SlideShare a Scribd company logo
copyright 2015
Cloud Applications Secured
copyright 2015
New realities of cybersecurity
2
• Attacks have become professional 

• All servers “on a wire” are compromised or a target
to be by hackers, criminals or foreign governments

• Regulatory requirements and reporting demands are
increasing (HIPAA, PCI, NIST Cybersecurity, EU Data
Privacy, etc.)
copyright 2015
• FBI Director James Comey: "There are two kinds of big companies in
the United States.There are those who've been hacked by the
Chinese and those who don't know they've been hacked by the
Chinese."
• ITRC: 621 data breaches, exposing over 77,890,487 records in 2014
Each hack proves the need for preventive security
3
Source: Information is Beautiful http://goo.gl/QWllpM
CourtVentures
200,000,000
Yahoo Japan
22,000,000Dropbox
Adobe
152,000,000
JP Morgan
Chase
76,000,000
Gmail
5,000,000
2011 2012 2013 2014
Ebay
145,000,000
Target
70,000,000
Home Depot
56,000,000AOL
2,400,000
Mozilla
NYTaxi
Kissinger
1,700,000
Vodafone
2,000,000Citi
150,000
Zappos
24,000,000
Facebook
6,000,000
Drupal
Korea Credit
Bureau
20,000,000
SC
Gov
D&B
MA
Gov
NY Gas
1,800,000
Snap

chat
Sony Online
24,600,000
Evernote
24,600,000
Blizzard
14,000,000
Honda
CA
Emory
315,000
Anthem
80,000,000
Health
4,500,000
UPS
Ubuntu
copyright 2015 4
The Problem - Sony Case-Study
The Solution -VNS3 Application Segmentation
copyright 2015
A typical business application
5
WebTier
AppServer
Tier
Database
Tier
Message
Queues
copyright 2015
PerimeterSecurity
Enterprise data centres are filled with these applications,
many of them critical to the business
6
80% of Security $s
20% of Security $s
copyright 2015
PerimeterSecurity
Hard on the outside, soft on the inside
7
copyright 2015
PerimeterSecurity
One penetration creates significant potential

for “East-West” expansion of the attack
8
copyright 2015 9
The Problem - Sony Case-Study
The Solution - An Application Security Controller
copyright 2015
Create a micro-perimeter around critical applications
in any data centre, cloud or virtualised environment
10
copyright 2015
PerimeterSecurity
Even if there is an initial penetration event, East-West access is
dramatically reduced and the attempts are easier to recognise and isolate
11
X X
copyright 2015
What makes an application perimeter?
12
Bastion host
Embedded firewall
(and TLS and proxy)
Integrated network

intrusion detection
Encrypted overlay networking
copyright 2015
Brings the cloud model home to the Enterprise
13
copyright 2015
Why now - demand
14
NIST Cyber Security Framework
PR.AC-5
Network integrity is protected, 

incorporating network segregation
where appropriate
copyright 2015
Why now - supply
15
Network FunctionVirtualisation

- we can make networks out of

virtual machines and containers
Software Defined Networking
-we can manage networks
through APIs
copyright 2015
VNS3 product family
16
Application Security Controller
turret
free, self-service cloud connectivity
vpn
security and connectivity networking
net
scalable
VPN
end-to-end
encryption
multi-cloud,
multi-region
monitor &
manage
automatic
failover
secure app
isolation
✓ ✓ ✓ ✓ ✓ ✓
✓ ✓ ✓ + +
✓ ✓
virtual network management system
ms
high availability & automatic failover
ha
ADD-ONs
+
+
copyright 2015
Anywhere an application can go - it needs
security & connectivity.
Summary
• Applications accessible via the Internet (public or private
cloud) are targets.
• One compromise becomes the starting point for East-West
attacks across an Intranet.
• Application Security Controllers use NFV and SDN to build an
application centric perimeter within the established Enterprise
perimeter.
• Brings the public cloud model home to the Enterprise.
17
copyright 2015
Cohesive Networks - cloud security made easy
18
VNS3 family of security and
connectivity solutions protects
cloud-based applications from
exploitation by hackers, criminal
gangs, and foreign governments

1000+ customers in 20+ countries
across all industry verticals and
sectors
Partner
Network
TECHNOLOGY PARTNER
Questions?

