Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation...

43
18 QUALYS SECURITY CONFERENCE 2018 Sumedh Thakar Chief Product Officer, Qualys, Inc. Regaining Our Lost Visibility

Transcript of Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation...

Page 1: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

18QUALYS SECURITY CONFERENCE 2018

Sumedh Thakar Chief Product Officer, Qualys, Inc.

Regaining Our Lost Visibility

Page 2: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

IT Transformation Infrastructure & Application

Page 3: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Digital Transformation Holistic Transformation of Business to Digital

Cloud, Containers, IaaS, PaaS, OT, IIoT, IoT, Mobility, Web apps, APIs, Mobile Apps

December 11, 2018 QSC Conference, 2018 4

Page 4: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Clouds

East Coast Datacenter

NETWORKS

VMs

DB

STORAGE

BARE METAL

Work Stations

Mobile Workforce

Hybrid Cloud Overview Architecture

West Coast Datacenter

NETWORKS

VMs

DB

STORAGE

BARE METAL

On-Premise

Page 5: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Containers Real game changer

Hypervisor disappearing, bare metal is back

Kubernetes Infrastructure-as-code

Container-as-a-Service AWS Fargate

AWS Lambda function-as-a-service, serverless!

Kubefed?

“Priceline” for Containers?

December 11, 2018 QSC Conference, 2018 6

Page 6: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

DevOps This is real and highly contagious

Developer decides how infrastructure runs in production

Speeds up significantly how fast code goes to production

December 11, 2018 QSC Conference, 2018 7

Page 7: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

On-Prem Shrinking Datacenter Footprint

Increasing OT & IIoT

Corp IT – more distributed & mobile

More IoT!

December 11, 2018 QSC Conference, 2018 8

Page 8: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Enterprise Mobility != BYoD Enterprise owned handheld devices

Indispensable to modern business

Running apps handling sensitive business & consumer data

Mobile!

December 11, 2018 QSC Conference, 2018 9

Page 9: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Web Apps & APIs

Web Apps for the humans

APIs for the inhumans

Wide window into all your data

December 11, 2018 QSC Conference, 2018 10

Page 10: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

SaaS More aaS everywhere

No infrastructure to manage

No Applications to code or manage

December 11, 2018 QSC Conference, 2018 11

Page 11: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

SaaS

December 11, 2018 QSC Conference, 2018 12

Page 12: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Security

Page 13: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

December 11, 2018 QSC Conference, 2018 14

IBM PC AT

Page 14: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

November 13, 1984 PC Magazine about IBM PC AT

“The AT provides the first real system for allowing executives to sleep at night:

A hard-to-duplicate ‘tubular’ key locks all but key holders out of the system”

December 11, 2018 QSC Conference, 2018 15

Page 15: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

34 years later No magic key = No sleep at night!

Same challenges x 10

No visibility across global hybrid infrastructure

Still need to do Vulnerability & Configuration management

Still need to monitor integrity of systems(?)

More data incoming into “SIEM” deployments

Basically no visibility to respond

Compliance demands on new infrastructure

December 11, 2018 QSC Conference, 2018 16

Page 16: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

December 11, 2018 QSC Conference, 2018 17

Page 17: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Future of Security

Transparent Orchestration

Built-in Automation the only real solution

Starts in DevOps

New generation of Security Analytics platforms

December 11, 2018 QSC Conference, 2018 18

Page 18: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys

Page 19: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Platform Approach Embracing our own Digital Transformation

Massive expansion of backend for visibility – 620 Billion security datapoints indexed

Comprehensive coverage of sensors – scanners, agents, cloud connectors, container sensors, passive sniffers and mobile agents

December 11, 2018 QSC Conference, 2018 20

Page 20: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Extending solutions into remediation & response

Building dedicated Data science team

Rapid expansion of R&D org

Key technology acquisitions & Investments

December 11, 2018 QSC Conference, 2018 21

Qualys Platform Approach

Page 21: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Acquisitions & Investments

December 11, 2018 QSC Conference, 2018 22

Nevis Passive Scanning & Secure Access Control

Netwatcher Event Correlation Platform

1Mobility Enterprise Mobility

Layered Insight Built-in Runtime Container Security

42Crunch Investment API Security

Frog 1

Frog 2

Page 22: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Cloud Apps

December 11, 2018 QSC Conference, 2018 23

Secure web applications with end-to-end protection

Web Application Scanning Web Application Firewall Block attacks and virtually patch web application vulnerabilities

WEB APPLICATION SECURITY

Security Configuration Assessment Automate configuration assessment of global IT assets

