Transcript for:
SASE and CASB in the Cloud-First Era

conversations around sassy are increasing every day we need to figure out how we can secure the new environment that we have post covid where we pushed everything out into the cloud move our workers into a remote work environment and now we have to circle back and ensure that our security posture is up to par now what most people have done is just leverage the security elements and services that are available in the native cloud platforms that they've moved to and those are fine those are good we'll talk a little bit about why those are are fine and good but not sufficient in just a moment casby is a way of securing those cloud environments in a unified holistic fashion and creates a great opportunity for you to build your sassy strategy hi i'm steve murphy i'm a vice president at arg and while i work for arg this video is my own it doesn't necessarily reflect the views of my employer from an outliner overview we're going to quickly review what the sassy framework is and then we're going to talk about why casby is necessary today specifically around some cloud workflows that would need to be addressed we're going to review how ocasbi works talk about cosby benefits and then we're going to talk about some ancillary benefits in terms of policy enforcement as a quick overview of sas e sassy is all about delivering a secure work posture to your employee base no matter where they are no matter what device they're using or how they're accessing the network there are two main categories that create the sassy framework the first is network as a service and the second is security as a service so network as a service includes things like carrier services sd-wan managed access and security as a service includes cloud-based firewall services uh swigs or secure web gateways cloud access security brokers zero trust networking and on down the list you can see we're focused on cloud access security brokers here as a fundamental platform upon which you can build your sassy strategy i'm putting a link in this video to a more detailed overview of what sassy is if you want to get a better understanding of the sassy environment feel free to check that out at your convenience when we talk about why we need a casby we have to talk about the fact that we are now in a cloud-first environment organizations are moving everything out to the cloud in fact i work with clients every day who have moved everything but maybe a domain controller and their print servers out into the cloud and so their firewalls are are not protecting much at all today but the cloud-based services are where the organization is producing all of their value so today what organizations are still doing is pushing everything through that firewall or central security stack in their data center it creates a lot of inefficiencies not only network inefficiencies and cost inefficiencies but end user experience inefficiencies by hairpinning traffic through a central security platform casby is a direct to the cloud enabler and allows you to leverage the full benefits of that cloud experience it also helps with data governance and compliance which is increasingly important in giving all the data privacy acts and in many cases data secrecy that's becoming paramount in a cloud first environment lastly there's some unique risk presented by the new cloud environment that kasby protects us from specifically end user behavior and how we can monitor and control and audit that behavior of end users to ensure that they are not doing anything that's risky outside of our core data center type of environment so let's talk about some of those workflows that can present risk in our organization so there are some specific challenges that are presented by a cloud first strategy since the production environment is located outside of the core data center visibility in terms of who's sharing copying editing accessing deleting moving data becomes a challenge applications are managed by third parties and that means that you don't have all the control and visibility that you used to have within your own environment the security provided by the cloud environments while good is inconsistent so you have individual security postures for every cloud environment that you're accessing if if you're using those individualized security features and there's a potential in my view for a massive exploit when when the bad guys finally find a vulnerability in one of those cloud service providers there's an opportunity to massively exploit that vulnerability beyond what we've seen in the past so having another layer of protection in terms of using a casper for example is a really smart way of ensuring that a single exploit within an aws environment for example doesn't turn into a disaster for your organization and then lastly i'll mention again the personal risk that's associated with the cloud environment as companies reorient themselves to support work from home over the long term our personal activities and our business activities will intermingle and how we interoperate with our cloud platforms someone could be on facebook or in their dropbox account one minute and be working in a corporate environment or corporate work product the other minute and they might work back and forth between those platforms on a regular basis much more so than they used to do within an office environment so what is a casbi and how does it help us fix all of those needs so first of all at a very high level caspy is an intermediary between a cloud environment and the user it works with all your platform as a service infrastructure as a service and sas as a service environments and the key pillars of casbi include things like access control data protection threat protection and visibility and policy management these are all the capabilities that you've worked so hard to deploy within your own private environment now we have to make sure that those same capabilities are available to you in your new cloud environments there are three deployment models for cosby services and the product that you ultimately purchase for your organization should support all three so the first and easiest one is an api deployment model where there is custom code written between the caspi and the particular application that you want to access that facilitates the exchange of information now there's a significant drawback too actually for the api method number one apis aren't necessarily written for every application your organization might need so you may have to get some custom development done or you may have to find an alternative and alternatives may be one of the other two deployment methods the next downside of an api model is that it is not real time it is out of band signaling to the casbie service and that out-of-band signaling is generally processed within seconds but sometimes within minutes and that may not be a sufficient response time for your security policies so the second deployment method that's really most common is an agent-based cosby deployment method putting an agent on a managed endpoint to allow the casbi platform to communicate with that endpoint and provide permissions and access control and all the other policy enforcements before that endpoint accesses the particular application or cloud environment the third deployment model is an agentless deployment this is designed for non-managed non-controlled computers where someone may be using their personal device a home-based computer a cell phone a tablet that isn't owned and operated by the organization so putting an agent on those devices would potentially violate uh confidentiality and privacy regulations of the organization and maybe even of the particular governments or jurisdictions that you're operating under so the agentless deployment model relies on a reverse proxy the person on their home computer for example approaches the cloud-based environment attempts to log in that cloud-based environment identifies that user as attempting to log in from a from a non-protected device it will reverse that flow to the caspi platform establish the appropriate authentications and establish the approp the appropriate policies for that non-managed device and then either grant access or deny access based upon those policies i just mentioned one of the big benefits of casbi access control casbis can control how users access your cloud-based environments and establish specific policies around those access attempts based upon the state of that user you also get visibility what is being accessed by whom where are they accessing the information and what was the security posture of that application or cloud environment when that information was accessed you get data control you can control who is copying or downloading data who is uploading data who's deleting data and whether or not those files can be copied downloaded uploaded or deleted in general you get behavioral monitoring so someone accessing the network from an ip address that is hasn't been used before at a different time than is normal you can establish different policies and access procedures for people who are accessing outside of their normal behavioral profile governance is one of the big elements of casbi you can report not only control but you can report on who is accessing data and determine whether or not those people had sufficient rights and reason to access that that information and then generate the required compliance reports and then lastly most caspias have a pretty strong encryption capability to allow you to protect your your data as well so we've talked a lot about some of the benefits of casbi i'm not going to spend too much time here um on the policy advantages these are the ability to establish policies around most of those benefits that i just described but data loss prevention is one of those areas that i think casbi really provides significant advantages that aren't necessarily recognized in real time being able to control who is downloading information who is uploading information into private cloud environments like their own personal dropbox account or sharing information on facebook or on linkedin and so forth is one of the key elements of a casby that doesn't get talked a lot about being able to control how your users are using their own personal cloud resources on especially on managed devices is a critical advantage of of casbi in terms of next steps if you're interested in what a casper can do for your organization feel free to reach out my contact information is in the description of this video i'm happy to have a conversation at any time and then if you got some value out of this video i'd really appreciate a thumbs up thanks in advance for doing that and if you want to come back to this channel the best way of being able to find your way back here is by clicking that subscribe button that will put my channel in in your feed and allow you to return at your convenience with that i appreciate your time and i hope you have a great day