More Related Content

PPTX
Stopping DDoS Attacks In South Africa
PPTX
The Mirai Botnet and Massive DDoS Attacks of October 2016
PDF
Stopping DDoS Attacks in North America
PPTX
Next-generation Zero Trust Cybersecurity for the Space Age
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
How to Build a Practical and Cost-Effective Security Strategy
PDF
Discover - Securing Your Hybrid Cloud
PPTX
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Stopping DDoS Attacks In South Africa
The Mirai Botnet and Massive DDoS Attacks of October 2016
Stopping DDoS Attacks in North America
Next-generation Zero Trust Cybersecurity for the Space Age
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
How to Build a Practical and Cost-Effective Security Strategy
Discover - Securing Your Hybrid Cloud
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)

What's hot (20)

PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
PDF
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
PDF
IoT - the Next Wave of DDoS Threat Landscape
PPTX
Zero Trust Cybersecurity for Microsoft Azure Cloud
PPTX
Strengthening security posture for modern-age SaaS providers
PPTX
Cyber security fundamentals (Cantonese)
PPTX
It’s 9AM... Do you know what’s happening on your network?
PPTX
Seguridad en Capas: Smart & Actionable Data
PDF
Conférence ARBOR ACSS 2018
PDF
Securing Your Business #4 - Role Of The Customer
PPTX
IoT DDoS Attacks: the stakes have changed
PPTX
Network Security in the Age of the Third Platform
PPTX
The Internet of Everything is Here
PDF
Building powerful apps with ArangoDB & KeyLines
PDF
The security story behind critical industrial networks
PDF
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PDF
odix introduction ransomware prevention in WFH reality 2020
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
Integrated Secure Networking - Fortinet
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
IoT - the Next Wave of DDoS Threat Landscape
Zero Trust Cybersecurity for Microsoft Azure Cloud
Strengthening security posture for modern-age SaaS providers
Cyber security fundamentals (Cantonese)
It’s 9AM... Do you know what’s happening on your network?
Seguridad en Capas: Smart & Actionable Data
Conférence ARBOR ACSS 2018
Securing Your Business #4 - Role Of The Customer
IoT DDoS Attacks: the stakes have changed
Network Security in the Age of the Third Platform
The Internet of Everything is Here
Building powerful apps with ArangoDB & KeyLines
The security story behind critical industrial networks
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Cybersecurity 2020 threat landscape and its implications (AMER)
odix introduction ransomware prevention in WFH reality 2020
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
Integrated Secure Networking - Fortinet
Ad

Viewers also liked (16)

PPTX
Bitcoin – the short version
PDF
Big data debunking some of the myths
PPTX
IET harnessing big data tools in financial services
PPTX
Consumerisation – what does it mean to a developer?
PDF
Lopug docker end_of_distro
PPTX
Financial Services - Head in the Cloud
PPT
Docker - a lot changed in a year
PDF
Cloudcamp London - Drones
PPTX
BLN Making it Mobile - financial services example
PPTX
Security protocols in constrained environments
PDF
Where is my big data: security, privacy and jurisdictions in the cloud
PPT
IPexpo - What is DevOps, and why should infrastructure operations care?
PDF
CloudCamp London 15 Sep 2016 - WebVR
PDF
Deploying Security at Scale
PDF
Digital Banking Creates Opportunity for Customer-Focused Finance
PDF
How do I do DevOps when all I have is Ops?
Bitcoin – the short version
Big data debunking some of the myths
IET harnessing big data tools in financial services
Consumerisation – what does it mean to a developer?
Lopug docker end_of_distro
Financial Services - Head in the Cloud
Docker - a lot changed in a year
Cloudcamp London - Drones
BLN Making it Mobile - financial services example
Security protocols in constrained environments
Where is my big data: security, privacy and jurisdictions in the cloud
IPexpo - What is DevOps, and why should infrastructure operations care?
CloudCamp London 15 Sep 2016 - WebVR
Deploying Security at Scale
Digital Banking Creates Opportunity for Customer-Focused Finance
How do I do DevOps when all I have is Ops?
Ad

