judson walker - cyber priority

19
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Judson Walker Systems Engineering Director, Brocade M: 571-217-8231 E: [email protected] Cyber Priority Option for Enhanced Infrastructure Data Protection Measures

Upload: fedscoop

Post on 03-Aug-2015

1.057 views

Category:

Government & Nonprofit


1 download

TRANSCRIPT

Page 1: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Judson WalkerSystems Engineering Director, BrocadeM: 571-217-8231E: [email protected]

Cyber PriorityOption for Enhanced Infrastructure Data Protection Measures

Page 2: Judson Walker - Cyber Priority

Agenda

• Level of Criticality / Current Perceptions

• Recommendations

• What Does the Future Hold?

• Call to Action

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 2

Page 3: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Criticality of Network Security

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Page 4: Judson Walker - Cyber Priority

The Connection: Network Data & Cybersecurity

• Migration to cloud-based services increases vulnerability• Evolution of the “Network of Things”

is a catalyst for a heightened volume of sensitive data

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4

Page 5: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Do Agency Cybersecurity Priorities and Budgets Align?

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Page 6: Judson Walker - Cyber Priority

Agency Cyber Priorities & Budgets Agencies’ cybersecurity priorities for 2015 include a widespread focus on prevention (72%), and budgets reflect this.

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC.

4%

24%

72%

0

20

40

60

80

100

High Priority

Moderate Priority

Not a Priority6%

71%

24%

0

20

40

60

80

100

Increase in FY 2015

About the same in FY 2015 as previous fiscal year

Decrease in FY 2015

2015 Cybersecurity Prevention Budget2015 Cybersecurity Prevention Priority Level

96% 95%

6

To the best of your knowledge, in each of the following areas did your agency’s cyber-security budget increase, decrease, or stay about the same as the previous fiscal year?

What are your agency’s cybersecurity priorities for 2015 with regard to prevention?

Page 7: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Are Agencies Protecting Data on the Network? If Not, Why Not?

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Page 8: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 8

Page 9: Judson Walker - Cyber Priority

Is Data as Safe as Agencies Think It Is? Agency encryption is focused on web applications (SSL). Yet there are many other applications that need protection on the network.

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 9

Page 10: Judson Walker - Cyber Priority

Commercial Solutions for Classified (CSfC)Standardized Inflight Encryption Policy for Public Sector

• CSfC describes how to protect classified data in transit across untrusted networks leveraging multiple levels of encryption• COTS products leveraging Suite B encryption

algorithms are preferred and gaining momentum• Developed vendor-agnostic capability packages

to provide high-level security and configuration guidance for customers and/or solution integrators

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10

Page 11: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Recommendations

Page 12: Judson Walker - Cyber Priority

RecommendationsChecklist for selecting a data protection solution for your network…

Simple to implement and maintain

Does not impact your network or increase network costs due to complexity and management overhead

The right level to protect the different types of data on your network

Can handle your data connection speeds today as well as into the future

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12

Page 13: Judson Walker - Cyber Priority

Brocade Security Solutions

• Physical/Modular solutions with the capability to deliver Terabits per second of encrypted throughput within a single chassis• Virtual IPSec VPN—prime solution for edge and

data center deployments– Low cost software solution that can be applied as a

virtualized overlay within existing infrastructures– Excellent solution for SaaS models to provide inflight

encryption services per customer• Alternative acquisition model leveraging OPEX

dollars to easily scale and modernize

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13

Page 14: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

What Can Agencies Expect in the Future?

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Page 15: Judson Walker - Cyber Priority

• Leverage software defined networking to centrally manage and abstract how security policies are defined, managed, and deployed• Future application development will allow for

enhanced end-to-end security initiation, configuration and management • SDN brings multiple security disciplines

together between various vendors for a truly unified experience with a common API framework that any security appliance can leverage

Software Defined Networking (SDN) Enhances Data Protection

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Hypervisor

Multi-core CPU

SW Router

SW Firewall

SW VPN

Virtual NetworkingPlatform Image

15

Page 16: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Call to Action

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Page 17: Judson Walker - Cyber Priority

Learn More about Protecting the Data on Your Network!

• Download the Federal Network Security Survey Report

www.marketconnectionsinc.com/networksecurity

• Check out the latest on the efforts associated with the CSfC charter and proposed framework associated with NSA/IAD – Latest Capabilities Package:

https://www.nsa.gov/ia/_files/VPN_CP_3_0.pdf

• Bring focus to the security aspects of our customers’ environments—we have the tools today to minimize the pain

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17

Page 18: Judson Walker - Cyber Priority

Learn More about Protecting the Data on Your Network!

• Discuss how the SDN conversations can be tied to security as part of a encryption services offering

• Swing by the Technical Pavilion to talk with Brocade subject matter experts about data protection offerings

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18

Page 19: Judson Walker - Cyber Priority

© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION

Thank you