Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events

Page created by Darren Lawrence
 
CONTINUE READING
Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
Keep it secure, stupid
(The Super Villains of Cyber Crime)

Lance Crosby, CEO
                                      1
Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
2
Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
I did a lot. I learned a lot

                               3
Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
Creating Cloud Required
New Thinking and Solutions

 Full, API-driven   Total Self-Service   Centrally-Managed     Global Secure
   Automation       Access & Control      Global Platform    Private Networking

                                                                                  4
Keep it secure, stupid - (The Super Villains of Cyber Crime) Lance Crosby, CEO - Acronis Events
DDoS Attacks on the Rise

             DDoS Attacks Above 1Gbps
                       (Millions)

3.5

3.0

2.5

2.0

1.5
                                                         62% increase in overall malware detections
                                                         compared to Q4 20181
1.0
                                                         More than 4,000 ransomware attacks occur each
                                                         day – up 300% from 20152
0.5

0.0
      2016    2017    2018          2019   2020   2021

                                                                                                         5
Global Multi-cloud Load Balancing

                                    6
The industry isn’t ready
for what’s coming

                           7
Increasing Video and IoT Demand
               Global Consumer Internet Video                                                      Number of IoT Devices
                                     (Exabytes)                                                              (Billions)
140                                                                        40
                         Online Video     OTT Video
120                                                                        35

                                                                           30
100
                                                                           25
 80
                                                                           20
 60
                                                                           15
 40
                                                                           10
 20                                                                         5

  0                                                                         0
        2016      2017        2018           2019       2020       2021          2016       2017      2018        2019       2020   2021

               32%
       Online Video CAGR
                                                      27%
                                                  OTT Video CAGR
                                                                                                             15%
                                                                                                             CAGR

By 2020, more people will watch video online than on TV1                  In 2016, there was 6.8ZB of data center traffic3
1M minutes of video will cross the network every second1                  By 2021, 850ZB expected to be generated by IoT devices every second3
By 2022, 82% of all traffic will be video up from 75% in 20172            127 new IoT devices are connected every second – almost 11M a day4

                                                                                                                                                 8
5G Cellular Will Change Everything

                                     9
The Requirements for Edge Solutions
are Being Defined

                          Management of near-infinite number of end points
                          Edge computing must be able to support, adapt to, and
                          effectively administrate a constantly growing number
                          of end users and devices, across regions and countries.

                          Security between edge nodes
                          Edge computing must have exceptional security measures at
                          every point — between edge nodes and at the hardware layer,
                          network layer, and application layer.
  Key Edge Requirements   Processing and managing valuable data
                          Edge computing must provide effective, wholistic tools for
                          manipulating and extracting the full value of data, including
                          storage, management, and processing that is high-volume,
                          high-performance, and long-term.

                                                                                          10
Security Model Evolution
                       Yesterday                               Today                             Tomorrow
                 Security controls were             Security controls are client-      Security controls will be cloud –
             Network – based and client-centri        centric and fragmented               based and data-centric

             ▪ Users utilize company owned       ▪ Users can use any managed          ▪ Users can use any device
  Devices      devices ran corporate operating     device (bring-your-own-device
               system (OS) images                  or “BYOD”)

             ▪ Users connected to corporate      ▪ Users connect to corporate         ▪ Users connect to cloud resources
  Network
               intranet (on-premises or via a      resources via the internet using     via the internet using resource-
   Access
               VPN with a physical smartcard)      multifactor authentication           level multifactor authentication

             ▪ Services supported a single       ▪ Platform diversity is              ▪ Services are platform-agnostic
 Platforms
               platform                            accommodated

   Service   ▪ Datacenter-based services were    ▪ Users access virtualized           ▪ Users access cloud-based
   Access      only accessed on premises           applications and services            applications and services
                                                 ▪ Perimeter is identity based        ▪ Perimeter is intelligent edge-
                                                                                        /cloud-based

                                                                                                                           11
The solutions to these
challenges are the keys for
owning the next era of cloud

                               12
Securing the Edge

                    13
The Edge is the Battlefront for Cybersecurity

            Security                                 Latency                          Geographic Control                             Decentralization
 All traffic passes through the edge,    Edge PoPs are the physically closest          Edge PoPs are, by definition,           The edge allows data to be processed
 making it the first and best place to    point of interaction with end users,       geographically-specific, providing        as early possible and as it is received,
identify, measure, monitor, and block     enabling them to provide the least        logical and physical checkpoints for          rather than shipping it all back to
             security issues.                latency of all cloud services.              limiting access/availability.                    a central location.

           Number                            Data Aggregation                       Endpoint-to-Endpoint                          Global Accessibility
        of Endpoints                         & Consolidation                            Interaction                                  & Continuity
 The edge is the point of cloud entry         Data can be aggregated,            Endpoints that need little to no cloud-side     Geographically diverse by nature,
for all endpoints, making it the prime     deduplicated, summarized, and              support can communicate and                 edge services allow for unique
  location for managing endpoints           consolidated right at the edge,       collaborate peer-to-peer with minimal          synchronization, replication, and
          and inbound data.               reducing total traffic consumption.       brokering provided by/at the edge.            failover solution opportunities.

                                                                                                                                                                      14
//Develop your edge

                      15
www.acronis.org

Building a more knowledgeable future

CREATE, SPREAD
AND PROTECT
KNOWLEDGE WITH US!

Building new schools • Providing educational programs • Publishing books
                    Dual headquarters
                    in Switzerland and Singapore
                                                            Proprietary and Confidential   © 2019   16
You can also read