Similar to The application security controller (20)

PDF
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
PDF
IM World presentation from Chris Swan: Application centric – how the cloud ha...
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
Protecting endpoints from targeted attacks
PPT
Cloud Security_Module2.ppt
PDF
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
PDF
Cisco Connect 2018 Thailand - Telco service provider network analytics
PDF
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
PDF
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
PDF
Cloud Security Best Practices - Part 2
PPTX
Cisco Security DNA
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PDF
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
PDF
Manage Risk By Protecting the Apps and Data Infographic
PDF
Assessing the Business Value of SDN Datacenter Security Solutions
PDF
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
PDF
Manage risk by protecting apps, data and usage
PPTX
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
PDF
How VPNs and Firewalls Put Your Organization at Risk
Chris Swan's Cloud World Forum 2015 Presentation: Reperimiterisation in the C...
IM World presentation from Chris Swan: Application centric – how the cloud ha...
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
How to Overcome Network Access Control Limitations for Better Network Security
Protecting endpoints from targeted attacks
Cloud Security_Module2.ppt
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
Cloud Security Best Practices - Part 2
Cisco Security DNA
Where data security and value of data meet in the cloud brighttalk webinar ...
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data Infographic
Assessing the Business Value of SDN Datacenter Security Solutions
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Manage risk by protecting apps, data and usage
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
How VPNs and Firewalls Put Your Organization at Risk

More from Chris Swan (20)

PDF
Software Bill of Materials (SBOMs) for C applications [FOSDEM 2025]
PDF
Cyber Resilience Act - CTO Lunch Club 20241129
PDF
Rules of Engagement for Forking a Dependency (SOSS Community Day Europe 2024)
PDF
Showing that you care about security for your open source (hardware) project
PDF
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
PDF
LNETM - Atsign - Privacy with Personal Data Services
PDF
SOOCon24 - Showing that you care about security - OpenSSF Scorecards
PDF
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
PDF
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
PDF
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
PDF
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
PDF
QConSF 2022 - Backends in Dart
PDF
London IoT Meetup Sep 2022 - End to end encrypted IoT
PDF
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
PDF
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
PDF
Devoxx UK 2022 - Application security: What should the attack landscape look ...
PDF
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
PDF
Full Stack Squared 2022 - Power of Open Source
PDF
Flutter Vikings 2022 - Full Stack Dart
PDF
Droidcon London 2021 - Full Stack Dart
Software Bill of Materials (SBOMs) for C applications [FOSDEM 2025]
Cyber Resilience Act - CTO Lunch Club 20241129
Rules of Engagement for Forking a Dependency (SOSS Community Day Europe 2024)
Showing that you care about security for your open source (hardware) project
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
LNETM - Atsign - Privacy with Personal Data Services
SOOCon24 - Showing that you care about security - OpenSSF Scorecards
All Day DevOps 2023 - Implementing OSSF Scorecards Across an Organisation.pdf
Fluttercon Berlin 23 - Dart & Flutter on RISC-V
QConNY 2023 - Implementing OSSF Scorecards Across an Organisation
Flutter SV Meetup Oct 2022 - End to end encrypted IoT with Dart and Flutter
QConSF 2022 - Backends in Dart
London IoT Meetup Sep 2022 - End to end encrypted IoT
Flutter Vikings 2022 - End to end IoT with Dart and Flutter
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
Devoxx UK 2022 - Application security: What should the attack landscape look ...
Flutter Festival London 2022 - End to end IoT with Dart and Flutter
Full Stack Squared 2022 - Power of Open Source
Flutter Vikings 2022 - Full Stack Dart
Droidcon London 2021 - Full Stack Dart

