do a gradual project) • Move all applications, then open all traffic blocked by firewall in near real time (big impact on organization) 15 | Confidential
  • 16. IDENTIFYING THE CHALLENGES - SECURITY • Visibility – what are the assets my organization has in the cloud?​ • Which cloud? What kind of assets? Where are they located within the cloud? • What kind of security controls are in place if at all?​ • Security Policy Management and Governance • Security policy definition and enforcement​ • Monitor the environment for changes and create alerts​ • Auditing and Adherence to Regulatory Compliance • Analyze the environment​ • Identify risks and gaps​ • Remediate 16 | Confidential
  • 17. SECURITY CHECK – AM I GOOD TO GO ? • Application Connectivity • Discover and map connectivity requirements of existing and migrated workloads​ • Hybrid environments – distributed architecture​ • Troubleshooting connectivity​ • Change Management Process – Do I have the same in the cloud?​ • Define and enforce​ • Orchestration​ • Automation​ • Cloud is set! But… • Multi-cloud environments​ • Hybrid environments​ 17 | Confidential
  • 18. TACKLING THE CHALLENGES • Manually • Slow​ • Time Consuming​ • Error Prone​ • Cloud Service Providers’ Native Tools • Minimal, may not suffice​ • Address the cloud service provider’s environment only​ • Difficult to gain visibility across the entire estate​ • Cloud-Born 3rd Party Tools • Maturity​ • Encompass the cloud environment only (sometimes only a single cloud provider)​ • Do not address all use cases 18 | Confidential
  • 27. SUMMARY • Single pane of glass for your traditional, hybrid and multi-cloud estate​ • The experience gained through years of experience across traditional environments is leveraged and put into practice​ • ​A single suite that addresses the most common, important concerns and use cases rather than a multitude of small tools • Automated discovery and security connectivity migration​ 27 | Confidential
  • 29. Thank you! Questions can be emailed to marketing@algosec.Com