soha systems devops summit new york june 2015
TRANSCRIPT
3
Security and Remote Access
Apps
Employees
Customers
Partners
Bad Guys
DDoS attacks
Compromised credentials
Untrusted endpoints
Compliance
4
Shared Responsibility Model
Application
Hosted Operating System
Virtualization Layer
Physical Infrastructure
Customer Responsibility
Cloud ProviderResponsibility
5
Solution #1: Build Security Perimeter in your Cloud
Firewall
VPN
ADC
IDS
WAF
WANopt
DDoS
Firewall
User
Directory
Logging
Your Apps
Your Users
Your Admins
VPN
6
Solution #1: Build Security Perimeter in your Cloud
Firewall
VPN
ADC
IDS
WAF
WANopt
DDoS
Firewall
User
Directory
Logging
Your Apps
Your Users
Your Admins
VPN
6 Months
3 Engineers
$100,000
12
Take your applications off the internet
Lock down your cloud to all inbound access
Yet still control security and access policy
With full logging and audit trail?
What If You Could….
?And have it running in 15 minutes?
13
Tackle Shared Responsibility with Soha Cloud
Architected for hybrid cloud & mobile world Distributed in-the-cloud security enforcement Centralized security oversight and control Performance-assured path between users and
apps
AWS
Azure
Vcloud Air
Private Cloud
Public Clouds
VMwareOpenStack
14
• Double proxy architecture takes your cloud off the Internet
• Soha Cloud provides all security and access control
• No network changes
Hide Your Clouds Behind Ours
Cloudlet dials out onlyNo inbound ports open to your Cloud
15
• User enters public URL for application into any browser
• Cloud authenticates user
• Optional MFA, 2FA, access control rules
• No Client on user device
Air Gap Between Your Apps and the Internet
INVISIBLE
No connectivity before user identity verified
18
Sign up for a free account: http://soha.io/signup
Find us at BOOTH #131
email me (Rob @ SOHA dot IO) for a free upgrade to PREMIUM
To Learn More …