SlideShare a Scribd company logo
Thank you.
REALITIES OF
SECURITY IN
THE CLOUD
Mark Brooks
VP, Solution Engineering
SECURITY IS A CHALLENGE
Infrastructure Has Changed
EARLY 2000’s MID 2000’s NOW
Buying Hardware
Infrastructure Has Changed
EARLY 2000’s MID 2000’s NOW
Infrastructure As a ServiceBuying Hardware
Security Has Changed
Security Has Changed
Cybercrime Has Also Changed
Single Actors
EARLY 2000’s MID 2000’s NOW
Cybercrime Has Also Changed
Single Actors Highly Organized Groups
EARLY 2000’s MID 2000’s NOW
Cybercrime is Flourishing
508 is the average
number of applications
in an enterprise
Evolution of AdversariesExpanding Attack Surfaces Overwhelmed Defenses
37% of US companies
face 50,000+ alerts
per month
390,000 new malicious
programs every day with
a viable ecosystem
Forbes, 2014
FireEye, 2015
AV-TEST, 2016
Attack methods are evolving
• Security risks
- Perception of increased risk due to lack of control
- Blind spots: no way to connect on-premise and cloud attacks
- Increased threat surface
- Tuning tools for relevant notifications
Source: Alert Logic CSR 2016
48%
23%
21%
2%
6%
CLOUD ATTACKS
APPLICATION
ATTACK
BRUTE FORCE
RECON
SUSPICIOUS
ACTIVITY
25%
47%
10%
11%
7%
BRICK & MORTAR
ATTACKS
APPLICATION
ATTACK
BRUTE FORCE
RECON
SUSPICIOUS
ACTIVITY
Today’s Attacks Have Several Stages
Who is being targeted? BIG
Who is being targeted? And Small
SECURITY IN THE CLOUD
The Cloud Can be Secure
“Public cloud workloads can be at least as
secure as those in your own data center,
likely better.”
Neil McDonald – Gartner Security and Risk Management Summit
London Sept 2015
Cloud has disrupted traditional security
DEPLOYMENT & MANAGEMENT PERFORMANCE & OPERATIONS
CUSTOMER APPLICATION
REQUIREMENTS
TRADITIONAL
SECURITY
CLOUD
DRIVERS
SLOW, COMPLEX
CONFIGURATIONS
AGILITY & AUTOMATION HYPER-SCALABILITY PRIORITY: WEB APPLICATIONS
SCALING CHOKEPOINTS
POOR DETECTION OF
WEB APP ATTACKS
vs vs vs
Challenges of being Secure in the Cloud
SECURITY TOOLS ARE
Complicated to use
Difficult to deploy
Expensive to manage
and tune
HUMAN EXPERTISE IS
Hard to find
Harder to keep
Very expensive
THREAT INTELLIGENCE
AND SECURITY CONTENT
Gets stale quickly
Requires specific
know-how
Validation required to avoid
false positives
Cloud Security – New Approach
The Principles of security do not change
but your Approach to security needs to
change:
• Security best practices are no different in the cloud
• You need to apply the same security standards to
cloud workloads as applied to on-premises
• Understand the Shared Responsibility of Cloud
Security
10 Cloud Security Best Practices
1. Secure your code
2. Create access management policies
3. Data Classification
4. Adopt a patch management approach
5. Review logs regularly
6. Build and maintain a security toolkit
7. Stay informed of the latest vulnerabilities that may affect you
8. Understand your cloud service providers security model
9. Understand the shared security responsibility
10. Know your adversaries
Security in the Cloud is a Shared Responsibility
PROVIDES
• Secure coding and best practices
• Software and virtual patching
• Configuration management
• Access management
• Application level attack monitoring
• Access management
• Patch management
• Configuration hardening
• Security monitoring
• Log analysis
• Network threat detection
• Security monitoring
• Logical network segmentation
• Perimeter security services
• External DDoS, spoofing, and scanning prevented
• Hardened hypervisor
• System image library
• Root access for customer
• Configuration
best practices
ALERT LOGIC HAS A SOLUTION
We protect cloud workloads & web applications
• Full-stack security
• Integrated analytics & experts
• Built for cloud
• Cost-effective outcomes
ASSESS
BLOCK COMPLY
DETECT
FULLY-MANAGED SECURITY, DELIVERED AS A SERVICE
Data
Center
Hosting
We designed security for cloud and hybrid environments
GET STARTED IN MINUTES
MAINTAIN COVERAGE AT
CLOUD SCALE
KEEP PRODUCTION FLOWING
with modular services that
grow with you
Comply
with integration to cloud APIs
and DevOps automation
with auto-scaling support and
out-of-band detection
Single pane of glass for workload and application security
across cloud, hosted & on-premises
How Cloud Defender Works in AWS
AWS Service Log Collection Web and Network Security Events,
Application & server logs
Continuous Vulnerability Scanning
Configuration Assessments, and Environment
Visibility
AWS SERVICES INSTANCES & APPLICATIONS
Analytics Platform Threat Intel & Context Expert Analysis
Threat Detection with Remediation Tactics
YOUR TEAM
Vulnerability &
Configuration
Issues
Leaders
28
8
6
4
10
25
3
5
5
11
8
10
15
24
Other
Amazon
Check Point
Chronicle Data
Cisco
Fortinet
Intel Security
Okta
Symantec
Barricade
JumpCloud
Evident.io
Palerra
Microsoft
CloudPassage
CloudCheckr
FortyCloud
ThreatStack
Alert Logic
A recognized security leader
“Alert Logic has a
head start in the cloud,
and it shows.”
PETER STEPHENSON
SC Magazine review
“…the depth and breadth
of the offering’s analytics
and threat management
process goes beyond
anything we’ve seen…”Who is your primary
in-use vendor for Cloud
Infrastructure Security?
Who are the top vendors
in consideration for Cloud
Infrastructure Security?
Alert Logic
Over 4,000 worldwide customers
AUTOMOTIVE HEALTHCARE
EDUCATION
FINANCIAL SERVICES
MANUFACTURING
MEDIA/PUBLISHING
RETAIL/E-COMMERCE
ENERGY & CHEMICALS
TECHNOLOGY & SERVICES
GOV’T / NON-PROFIT
TAKEAWAYS
1. Cyber Crime is flourishing – Big and
small companies
2. Security in the Cloud has similar
overall principles but new complexity
3. Alert Logic provides full stack security
with experts included
Thank You.