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf

The application security controller

  • 2. copyright 2015 New realities of cybersecurity 2 • Attacks have become professional 
 • All servers “on a wire” are compromised or a target to be by hackers, criminals or foreign governments
 • Regulatory requirements and reporting demands are increasing (HIPAA, PCI, NIST Cybersecurity, EU Data Privacy, etc.)
  • 3. copyright 2015 • FBI Director James Comey: "There are two kinds of big companies in the United States.There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese." • ITRC: 621 data breaches, exposing over 77,890,487 records in 2014 Each hack proves the need for preventive security 3 Source: Information is Beautiful http://goo.gl/QWllpM CourtVentures 200,000,000 Yahoo Japan 22,000,000Dropbox Adobe 152,000,000 JP Morgan Chase 76,000,000 Gmail 5,000,000 2011 2012 2013 2014 Ebay 145,000,000 Target 70,000,000 Home Depot 56,000,000AOL 2,400,000 Mozilla NYTaxi Kissinger 1,700,000 Vodafone 2,000,000Citi 150,000 Zappos 24,000,000 Facebook 6,000,000 Drupal Korea Credit Bureau 20,000,000 SC Gov D&B MA Gov NY Gas 1,800,000 Snap
 chat Sony Online 24,600,000 Evernote 24,600,000 Blizzard 14,000,000 Honda CA Emory 315,000 Anthem 80,000,000 Health 4,500,000 UPS Ubuntu
  • 4. copyright 2015 4 The Problem - Sony Case-Study The Solution -VNS3 Application Segmentation
  • 5. copyright 2015 A typical business application 5 WebTier AppServer Tier Database Tier Message Queues
  • 6. copyright 2015 PerimeterSecurity Enterprise data centres are filled with these applications, many of them critical to the business 6 80% of Security $s 20% of Security $s
  • 7. copyright 2015 PerimeterSecurity Hard on the outside, soft on the inside 7
  • 8. copyright 2015 PerimeterSecurity One penetration creates significant potential
 for “East-West” expansion of the attack 8
  • 9. copyright 2015 9 The Problem - Sony Case-Study The Solution - An Application Security Controller
  • 10. copyright 2015 Create a micro-perimeter around critical applications in any data centre, cloud or virtualised environment 10
  • 11. copyright 2015 PerimeterSecurity Even if there is an initial penetration event, East-West access is dramatically reduced and the attempts are easier to recognise and isolate 11 X X
  • 12. copyright 2015 What makes an application perimeter? 12 Bastion host Embedded firewall (and TLS and proxy) Integrated network
 intrusion detection Encrypted overlay networking
  • 13. copyright 2015 Brings the cloud model home to the Enterprise 13
  • 14. copyright 2015 Why now - demand 14 NIST Cyber Security Framework PR.AC-5 Network integrity is protected, 
 incorporating network segregation where appropriate
  • 15. copyright 2015 Why now - supply 15 Network FunctionVirtualisation
 - we can make networks out of
 virtual machines and containers Software Defined Networking -we can manage networks through APIs
  • 16. copyright 2015 VNS3 product family 16 Application Security Controller turret free, self-service cloud connectivity vpn security and connectivity networking net scalable VPN end-to-end encryption multi-cloud, multi-region monitor & manage automatic failover secure app isolation ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ + + ✓ ✓ virtual network management system ms high availability & automatic failover ha ADD-ONs + +
  • 17. copyright 2015 Anywhere an application can go - it needs security & connectivity. Summary • Applications accessible via the Internet (public or private cloud) are targets. • One compromise becomes the starting point for East-West attacks across an Intranet. • Application Security Controllers use NFV and SDN to build an application centric perimeter within the established Enterprise perimeter. • Brings the public cloud model home to the Enterprise. 17
  • 18. copyright 2015 Cohesive Networks - cloud security made easy 18 VNS3 family of security and connectivity solutions protects cloud-based applications from exploitation by hackers, criminal gangs, and foreign governments
 1000+ customers in 20+ countries across all industry verticals and sectors Partner Network TECHNOLOGY PARTNER Questions?