SlideShare a Scribd company logo
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Cyber Priority
Option for Enhanced Infrastructure
Data Protection Measures
Agenda
• Level of Criticality / Current Perceptions
• Recommendations
• What Does the Future Hold?
• Call to Action
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 2
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Criticality of Network Security
The Connection: Network Data & Cybersecurity
• Migration to cloud-based services increases
vulnerability
• Evolution of the “Network of Things”
is a catalyst for a heightened volume
of sensitive data
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Do Agency Cybersecurity Priorities
and Budgets Align?
Agency Cyber Priorities & Budgets
Agencies’ cybersecurity priorities for 2015 include a widespread focus
on prevention (72%), and budgets reflect this.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC.
4%
24%
72%
0
20
40
60
80
100
High Priority
Moderate Priority
Not a Priority
6%
71%
24%
0
20
40
60
80
100
Increase in FY 2015
About the same in FY
2015 as previous
fiscal year
Decrease in FY 2015
2015 Cybersecurity Prevention Budget2015 Cybersecurity Prevention Priority Level
96% 95%
6
To the best of your knowledge, in each of the following areas did your agency’s cyber-
security budget increase, decrease, or stay about the same as the previous fiscal year?
What are your agency’s cybersecurity priorities for 2015 with
regard to prevention?
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Are Agencies Protecting Data on
the Network? If Not, Why Not?
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 8
Is Data as Safe as Agencies Think It Is?
Agency encryption is focused on web applications (SSL). Yet there are many
other applications that need protection on the network.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 9
Commercial Solutions for Classified (CSfC)
Standardized Inflight Encryption Policy for Public Sector
• CSfC describes how to protect classified data
in transit across untrusted networks leveraging
multiple levels of encryption
• COTS products leveraging Suite B encryption
algorithms are preferred and gaining momentum
• Developed vendor-agnostic capability packages to
provide high-level security and configuration
guidance for customers and/or solution integrators
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Recommendations
Recommendations
Checklist for selecting a data protection solution for your network…
Simple to implement and maintain
Does not impact your network or increase network
costs due to complexity and management overhead
The right level to protect the different types of data
on your network
Can handle your data connection speeds today
as well as into the future
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12
Brocade Security Solutions
• Physical/Modular solutions with the capability to deliver
Terabits per second of encrypted throughput within a
single chassis
• Virtual IPSec VPN—prime solution for edge and
data center deployments
– Low cost software solution that can be applied as a
virtualized overlay within existing infrastructures
– Excellent solution for SaaS models to provide inflight
encryption services per customer
• Alternative acquisition model leveraging OPEX dollars to
easily scale and modernize
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
What Can Agencies Expect
in the Future?
• Leverage software defined networking to centrally
manage and abstract how security policies are
defined, managed, and deployed
• Future application development will allow for
enhanced end-to-end security initiation,
configuration and management
• SDN brings multiple security disciplines
together between various vendors for a
truly unified experience with a common
API framework that any security appliance
can leverage
Software Defined Networking (SDN)
Enhances Data Protection
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Hypervisor
Multi-core CPU
SW Router
SW Firewall
SW VPN
Virtual Networking
Platform Image
15
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Call to Action
Learn More about Protecting the Data
on Your Network!
• Download the Federal Network Security
Survey Report
www.marketconnectionsinc.com/networksecurity
• Check out the latest on the efforts associated with the
CSfC charter and proposed framework associated with
NSA/IAD
– Latest Capabilities Package:
https://www.nsa.gov/ia/_files/VPN_CP_3_0.pdf
• Bring focus to the security aspects of our customers’
environments—we have the tools
today to minimize the pain
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17
Learn More about Protecting the Data
on Your Network!
• Discuss how the SDN conversations can be
tied to security as part of a encryption services
offering
• Swing by the Technical Pavilion to talk with
Brocade subject matter experts about data
protection offerings
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION
Thank you