More Related Content

PDF
CSS17: Houston - Introduction to Security in the Cloud
PPTX
CSS17: Dallas - Thawing the Frozen Middle
PDF
CSS17: Houston - Stories from the Security Operations Center
PDF
CSS17: Houston - Protecting Web Apps
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
CSS17: DC - The AWS Shared Responsibility Model in Practice
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Dallas - Thawing the Frozen Middle
CSS17: Houston - Stories from the Security Operations Center
CSS17: Houston - Protecting Web Apps
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - Realities of Security in the Cloud
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice

What's hot (20)

PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PPTX
CSS 17: NYC - Protecting your Web Applications
PPTX
Alert Logic: Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
The AWS Shared Security Responsibility Model in Practice
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
Azure Security Center- Zero to Hero
PPTX
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
PDF
Govern Your Cloud: The Foundation for Success
PDF
Best Practices in Cloud Security
PPTX
AWS Security Strategy
PPTX
DevSecOps - CrikeyCon 2017
PPTX
Threat Hunting on AWS using Azure Sentinel
PPTX
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
PDF
Microsoft Office 365 Advanced Threat Protection
PDF
Protecting Against Web App Attacks
PDF
The AWS Shared Responsibility Model in Practice
#ALSummit: Alert Logic & AWS - AWS Security Services
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Protecting your Web Applications
Alert Logic: Realities of Security in the Cloud
The Intersection of Security & DevOps
CSS 17: NYC - Stories from the SOC
The AWS Shared Security Responsibility Model in Practice
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Shared Security Responsibility for the Azure Cloud
Azure Security Center- Zero to Hero
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Govern Your Cloud: The Foundation for Success
Best Practices in Cloud Security
AWS Security Strategy
DevSecOps - CrikeyCon 2017
Threat Hunting on AWS using Azure Sentinel
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
Microsoft Office 365 Advanced Threat Protection
Protecting Against Web App Attacks
The AWS Shared Responsibility Model in Practice
Ad

