Top Banner
hybrid cloud 0 1 0 1 0 1 0 1 1 0 1 0 1 0 0 0 1 0 1 0 1 0 1 1 0 1 0 1 0 0 1 0 0 1 0 1 0 1 0 1
11
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Extending Enterprise Security Through a Hybrid Cloud Approach

hybrid cloud 01010

1011010100100101

0101

0101

10

10100100101010110

Page 2: Extending Enterprise Security Through a Hybrid Cloud Approach

Let’s say you’re CIO at an enterprise recently cash injected by venture capital backers looking to speed your latest innovations toward a projected destination in to the marketplace.

Like always decisions will be a question of priorities. Like everyone else in that situation the first goal is to strike a balance between rapid business deployment and network security.

Old enterprise, new paradigm...

You will face some choices.

Page 3: Extending Enterprise Security Through a Hybrid Cloud Approach

$$ $

Today’s CIO wants to match core needs of keeping up with comfort factor of robustly supported network security. (That’s the allure of proprietary)

Guided by those interests, VC backers introduce more than just new cash resources, but also an influx of management, guidance, and performance expectations.

Runnersand gunners

Venture capital backing comes with a drive to run and gun in the marketplace following two main priorities.

Overhead costs reduction

Net value increase

Page 4: Extending Enterprise Security Through a Hybrid Cloud Approach

Under those circumstances, many enterprises choose to encapsulate their network in a secure bubble of onsite, proprietary hardware.

ProprietaryAllure

It’s a fast choice that takes a long time to implement, as opposed to thoughtful choice that can be implemented fast.

Proprietary architecture is expensive: New hardware requires space to house it, software to operate it, and IT personnel to maintain it.

Meanwhile, while you’re stacking servers in the janitor’s closet, the market keeps moving and shaking …

WHAT’S WRONG WITH THAT CHOICE?

Page 5: Extending Enterprise Security Through a Hybrid Cloud Approach

Secure Operational Agility:

CRITICAL CHOICES

Opt for rapid deployment in the cloud: invoking major security concerns for about 75% of enterprises.

Allocate funds for more hardware, software, and space for data centers: raising cost concerns from VC.

or...

Source: http://research.microsoft.com/en-us/people/sriram/raghu-cloudcomputing.pdf

More like a biker gang. Less like a Disney World tour bus.

Page 6: Extending Enterprise Security Through a Hybrid Cloud Approach

are supplementing on-premises web, data, and network security deployments, with cloud-based solutions.

Three out of four enterprise companies

OPEN HYBRID CLOUD

Page 7: Extending Enterprise Security Through a Hybrid Cloud Approach

Want BYOD? We say bring it on.

Hybrid cloud networks extend network security beyond the scope of onsite appliances — to wherever workers are located.

Not only that, hybrid cloud security protection isn’t restricted to app safeguards, or mobile security, or network function safety checks that exist in the cloud.

The security solutions in the cloud could just as easily be protecting on-premises functions.

Page 8: Extending Enterprise Security Through a Hybrid Cloud Approach

010101010101 Sophisticated zero-footprint, no-compromise,

cloud-based content security.

Expertise of the trusted leader that protects and empowers 15,000 customers worldwide.

Blue Coat Cloud Service

Page 9: Extending Enterprise Security Through a Hybrid Cloud Approach

Leverages real-time intelligence from the Global Intelligence Network, which harnesses data from more than

to provide the industry’s only Negative-Day Defense.

BLUE COAT CLOUD SERVICE SECURES ENTERPRISES FROM ATTACKS BEFORE THEY OCCUR:

75 million users worldwide

Page 10: Extending Enterprise Security Through a Hybrid Cloud Approach

Blue Coat Cloud Service Includes:

• URL Filtering• Real Time Advanced Threat Protection• Application Controls• Universal Policy and Reporting• Mobile Security• Secure use of laptops, tablets, and smartphones

• MDM Profile integration with AirWatch• Transparent and seamless user experience across all connectivity options including• 3G/4G• Always-On Global Coverage

Page 11: Extending Enterprise Security Through a Hybrid Cloud Approach