More Related Content

Cyber Priority - Judson Walker

  • 1. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Cyber Priority Option for Enhanced Infrastructure Data Protection Measures
  • 2. Agenda • Level of Criticality / Current Perceptions • Recommendations • What Does the Future Hold? • Call to Action © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 2
  • 3. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Criticality of Network Security
  • 4. The Connection: Network Data & Cybersecurity • Migration to cloud-based services increases vulnerability • Evolution of the “Network of Things” is a catalyst for a heightened volume of sensitive data © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 4
  • 5. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Do Agency Cybersecurity Priorities and Budgets Align?
  • 6. Agency Cyber Priorities & Budgets Agencies’ cybersecurity priorities for 2015 include a widespread focus on prevention (72%), and budgets reflect this. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 4% 24% 72% 0 20 40 60 80 100 High Priority Moderate Priority Not a Priority 6% 71% 24% 0 20 40 60 80 100 Increase in FY 2015 About the same in FY 2015 as previous fiscal year Decrease in FY 2015 2015 Cybersecurity Prevention Budget2015 Cybersecurity Prevention Priority Level 96% 95% 6 To the best of your knowledge, in each of the following areas did your agency’s cyber- security budget increase, decrease, or stay about the same as the previous fiscal year? What are your agency’s cybersecurity priorities for 2015 with regard to prevention?
  • 7. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Are Agencies Protecting Data on the Network? If Not, Why Not?
  • 8. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 8
  • 9. Is Data as Safe as Agencies Think It Is? Agency encryption is focused on web applications (SSL). Yet there are many other applications that need protection on the network. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATIONSOURCE: MARKET CONNECTIONS, INC. 9
  • 10. Commercial Solutions for Classified (CSfC) Standardized Inflight Encryption Policy for Public Sector • CSfC describes how to protect classified data in transit across untrusted networks leveraging multiple levels of encryption • COTS products leveraging Suite B encryption algorithms are preferred and gaining momentum • Developed vendor-agnostic capability packages to provide high-level security and configuration guidance for customers and/or solution integrators © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 10
  • 11. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Recommendations
  • 12. Recommendations Checklist for selecting a data protection solution for your network… Simple to implement and maintain Does not impact your network or increase network costs due to complexity and management overhead The right level to protect the different types of data on your network Can handle your data connection speeds today as well as into the future © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 12
  • 13. Brocade Security Solutions • Physical/Modular solutions with the capability to deliver Terabits per second of encrypted throughput within a single chassis • Virtual IPSec VPN—prime solution for edge and data center deployments – Low cost software solution that can be applied as a virtualized overlay within existing infrastructures – Excellent solution for SaaS models to provide inflight encryption services per customer • Alternative acquisition model leveraging OPEX dollars to easily scale and modernize © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 13
  • 14. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION What Can Agencies Expect in the Future?
  • 15. • Leverage software defined networking to centrally manage and abstract how security policies are defined, managed, and deployed • Future application development will allow for enhanced end-to-end security initiation, configuration and management • SDN brings multiple security disciplines together between various vendors for a truly unified experience with a common API framework that any security appliance can leverage Software Defined Networking (SDN) Enhances Data Protection © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Hypervisor Multi-core CPU SW Router SW Firewall SW VPN Virtual Networking Platform Image 15
  • 16. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Call to Action
  • 17. Learn More about Protecting the Data on Your Network! • Download the Federal Network Security Survey Report www.marketconnectionsinc.com/networksecurity • Check out the latest on the efforts associated with the CSfC charter and proposed framework associated with NSA/IAD – Latest Capabilities Package: https://www.nsa.gov/ia/_files/VPN_CP_3_0.pdf • Bring focus to the security aspects of our customers’ environments—we have the tools today to minimize the pain © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 17
  • 18. Learn More about Protecting the Data on Your Network! • Discuss how the SDN conversations can be tied to security as part of a encryption services offering • Swing by the Technical Pavilion to talk with Brocade subject matter experts about data protection offerings © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION 18
  • 19. © 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. COMPANY PROPRIETARY INFORMATION Thank you

Editor's Notes

  1. Page 6
  2. Page 8
  3. Page 9
  4. Page 10