Similar to CSS17: Atlanta - Realities of Security in the Cloud (20)

PDF
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
PPTX
#ALSummit: Realities of Security in the Cloud
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PDF
How We Protect Our Business in the Cloud (The Smart Way)
PPTX
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
PDF
Resetting Your Security Thinking for the Public Cloud
PDF
Presd1 10
PPTX
Comprehensive Cloud Security Requires an Automated Approach
PDF
Azure 101: Shared responsibility in the Azure Cloud
PDF
Reality Check: Security in the Cloud
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Realities of Security in the Cloud
PDF
Realities of Security in the Cloud
PDF
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
PDF
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
PPTX
CLOUD SECURITY 117 presentation diploma ppt
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PPTX
Cloud Security By Dr. Anton Ravindran
PDF
Protecting What Matters...An Enterprise Approach to Cloud Security
PDF
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
#ALSummit: Realities of Security in the Cloud
Journey to the Cloud: Securing Your AWS Applications - April 2015
How We Protect Our Business in the Cloud (The Smart Way)
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
Resetting Your Security Thinking for the Public Cloud
Presd1 10
Comprehensive Cloud Security Requires an Automated Approach
Azure 101: Shared responsibility in the Azure Cloud
Reality Check: Security in the Cloud
Avoiding Limitations of Traditional Approaches to Security
Realities of Security in the Cloud
Realities of Security in the Cloud
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
CLOUD SECURITY 117 presentation diploma ppt
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Cloud Security By Dr. Anton Ravindran
Protecting What Matters...An Enterprise Approach to Cloud Security
Tierpoint_Beware of These Four Cloud Security Myths_Oct 2015
Ad

More from Alert Logic (20)

PDF
Managed Threat Detection & Response for AWS Applications
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Rent-A-Center
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
The Intersection of Security and DevOps
Managed Threat Detection & Response for AWS Applications
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
Security Implications of the Cloud
Reducing Your Attack Surface
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
The AWS Shared Responsibility Model in Practice
Security Spotlight: Rent-A-Center
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
The Intersection of Security and DevOps

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...

