Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Creating Cloud Required New Thinking and Solutions Full, API-driven Total Self-Service Centrally-Managed Global Secure Automation Access & Control Global Platform Private Networking 4
DDoS Attacks on the Rise DDoS Attacks Above 1Gbps (Millions) 3.5 3.0 2.5 2.0 1.5 62% increase in overall malware detections compared to Q4 20181 1.0 More than 4,000 ransomware attacks occur each day – up 300% from 20152 0.5 0.0 2016 2017 2018 2019 2020 2021 5
Global Multi-cloud Load Balancing 6
The industry isn’t ready for what’s coming 7
Increasing Video and IoT Demand Global Consumer Internet Video Number of IoT Devices (Exabytes) (Billions) 140 40 Online Video OTT Video 120 35 30 100 25 80 20 60 15 40 10 20 5 0 0 2016 2017 2018 2019 2020 2021 2016 2017 2018 2019 2020 2021 32% Online Video CAGR 27% OTT Video CAGR 15% CAGR By 2020, more people will watch video online than on TV1 In 2016, there was 6.8ZB of data center traffic3 1M minutes of video will cross the network every second1 By 2021, 850ZB expected to be generated by IoT devices every second3 By 2022, 82% of all traffic will be video up from 75% in 20172 127 new IoT devices are connected every second – almost 11M a day4 8
5G Cellular Will Change Everything 9
The Requirements for Edge Solutions are Being Defined Management of near-infinite number of end points Edge computing must be able to support, adapt to, and effectively administrate a constantly growing number of end users and devices, across regions and countries. Security between edge nodes Edge computing must have exceptional security measures at every point — between edge nodes and at the hardware layer, network layer, and application layer. Key Edge Requirements Processing and managing valuable data Edge computing must provide effective, wholistic tools for manipulating and extracting the full value of data, including storage, management, and processing that is high-volume, high-performance, and long-term. 10
Security Model Evolution Yesterday Today Tomorrow Security controls were Security controls are client- Security controls will be cloud – Network – based and client-centri centric and fragmented based and data-centric ▪ Users utilize company owned ▪ Users can use any managed ▪ Users can use any device Devices devices ran corporate operating device (bring-your-own-device system (OS) images or “BYOD”) ▪ Users connected to corporate ▪ Users connect to corporate ▪ Users connect to cloud resources Network intranet (on-premises or via a resources via the internet using via the internet using resource- Access VPN with a physical smartcard) multifactor authentication level multifactor authentication ▪ Services supported a single ▪ Platform diversity is ▪ Services are platform-agnostic Platforms platform accommodated Service ▪ Datacenter-based services were ▪ Users access virtualized ▪ Users access cloud-based Access only accessed on premises applications and services applications and services ▪ Perimeter is identity based ▪ Perimeter is intelligent edge- /cloud-based 11
The solutions to these challenges are the keys for owning the next era of cloud 12
Securing the Edge 13
The Edge is the Battlefront for Cybersecurity Security Latency Geographic Control Decentralization All traffic passes through the edge, Edge PoPs are the physically closest Edge PoPs are, by definition, The edge allows data to be processed making it the first and best place to point of interaction with end users, geographically-specific, providing as early possible and as it is received, identify, measure, monitor, and block enabling them to provide the least logical and physical checkpoints for rather than shipping it all back to security issues. latency of all cloud services. limiting access/availability. a central location. Number Data Aggregation Endpoint-to-Endpoint Global Accessibility of Endpoints & Consolidation Interaction & Continuity The edge is the point of cloud entry Data can be aggregated, Endpoints that need little to no cloud-side Geographically diverse by nature, for all endpoints, making it the prime deduplicated, summarized, and support can communicate and edge services allow for unique location for managing endpoints consolidated right at the edge, collaborate peer-to-peer with minimal synchronization, replication, and and inbound data. reducing total traffic consumption. brokering provided by/at the edge. failover solution opportunities. 14
//Develop your edge 15
www.acronis.org Building a more knowledgeable future CREATE, SPREAD AND PROTECT KNOWLEDGE WITH US! Building new schools • Providing educational programs • Publishing books Dual headquarters in Switzerland and Singapore Proprietary and Confidential © 2019 16
You can also read