Security Management for The Enterprise

Download Report

Transcript Security Management for The Enterprise

Pravin Kothari

Founder & CEO CipherCloud

(former VPE & co-founder ArcSight)

Cloud’s Explosive Growth in SMB

Entering Enterprises and Governments

3

Security Breaches Escalating

Highly Advanced & Persistent Cyber Threats

4

Cloud Computing in Enterprise/Government Tug of War Between End Users & Security

Business Execs Desire More Cloud Services Security/Compliance Execs Have Cloud Concerns Agility & Flexibility Lack of Control & Visibility Data Privacy Reduce cost Data Residency Minimal Administration Regulatory Compliance Best-of-breed apps

5

Revolutionary CipherCloud Encryption Gateway

Encrypt Sensitive Data in Real time Before it’s Sent to the Cloud

  

Encryption Preserves App’s Format & Operations Keys retained by Customer No impact on usability

6

Configuration for each Application Record as seen by “authorized users” Record as seen by “Unauthorized Users”

Encrypt Data at the Source Before it Leaves Your Network

TOP CLOUD THREATS

Malicious Insiders at Cloud Provider Account, Service & Traffic Hijacking Insecure Application Programming Interfaces Shared Technology Vulnerabilities Data Loss, Leakage, Remanence Unknown Risk Profile

Customer’s encryption at the source can satisfy controls that are left for customers in Provider’s FISMA / ISO-27001 certification.

8

Sample Customer Use Cases

Organization F100 Investment Bank Public Healthcare Agency Hi-Tech Defense Contractor New Democratic Party of Canada Personal care product Manufacturer, Germany Pain-points Addressed

Confidentiality of highly sensitive M&A discussions from Malicious Insiders Threat at SaaS provider FISMA & HIPAA required encryption of patient information going to a cloud for physicians collaboration ITAR required defense clients’ information restricted to citizens, which was not guaranteed by their cloud provider Required to retain 24M Canadian voters identities within the country while using SaaS in the US to run their campaigns Their resellers required residency of uploaded customer data within the country 9

Open & Extensible Platform for Ecosystem

Rapid Development of 3 rd -Party Cloud/App Plug-ins Private Cloud Ownership CipherCloud Gateway Out-of-the-box Cloud Integration Open Plug-in Framework

10

Customer Benefits

 Protect against emerging cloud threats  Eliminate data privacy and security concerns  Satisfy compliance and data-residency requirements   Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)  Data Breach cost estimated at $214 per customer record*

*The Ponemon Institute

Accelerate cloud adoption  Significant cost savings migrating on-premise apps to cloud

“Without CipherCloud, we won’t be able to use cloud.”

Customer interview in SearchCloudSecurity.com

11

Key Partners

Strategic Cloud Partners ISV OEM/VARs Distributors Global SIs

12

Proven Team

Seasoned Executives Expert Advisory Board Pravin Kothari

, CISSP, CISA

Founder & CEO

Co-founder ArcSight (SIEM,$1.6B exit) Founder, Agiliance (Security-GRC)

Chakra Yadavalli

, CISA

VP Engineering, Chief Architect

Dir Engineering, Agiliance (Security-GRC) Chief Architect, Phulaxis (ERP SoD)

Varun Badhwar

, CISSP, CISA

VP Product Marketing & Alliances

Global ISV Security Salesforce .com

Risk Advisory KPMG

Michael Kochanik VP Worldwide Sales

VP Sales & GM CollabNet Geodesic Systems; IKOS Systems KPMG Partner- Shahed Latif AIG Global CISO– Paul de Graaff Prudential ex-CISO- Ken Tymisnki Marriott ex-VP,Info Protection, Chris Zoladz Fifth Third Bank ex-CISO Bob West Kaiser Director Risk –Ramy Houssaini Qualys Founder – Gilles Samoun Sun-Microsoft - Dev Ghoshal

Top Tier Investors Strategic Investment

13

Honors and Awards in 2011

 

Gartner Cool Vendor

in Cloud Security Services 2011

Most Innovative Company

Finalist, RSA Conference 2011  

Best in Security ,

Under The Radar 2011 Judge & Audience Choice Winner

Best in Software & Cloud ,

TiEcon 2011 Innovation Expo Winner 

Best Security Startup

, America West, Global Security Challenge (Oct 2011) 

5 Cloud Security Companies to Watch

, Network World (Oct 2011) 14

Takeaways

 Your Data-At-Rest in the cloud is exposed to emerging cloud threats  Most SaaS /cloud databases are in ‘plaintext’  Encrypt the sensitive data at source before it leaves your network  Protect your data against all external threats  Encryption keys should be with customers, not shared with providers  Innovative technologies, such as CipherCloud, make it possible Please visit the demo area for a live demo Free Trials available at CipherCloud.com

15