CSS17: Atlanta - Realities of Security in the Cloud

  • 2. REALITIES OF SECURITY IN THE CLOUD Mark Brooks VP, Solution Engineering
  • 3. SECURITY IS A CHALLENGE
  • 4. Infrastructure Has Changed EARLY 2000’s MID 2000’s NOW Buying Hardware
  • 5. Infrastructure Has Changed EARLY 2000’s MID 2000’s NOW Infrastructure As a ServiceBuying Hardware
  • 8. Cybercrime Has Also Changed Single Actors EARLY 2000’s MID 2000’s NOW
  • 9. Cybercrime Has Also Changed Single Actors Highly Organized Groups EARLY 2000’s MID 2000’s NOW
  • 10. Cybercrime is Flourishing 508 is the average number of applications in an enterprise Evolution of AdversariesExpanding Attack Surfaces Overwhelmed Defenses 37% of US companies face 50,000+ alerts per month 390,000 new malicious programs every day with a viable ecosystem Forbes, 2014 FireEye, 2015 AV-TEST, 2016
  • 11. Attack methods are evolving • Security risks - Perception of increased risk due to lack of control - Blind spots: no way to connect on-premise and cloud attacks - Increased threat surface - Tuning tools for relevant notifications Source: Alert Logic CSR 2016 48% 23% 21% 2% 6% CLOUD ATTACKS APPLICATION ATTACK BRUTE FORCE RECON SUSPICIOUS ACTIVITY 25% 47% 10% 11% 7% BRICK & MORTAR ATTACKS APPLICATION ATTACK BRUTE FORCE RECON SUSPICIOUS ACTIVITY
  • 12. Today’s Attacks Have Several Stages
  • 13. Who is being targeted? BIG
  • 14. Who is being targeted? And Small
  • 16. The Cloud Can be Secure “Public cloud workloads can be at least as secure as those in your own data center, likely better.” Neil McDonald – Gartner Security and Risk Management Summit London Sept 2015
  • 17. Cloud has disrupted traditional security DEPLOYMENT & MANAGEMENT PERFORMANCE & OPERATIONS CUSTOMER APPLICATION REQUIREMENTS TRADITIONAL SECURITY CLOUD DRIVERS SLOW, COMPLEX CONFIGURATIONS AGILITY & AUTOMATION HYPER-SCALABILITY PRIORITY: WEB APPLICATIONS SCALING CHOKEPOINTS POOR DETECTION OF WEB APP ATTACKS vs vs vs
  • 18. Challenges of being Secure in the Cloud SECURITY TOOLS ARE Complicated to use Difficult to deploy Expensive to manage and tune HUMAN EXPERTISE IS Hard to find Harder to keep Very expensive THREAT INTELLIGENCE AND SECURITY CONTENT Gets stale quickly Requires specific know-how Validation required to avoid false positives
  • 19. Cloud Security – New Approach The Principles of security do not change but your Approach to security needs to change: • Security best practices are no different in the cloud • You need to apply the same security standards to cloud workloads as applied to on-premises • Understand the Shared Responsibility of Cloud Security
  • 20. 10 Cloud Security Best Practices 1. Secure your code 2. Create access management policies 3. Data Classification 4. Adopt a patch management approach 5. Review logs regularly 6. Build and maintain a security toolkit 7. Stay informed of the latest vulnerabilities that may affect you 8. Understand your cloud service providers security model 9. Understand the shared security responsibility 10. Know your adversaries
  • 21. Security in the Cloud is a Shared Responsibility PROVIDES • Secure coding and best practices • Software and virtual patching • Configuration management • Access management • Application level attack monitoring • Access management • Patch management • Configuration hardening • Security monitoring • Log analysis • Network threat detection • Security monitoring • Logical network segmentation • Perimeter security services • External DDoS, spoofing, and scanning prevented • Hardened hypervisor • System image library • Root access for customer • Configuration best practices
  • 22. ALERT LOGIC HAS A SOLUTION
  • 23. We protect cloud workloads & web applications • Full-stack security • Integrated analytics & experts • Built for cloud • Cost-effective outcomes ASSESS BLOCK COMPLY DETECT FULLY-MANAGED SECURITY, DELIVERED AS A SERVICE Data Center Hosting
  • 24. We designed security for cloud and hybrid environments GET STARTED IN MINUTES MAINTAIN COVERAGE AT CLOUD SCALE KEEP PRODUCTION FLOWING with modular services that grow with you Comply with integration to cloud APIs and DevOps automation with auto-scaling support and out-of-band detection Single pane of glass for workload and application security across cloud, hosted & on-premises
  • 25. How Cloud Defender Works in AWS AWS Service Log Collection Web and Network Security Events, Application & server logs Continuous Vulnerability Scanning Configuration Assessments, and Environment Visibility AWS SERVICES INSTANCES & APPLICATIONS Analytics Platform Threat Intel & Context Expert Analysis Threat Detection with Remediation Tactics YOUR TEAM Vulnerability & Configuration Issues
  • 26. Leaders 28 8 6 4 10 25 3 5 5 11 8 10 15 24 Other Amazon Check Point Chronicle Data Cisco Fortinet Intel Security Okta Symantec Barricade JumpCloud Evident.io Palerra Microsoft CloudPassage CloudCheckr FortyCloud ThreatStack Alert Logic A recognized security leader “Alert Logic has a head start in the cloud, and it shows.” PETER STEPHENSON SC Magazine review “…the depth and breadth of the offering’s analytics and threat management process goes beyond anything we’ve seen…”Who is your primary in-use vendor for Cloud Infrastructure Security? Who are the top vendors in consideration for Cloud Infrastructure Security? Alert Logic
  • 27. Over 4,000 worldwide customers AUTOMOTIVE HEALTHCARE EDUCATION FINANCIAL SERVICES MANUFACTURING MEDIA/PUBLISHING RETAIL/E-COMMERCE ENERGY & CHEMICALS TECHNOLOGY & SERVICES GOV’T / NON-PROFIT
  • 28. TAKEAWAYS 1. Cyber Crime is flourishing – Big and small companies 2. Security in the Cloud has similar overall principles but new complexity 3. Alert Logic provides full stack security with experts included

