cloud-based s(ecurity)aas enables business strategy jason georgi director, value management office
TRANSCRIPT
Cloud-based S(ecurity)aaS enables business strategyJason Georgi
Director, Value Management Office
Speaker Bio
Director of Zscaler’s Value Management OfficeJason Georgi
Accomplished technology innovation strategy expert, led GE’s Global Network Council and Infrastructure-as-a-Service programs. 20+ years diverse IT infrastructure experience.
Calling all thought leaders
How many of you have been the voice of “No” for IT decisions?
How many of you would like to be the hero by saying “Yes!” …securely
Tomorrow’s IT needs bold, disruptive direction
Applying strategy means answering 3 key questions…
1 What are top priorities for today’s CEOs?
2 How do business priorities translate to IT strategy?
3 How does IT strategy impact the network & security
Today’s business outcomes
CEO priorities
3 Competitive Advantage
1 Business agility
2 Innovation
CIO priorities
3 User Experience
1 Simplification
2 Cost Reduction
Common themes
Where is today’s C-suite looking to enable strategy?
All present new challenges
CIOs need a cloud strategy or risk looking “less progressive”
Enable the business for cloud & mobility
Future-proof investments with rapidly-evolving landscape
Data Center consolidation
Provide secure access from any device, any time, anywhere
3 Growth Markets
1 Cloud Computing
2 Internet of Things (IoT)
Oh, and by the way…
…IT and info sec now have board-level visibility
The fear of exfiltration of intellectual property and reputation damage due to breach and advanced persistent threats grows with every story
Security needs and coverage have evolved
CORPORATE NETWORK
DATA CENTERSecure
In the past, security wasn’t such a big deal
Secure Desktop
HQ Regional offices
THREATSrelatively few...
THE INTERNETSmall and simple... no problem
Viruses, worms...
...proxies were employee policing tools
Cloud adoption is shifting workloads
Cloud adoption is shifting workloads
Internet
Perimeter around the Data Center
Internet gateway
Mobile HQ Remote Offices
• Put users as close to workloads as possible
• Eliminate coverage gaps for mobile devices
• Mitigate circumventing security• Reduce WAN-backhaul of Internet
traffic
THREATSscary, advanced
PEOPLE & ASSETSEVERYWHERE
CORPORATE NETWORK
DATA CENTER THE INTERNET
Today the world is distributed, the cloud is dominant and threats are vastly more advanced
Branches/ stores
Home offices
Factories
LaptopDesktop
Secure
Laptop Mobile IoTAt risk
HQ Regional offices
At risk
Botnets
APT
Exploits
Malware
On-the-go
At risk
...proxies require advanced security and must be ubiquitous
What is the answer for Internet security?
Not appliances: they force you into tough choices
HQ
Regional offices
Branches / stores
Factories
On-the-go
Mobile
Data center
HQ
Regional offices
Branches / stores
Factories
On-the-go
Mobile
Internet Internet
…mobile users often go unprotected
Backhauling traffic through the data center is slow and costly
Installing boxes at many locations is expensive and complex
It's too expensive, complex and slow to deploy all of this security hardware everywhere…
Here’s a real-world example
Source: Global 50 company, Actual Internet Gateway diagram
Exploits Botnets APT Malware
Cloud-based Internet security puts a perimeter around the Internet
HQ
Branches / stores Home offices
Factories
Regional offices
On-the-go
…this is a strategy, not a spot solution
Why cloud for internet security?
Why not?
• Other business-critical applications are moving (or have already moved!) to the cloud
• Evolution in workload placement is destroying the status quo and the traditional “perimeter”
CRM, B-I, ERP
Email & Collaboration
File Storage
App Workloads
Cloud-based internet security solves today’s challenges
Added layer of security
Hardware obsolescence and consolidation
Cloud-enabled global networks
Mobile & BYOD
Guest WiFi protection
Makes organizations more adaptable and
agile
Where is cloud for internet security an ideal fit?
Any organization!
Adds most strategic value
Cloud-first organizations
Distributed enterprises
Global footprint
Heavy road warrior & mobile population
Need security without UX compromise
22
The TCO for Security as a Service is up to 80% lower than on-premise appliances
10% purchase costs
90% operating costs
Applying the concept
Protecting the distributed enterprise
HQ
Remote VPN User
Corporate Data Center
Branch Office
Branch Office
• Centralized visibility and control
• Limited deployment of security appliances
• Gateway stack provides effective protection for those ‘on net’
Branch Office
Protecting the distributed enterprise
HQ
Remote VPN User
Branch Office
Corporate Data Center
Branch OfficeBranch Office Branch Office
Branch Office
Long-haul Branch Office
Road Warrior
• Expansion puts additional strain on gateways
• User experience suffers in large and/or long-haul offices
• Challenging providing same level of security for road warriors
Protecting the distributed enterprise
HQ
Remote VPN User
Branch Office
Corporate Data Center
Branch OfficeBranch Office Branch Office
Branch Office
Long-haul Branch Office
Road Warrior
• Cloud-enabled networks = local internet breakouts
• You’re only as strong as your weakest point
• Expensive and complicated to deliver the appliance stack where needed
Protecting the distributed enterprise
HQ
Remote VPN User
Branch Office
Corporate Data Center
Branch OfficeBranch Office Branch Office
Branch Office
Branch Office
Road Warrior
It doesn’t have to be this expensive or complicated…
Protecting the distributed enterprise
HQ
Remote VPN User
Branch Office
Corporate Data Center
Branch OfficeBranch Office Branch Office
Branch Office
Branch Office
Road Warrior
• Local breakouts wherever you need them
• Uncompromised, Ubiquitous protection
• Reduce MPLS WAN cost and footprint
• DMZ & Gateway Simplification/Consolidation
In summary
Strategy enabled
Secure, local Internet breakouts
Cloud-based Internet Security as a Service
Data Center and DMZ Consolidation
Improved User Experience leads to more productive workforce, anywhere, anytime.
Simplification of IT infrastructure equates to less overhead, reduced cost and complexity
Cost Reduction and Avoidance means the business can increase R&D funding
Agility achieved through a more dynamic workforce and ability to penetrate markets quickly
Competitive Advantage faster market penetration via nimble workforce and reduced IT cost puts money back into business
Innovation through enabling IoT and improved R&D from IT cost reduction
Network & Security Outcome CIO Priorities CEO & Business Priorities
It’s time to be BOLD• Navigating business strategy requires
thought leaders• Today’s threats put IT & Information Security
on the front lines• C-suite knows what’s possible, so the “find a
way, or we'll find someone who will” ultimatums exist
• Don't let it scare you, let it inspire you to:
Challenge the status quo
(it's dead anyway)
Be disruptive
Keep your seat at the table!
Questions?
Thank you!