benefits of implementing a saas cybersecurity solution · security architecture delivers immediate...
TRANSCRIPT
![Page 1: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/1.jpg)
Benefits of Implementing a SaaS
Cybersecurity Solution
Andras Cser, VP Principal Analyst
September 27, 2018
![Page 2: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/2.jpg)
About Andras Cser
2
Vice President, Principal Analyst
Serves Security & Risk Professionals
Leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management
Andras CserVP, Principal Analyst
![Page 3: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/3.jpg)
About Ian Felder
3
Product Marketing for SaaS and Managed Security Program (MSP)
Over 16 Years of Marketing Experience• Digital & Social Media Marketing,
Competitive Analysis, and Product Marketing
Previously at Hologic, Inc. and Signiant
Ian FelderSr. Manager, Product Marketing
![Page 4: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/4.jpg)
![Page 5: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/5.jpg)
© 2016 Forrester Research, Inc. Reproduction Prohibited 5
We work with business and technology leaders to develop customer-obsessed strategies that drive growth.
![Page 6: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/6.jpg)
Benefits of Implementing a SaaS
Cybersecurity Solution
Andras Cser, VP Principal Analyst
September 27, 2018
![Page 7: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/7.jpg)
7© 2018 Forrester Research, Inc. Reproduction Prohibited
Assess the impact of cyberattacks
›You don’t want to be on CNN
headline news
›Security has shifted from a
Director/VP/CISO/CIO IT problem to a CEO problem
›Data protection is a key concern
›Mobile and IoT present new challenges
›BYOD/user owned devices are here to stay
![Page 8: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/8.jpg)
8© 2018 Forrester Research, Inc. Reproduction Prohibited
›Network segmentation only goes so far in the era
of Cloud
›Firewalling is cumbersome and insecure (too
many rules)
›Data proliferation is only accelerating
• Cloud storage
• Unstructured
The Perimeter Is Gone
![Page 9: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/9.jpg)
9© 2018 Forrester Research, Inc. Reproduction Prohibited
› Too many infrastructure components (on-prem, managed,
IaaS, PaaS, SaaS, hybrid clouds, etc.)
› Too much data
› Too many configuration points
› Too many places your users can place data
› Too many network paths in most instances
› BUT if you don’t know what you have, you can’t monitor it
Finding Threats Is Like Finding a Needle In A Haystack
![Page 10: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/10.jpg)
10© 2018 Forrester Research, Inc. Reproduction Prohibited
\
› DLP needs to evolve from just DLP to include other data
controls for a data centric security model
› Standalone DLP is siloed and can only protect data in
specific apps or network perimeters
› DLP admin access must be protected from malicious
tampering and account takeover
› Traditional DLP may require significant investment to use
and tune all its capabilities
› Limited DLP solutions can cause end user (workforce
member) friction if used only to stop data flows
Why DLP Needs To Evolve
![Page 11: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/11.jpg)
11
Enter Zero Trust
Xtended (ZTX)
![Page 12: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/12.jpg)
12© 2018 Forrester Research, Inc. Reproduction Prohibited
Zero Trust Extended
![Page 13: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/13.jpg)
13© 2018 Forrester Research, Inc. Reproduction Prohibited
Source: June 27, 2011, “Your Data Protection Strategy Will Fail Without Strong Identity Context” Forrester report
Zero Trust: How Identity and Information Life Cycles Need to Correlate
![Page 14: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/14.jpg)
14© 2018 Forrester Research, Inc. Reproduction Prohibited
› To comply, you need to be able to cover the riskiest apps
and data, otherwise you drown in costs
› One size fits all is not an option
› You have to discover the riskiest apps
› You have to discover the riskiest users
› You have to discover the riskiest and largest volume data
movements
Risk Based Access Controls The Only Way
![Page 15: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/15.jpg)
15© 2018 Forrester Research, Inc. Reproduction Prohibited
›Device type (managed vs. unmanaged)
›Device age
›GPS location
› IP geolocation
›Activity (Upload, download)
›Data Volume and Type
›Any other attribute
Context Matters
![Page 16: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/16.jpg)
16© 2018 Forrester Research, Inc. Reproduction Prohibited
›Discovery
›Visibility
›Auditing
› Interception
Centralization of Identity Is The Only Way To Go
![Page 17: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/17.jpg)
17© 2018 Forrester Research, Inc. Reproduction Prohibited
• Lower cost of operation (labor, hardware, etc.)