Editor's Notes

  • #9: Reasons to be targeted
  • #10: Reasons to be targeted
  • #12: ***Focus on Application Stack
  • #13: Reasons to be targeted
  • #14: Yahoo –disclosed a new security breach in Dec’16 that may have affected more than one billion accounts. The breach dates back to 2013 and is thought to be separate from a massive cybersecurity incident announced in September. Yahoo now believes an "unauthorized third party" stole user data from more than one billion accounts in August 2013. That data may have included names, email addresses and passwords, but not financial information.
  • #15: The 5050 Skatepark, an 8,000-square-foot indoor park on Staten Island for skateboards, BMX bikes and scooters, rejiggered its passwords after being hit with a denial of service attack fall 2015 that made its website unavailable. The skatepark, which generated $100,000 in revenue in 2014, attracts skateboarders from all over the world, said one of its founders, Edward Pollio. Having the website closed down was a blow to revenue, he said. “The attack caused havoc,” said Mr. Pollio, who still has a day job as a carpenter. “People were asking if we were still in business. Not having a website is like being closed.” Now, 5050 Skatepark is more strict about its passwords; it follows longstanding recommendations to use different ones for different accounts, like on Instagram and Twitter. And Mr. Pollio, who helped start the business with $50,000 of his own savings, monitors the site every day.
  • #17: 4 years ago in meetings we were being told the cloud was insecure, very boring Lets change this quote around “If you do it right, the public cloud can be more secure than your own datacentre” That is the key, that is what today is about – how do you do it right Issue is you can automate failure at scale
  • #18: Why are we focused here? And how can we help you? Your applications drive your businesses – the top and bottom line - and are moving into the cloud – with more and more web apps leading the charge. You’re depending on cloud to 1. Enable faster app production 2. Provide access to better performance 3. Enable new business capabilities, innovate faster, enter new markets and build channels through web apps But traditional perimeter and host security can hold you back. Security controls not designed for the demands of web apps and cloud workloads can Create chokepoints in your app production and dev ops pipeline Create chokepoints in app or workload scaling Introduce risk as most are poorly suited for protecting web apps
  • #19: And if you thought building a SOC on-premise sounds difficult, if you throw Cloud adoption by the business in to the mix you’ve got an ever more challenging situation. The vast majority of the technology you’ve invested in will not integrate with Cloud platforms or at best, will impact the dynamic, agile, efficient nature of the Cloud - often what business are looking to benefit from in the first place. Even if you manage to find tech that works (for now!!!), the likelihood is that it will be a version of a data center centric product that’s been adapted to Cloud, meaning the content and intelligence that drives the tool will mostly be irrelevant And finally you now need people with a whole set of Cloud expertise – given the hype surrounding Cloud these days, they will be expensive and in hot demand Article on Wired – job security – IT security Refer back to Forrester - challenges : 1 - managing security content 2 – mutli-vector attacks 3 - Costs 4 – threat intel skills 6 – staffing the SOC
  • #20: Questions to the Audience – Hands Up - Basic Security – firewall etc - AWS environment - do you have IDS, Log, WAF etc - In-house - 24 x 7 Reasons why you are not doing it – tools on-prem to cloud
  • #21: Process section