Policy Compliance PCI Compliance

Security Assessment Questionnaire

Assess security configurations of IT systems throughout your network

Automate, simplify and attain PCI compliance quickly

Minimize the risk of doing business with vendors and other third parties

COMPLIANCE MONITORING

ASSET MANAGEMENT

Asset Inventory Maintain full, instant visibility of all your global IT assets

CMDB Sync Synchronize asset information from Qualys into ServiceNow CMDB

File Integrity Monitoring Log and track file changes across global IT systems

Cloud Security Assessment Get full visibility and control across all public cloud instances

Continuously detect and protect against attacks, anytime, anywhere

Vulnerability Management Threat Protection Continuous Monitoring Pinpoint your most critical threats and prioritize patching

Alerts you in real time about network irregularities

IT SECURITY

Indication of Compromise Continuously monitor endpoints to detect suspicious activity

Container Security Discover, track, and continuously protect containers

Certificate Assessment

Cloud Inventory Certificate Inventory Inventory of all your cloud assets across AWS, Azure, GCP and others

Inventory of TLS/SSL digital certificates on a global scale

Assess all your digital certificates for TLS/SSL vulnerabilities

FIM

IOC

AI

VM CMTP

PCI

WAS WAF

PC

SAQ

CI

CRA

CRI

CS

CSA

SCA

SYN

Page 23: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Q4 2018 – more apps to come

December 11, 2018 QSC Conference, 2018 24

2018 2019

Patch Management – beta

Passive Network Senor (unmanaged assets) – beta

Global IT Asset Management (managed assets) – GA

AMPM

PAS

Page 24: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

2019 – even more apps to come! Secure Enterprise Mobility

Secure Access Control

API Security

Software Composition Analysis

Breach and Attack Simulation

Security Data Lake & Correlation Platform

December 11, 2018 QSC Conference, 2018 25

Page 25: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Unified Dashboards

December 11, 2018 QSC Conference, 2018 26

Page 26: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

DEMO

Page 27: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

It’s the Platform! (a real one)

Page 28: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business
Page 29: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Cloud Platform Environment Security at scale on hybrid clouds

15+ products providing comprehensive suite of security solutions

10,300+ customers

7 shared cloud platforms across North America, Europe & Asia

70+ private clouds platforms deployed globally... on-prem, AWS, Azure, GCP

16+ PB storage and 16,000 cores

December 11, 2018 QSC Conference, 2018 30

Page 30: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Cloud Platform Highlights 1+ trillion security events annually

3+ billion scans annually

2.5+ billion messages daily across Kafka clusters

620+ billion data points indexed in our Elasticsearch clusters

December 11, 2018 QSC Conference, 2018 31

Unprecedented 2-second visibility

Page 31: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Cloud Platform Sensors, Data Platform, Microservices, DevOps

December 11, 2018 QSC Conference, 2018 32

Application Services / Shared Services / Stream & Batch Processing / Reporting / Analytics

Cloud Agents

Passive Scanners Scanners Appliances Virtual Scanners

Qualys Streaming Data Backbone

Service Service Service Service Service

. . .

UI Portal

API

Internet Scanners

Page 32: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Sensor Platform Scalable, self-updating & centrally managed

December 11, 2018 QSC Conference, 2018 33

Physical Legacy data centers Corporate infrastructure Continuous security and compliance scanning

Cloud/Container Commercial IaaS & PaaS clouds Pre-certified in market place Fully automated with API orchestration

Continuous security and compliance scanning

Cloud Agents Light weight, multi-platform On premise, elastic cloud & endpoints Real-time data collection Continuous evaluation on platform for security and compliance

Passive Passively sniff on network

Real-time device discovery & identification

Identification of APT network traffic Extract malware files from network for analysis

API Integration with Threat Intel feeds CMDB Integration Log connectors

Virtual

Private cloud infrastructure Virtualized Infrastructure

Continuous security and compliance scanning

Page 33: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Data Platform-as-a-Service

December 11, 2018 QSC Conference, 2018 34

•  Highly scalable architecture •  Predictable performance at scale •  Distributed and fault-tolerant •  Multi-datacenter support •  Open-source •  Commodity hardware

Right database for the right use case

Page 34: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Data Platform-as-a-Service

December 11, 2018 QSC Conference, 2018 35

Ceph Object storage Moving Oracle and in-house blob storage into Ceph

Redis In-memory cache Improved system performance for frequently accessed data

Cassandra Low latency storage Source of truth for data across multiple products

Elasticsearch Search for anything Over 620 billion data points indexed Estimating about 1 trillion data points be year end

Kafka Asynchronous, event-driven architecture Foundation for Qualys Cloud Platform Over 2.5 billion messages per day