• Policy templates for compliance
• Fix one, fix all: the network effect
• Create risk scores using statistical models, machine learning and rules
• Prioritize risky activities across multiple channels
• Minimal user friction for accessing data or workloads from a static
desktop in a secured building at 9:28am on Tuesday
• Maximal security (2FA, biometrics, device registration, etc.) for
accessing data or workloads from a brand new iPad in a rogue
country at 1:32am on Sunday
› You can also fast track known good users for easier access
SaaS based approaches in data protection to the rescue
![Page 18: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/18.jpg)
18© 2018 Forrester Research, Inc. Reproduction Prohibited
› Understand the mapping between identities
and data
› Don’t rely on network perimeters
› Enforce data access policies centrally
› B2E, B2B, B2C all require mobile first
› Cover structured and unstructured data
› Authorization must be built in
Recommendations
![Page 19: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/19.jpg)
19© 2018 Forrester Research, Inc. Reproduction Prohibited
› Start with a handful of apps
› Carefully track the user experience (metrics, surveys,
etc.)
› Surface reasons for human-led investigation
› Integrate with web SSO for web applications (one time,
centralized integration
Recommendations
![Page 20: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/20.jpg)
20© 2018 Forrester Research, Inc. Reproduction Prohibited
› Contextual DLP
› Cloud DLP
› Extension of canned models to non-web (phone, in-person, etc.)
channels
› Behavioral biometrics integration with device ID, IP geolocation,
etc.
› Consortium based data use increases
› Blockchain based RBA drawing information from other lines of
businesses or peer companies
Forrester’s Predictions
![Page 21: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/21.jpg)
21© 2018 Forrester Research, Inc. Reproduction Prohibited
Security Is Not Black And White: Anomaly and Automatic Risk Detection For User Behavior For Data Access Will Continue to Improve
![Page 23: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/23.jpg)
Digital Guardian SaaS Data ProtectionReduce overhead, complexity and cost with cloud-based data protection
![Page 24: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/24.jpg)
24
Digital Guardian
Agent
Digital Guardian
Appliance
Cloud-Delivered
Threat Aware Data Protection
WorkspacesManagement
Console ApplicationsAnalytics
DG Big Data Cloud Backend
![Page 25: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/25.jpg)
Applications
25
User & Entity
Behavior Analytics
Cloud Data
Loss Prevention
Endpoint Detection
& Response
Data
Classification
Data
Discovery
Data Loss
Prevention
![Page 26: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/26.jpg)
Delivering Cloud Based Data Protection
26
FIRST and ONLY Solution to Unify
Endpoint Detection &
Response
Data Loss
Prevention
User & Entity
Behavior Analytics
![Page 27: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/27.jpg)
Why Digital Guardian Delivers More
Hosts and Manages a Big Data
Security Architecture
Delivers Immediate Time to
Value
Simplifies Maintenance
Provides
• Compute Power to Detect
Threats
• Scalability
• Threat Intelligence
27
Digital GuardianSoftware as a Service (SaaS)
![Page 28: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/28.jpg)
How Digital Guardian Delivers Even More
Solves Your Security Talent Gap
Enables Quick Wins & Long
Term Success
Allows for
• Efficient Use of Your Resources
• Taking Advantage of Best
Practices
28
Digital GuardianManaged Security Program
![Page 29: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/29.jpg)
Summary
DLP needs to evolve to include
other data controls
Zero Trust Extended
SaaS to the rescue
Digital Guardian’s Data
Protection Platform leverages
SaaS to provide data
protection that results in
• Superior Security
• Better Economics
• Reduced Overhead
29
![Page 30: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/30.jpg)
your data
30
See
![Page 31: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/31.jpg)
your data
31
Protect
Data Protection Platform
![Page 32: Benefits of Implementing a SaaS Cybersecurity Solution · Security Architecture Delivers Immediate Time to Value Simplifies Maintenance Provides •Compute Power to Detect Threats](https://reader034.vdocuments.site/reader034/viewer/2022042310/5ed80324f90a4a344d62f10c/html5/thumbnails/32.jpg)
Q&A
32