  • #24: Alert Logic offers fully managed security, delivered as a service, to defend applications and workloads in cloud and hybrid environments. We protect your full application and infrastructure stack against sophisticated attacks using network components, OS, database, and application layers, Our solutions help teams like yours achieve core security outcomes at a lower cost than point product patchworks or traditional managed services offerings. These outcomes include: - Assessing your environment for vulnerabilities in software and cloud configurations - Detecting active attacks and getting timely notification to quickly react and remediate - Providing thorough and prioritized information to help you resolve vulnerabilities as well as take action on active attacks including escalation of incidents and blocking malicious traffic - And implementing controls, data archiving and reporting for both internal PCI, HIPAA and SOX COBIT And our approach is unique in that we deliver the entire security value chain using full stack protection, backed by powerful security analytics and a broad, coordinated team of security experts. Discovery Questions Are you familiar with Alert Logic’s solutions? Which solutions are you evaluating at this time? What solutions / security controls do you currently use? What does your current security environment look like?
  • #25: When we put our big bet on cloud a few years ago it wasn’t just about superior defenses, it was about making them easy and fast to mobilize. More specifically: Time to value: Buy and launch security capabilities as soon as today, then expand by launching new security services that snap into a your single pane of glass when you’re ready Agility: Embed and automate security across your development, test and production pipeline through robust cloud API integration and a library of templates for AWS CloudFormation, Chef and Puppet Scale: Automatically scale protection with auto-scaling support for cloud workloads Preserve application performance and availability with out-of-band threat detection distributed across every cloud instance Discovery: What does your app production and cloud deployment environment look like (automation tools?) What frequency and volume of releases are typical for you? Which applications make most use of auto-scaling?
  • #26: Cloud Defender is doing two things: First it will scan you AWS services looking for any configuration issues. At the same time it scans your instances and applications looking for known vulnerabilities. That information gets passed back to your team in the form of prioritized remediation actions so you take focus on the issues that will have the biggest positive impact with regards to your risk. While that is happening Cloud Defender is also collecting logs from your servers, apps, and AWS services, as well as network, web app events. This information is fed into an analytics platform. This platform analyzes the data, eliminating irrelevant events, and then, by applying threat intelligence and context generates actionable security events. These events are then vetted by a team of security experts, who have access to both the raw data that generated the event as well as a library of threat research that enables them to provide you with the context you need to understand the threat. You are then contacted about the incident and provided remediation recommendations. This helps you focus on eliminating the issues without having to become an expert in any one specific threat vector. Cloud Defender is always on, always working for you.
  • #27: Industry analysts and influencers including Gartner, Forrester, 451 Group and SC Magazine have continually applauded and recognized our leadership position in protecting cloud application workloads. 451 is interesting – they just asked companies who they were using for cloud infrastructure security, and without prompting we topped the list. Gartner Magic Quadrants and Forrester Waves are either about software vendors or managed services vendors so our unique combination doesn’t fit perfectly in either one. But Forrester believes strongly enough in our combined approach that they placed us into their MSSP Wave where they credit us with having the strongest offering due to our cloud expertise, customer satisfaction, and usability. While we aren’t the traditional MSSP, Forrester’s ranking us as the leading MSSP the first year we were evaluated is a strong testament to the value of our approach and innovation. Discovery: Have you considered any of these service or tool-only vendors for cloud application workload security?
  • #28: Our solutions are designed to support companies of all sizes, across all industries.  We are proud that over 4,000 companies, including many global household names, as well as high growth start-ups, use our products to ensure security and compliance of their IT environments. As you can see, some of the largest Fortune 500 companies in the world use Alert Logic to keep their environments safe, in addition to thousands of other medium size and commercial businesses.