Page 35: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Microservices & Cloud Native Architectures Reduce risk and ship faster

December 11, 2018 QSC Conference, 2018 36

Change how we design and build applications and services

Service Service

Service Service

•  Monoliths to microservices •  Well defined APIs •  Packaged in containers •  Deployed on elastic infrastructure •  12-Factor apps •  CI/CD, Service Registry, Config Servers

Page 36: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

DevOps – Increased Efficiency

December 11, 2018 QSC Conference, 2018 37

Goal is to make software delivery vastly more efficient

Supporting about 80 shared and private cloud deployments

Page 37: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Automation - Infrastructure as Code

December 11, 2018 QSC Conference, 2018 38

Treat systems running your software as if they themselves are software Automate •  Infra provisioning •  Configuration management •  Deployments…

….all using code

Page 38: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Monitoring Systems - Observability

December 11, 2018 QSC Conference, 2018 39

Centrally monitor across all platforms using a single-pane view

End-to-end monitoring using •  Time series metrics •  Distributed tracing •  Log aggregation & analytics •  Alerting

Page 39: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Integrated Security - DevSecOps

December 11, 2018 QSC Conference, 2018 40

Built-in security practices across the DevOps lifecycle

Qualys-on-Qualys •  Manage vulnerabilities •  Comply with policies •  Secure and shield web apps •  Validate file integrity •  Monitor systems

Page 40: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Cloud Platform

December 11, 2018 QSC Conference, 2018 41

Messaging, Data, Analytics Platform

Integrated Suite of Applications FIM IOCCA AI VM CM TP PCI WAS WAFPC SAQIntegrated Suite of Applications

Shared Services

Subscription

Service

Authentication

Service

Authorization

Service

Indexing Service

Data Sync

Service

Tagging Service

Infrastructure and DevOps Toolchain

Logging

Monitoring

Config Mgmt.

Service Registry

CI/CD Docker/ Kubernetes

Page 41: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Qualys Cloud Applications

December 11, 2018 QSC Conference, 2018 42

Secure web applications with end-to-end protection

Web Application Scanning

Web Application Firewall Block attacks and virtually patch web application vulnerabilities

WEB APPLICATION SECURITY

Security Configuration Assessment Automate configuration assessment of global IT assets

Policy Compliance PCI Compliance

Security Assessment Questionnaire

Assess security configurations of IT systems throughout your network

Automate, simplify and attain PCI compliance quickly

Minimize the risk of doing business with vendors and other third parties

COMPLIANCE MONITORING

ASSET MANAGEMENT

Asset Inventory Maintain full, instant visibility of all your global IT assets

CMDB Sync Synchronize asset information from Qualys into ServiceNow CMDB

File Integrity Monitoring Log and track file changes across global IT systems

Cloud Security Assessment Get full visibility and control across all public cloud instances

Continuously detect and protect against attacks, anytime, anywhere

Vulnerability Management Threat Protection Continuous Monitoring Pinpoint your most critical threats and prioritize patching

Alerts you in real time about network irregularities

IT SECURITY

Indication of Compromise Continuously monitor endpoints to detect suspicious activity

Container Security Discover, track, and continuously protect containers

Certificate Assessment

Cloud Inventory Inventory of all your cloud assets across AWS, Azure, GCP and others

Inventory of TLS/SSL digital certificates on a global scale

Assess all your digital certificates for TLS/SSL vulnerabilities

FIM

IOC

AI

VM CMTP

PCI

WAS WAF

PC

SAQ

CI

CRA

CRI

CS

CSA

SCA

SYN Certificate Inventory

Patch Management (Beta) Select, manage, and deploy patches to remediate vulnerabilities

Page 42: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

Advanced Correlation & Analytics

December 11, 2018 QSC Conference, 2018 43

Network Security End Point Apps Cloud Users IoT Server Qualys Apps

Qualys Security Data Lake Platform Data Ingestion | Normalization | Enrichment | Governance

Threat Hunting Search | Exploration | Behavior Graph

ML/AI Service Patterns | Outlier | Predictive SoC

Security Analytics Anomaly | Visualization | Dashboard

UEBA User & Entity Behavior Analytics

Advanced Correlation Actionable Insights | Out-of-box Rules

Orchestration & Automation Integration | Playbooks | Response

Qualys Quick Connectors

IOCCA VM WAS WAFAI PC

Page 43: Regaining Our Lost Visibility - Qualys · Regaining Our Lost Visibility. IT Transformation Infrastructure & Application . Digital Transformation Holistic Transformation of Business

18QUALYS SECURITY CONFERENCE 2018

Thank You Sumedh Thakar

[email protected]