Enabling FinTechs for Success through Business-Driven Cloud Security

Similar documents
Disrupt or be disrupted

SOLUTION BRIEF RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK

Laying the ground work to grow cloud opportunities

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

Your Business Needs Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

Oracle Management Cloud

Service Management Automation: Solutionas-a-Service. Brochure. Professional Services

Challenges for Migrating to Today's Growing Multicloud

Government solutions. Enterprise & Government Solutions

HYBRID CLOUD MANAGEMENT WITH. ServiceNow. Research Paper

The top 8 reasons. to outsource your IT. to a managed services provider

Fortune 10 Company Uses DevOps to Drive Efficiency. Transforming a Generations-old Approach with Chef Automate and Habitat

Simple, Scalable, Real-time Protection

The Optanix Platform. Service Predictability. Delivered. Optanix Platform Overview. Overview. 95% 91% proactive incidents first-time fix rate

The Economic Benefits of Puppet Enterprise

Oracle Integration Platform

Capgemini Cloud Platform. Migrate, operate, and innovate every aspect of your business in the cloud

Keep It Simple. White Paper

DevOps, DevSecOps, and varmour

Migration to Microsoft Azure: Optimization using Cloud Services

MICROSERVICES. Prabavathy Arumugam Software AG. All rights reserved. For internal use only

Fostering Business Consumption With Automation & Orchestration Of IT Services. Antoine Acklin Head of Consulting, Australia & New Zealand

Accenture Architecture Services. DevOps: Delivering at the speed of today s business

for managing your changing IT environment.

Continuous Controls Inheritance

Bluemix Overview. Last Updated: October 10th, 2017

SOLUTION BRIEF HELPING ADDRESS GDPR CHALLENGES WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Microsoft moves IT infrastructure management to the cloud with Azure

Customer Challenges SOLUTION BENEFITS

Meeting the New Standard for AWS Managed Services

Predix Asset Performance Management. Enabling optimal asset reliability, availability, and performance

Oracle Cloud Blueprint and Roadmap Service. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Pivotal Ready Architecture by Dell EMC

Achieving a Continuous State of Compliance and Readiness on AWS Unlock GRC Innovation on Public Cloud

NCR Passport for Commercial. Part of NCR s enterprise hub for remote deposit capture

Disaster Recovery Service Guide

Seamless Application Security: Security at the Speed of DevOps

Security Solutions in Azure

Actionable Intelligence Meets Organized Action and Automation

UForge AppCenter 3.8. Introduction March Copyright 2018 FUJITSU LIMITED

The business owner s guide for replacing accounting software

Fortune Global 50 Financial Institution Accelerates Application Delivery with Anuta ATOM Network Service Orchestration

Intelligence, Automation, and Control for Enterprise DevOps

can I consolidate vendors, align performance with company objectives and build trusted relationships?

Elevate your organization. To reach the Cloud.

Integrating Configuration Management Into Your Release Automation Strategy

ARE YOU GOING DIGITAL WITHOUT A NET?

Achieve Continuous Compliance via Business Service Management (BSM)

WE GIVE YOU 15 REASONS WHY YOU SHOULD AUTOMATE THE BANK RECONCILIATION PROCESS IN MICROSOFT DYNAMICS AX

An Overview of the AWS Cloud Adoption Framework

2 ebook Increase Service Visibility

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved.

Carousel Managed Services: A Clear Way Toward Business Transformation

REINVENTING THE SCIENCE OF NETWORKS

Brochure. Application Lifecycle Management. Accelerate Your Business. Micro Focus Application Lifecycle Management Software

Next Generation Services for Digital Transformation: An Enterprise Guide for Prioritization

Hybrid Cloud. Private and public clouds under a single service

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284

The four steps to Service Management Exellence. White Paper.

VERACODE EBOOK 5 FIVE PRINCIPLES FOR. Securing DevOps

Open the door and unlock opportunities with the Cisco Services Icebreaker Program. What s hidden in your Cisco Installed Base? TD Azlan, Services

The Future Moves Fast: Are You Ready to Respond?

Solution White Paper Drive Radical Business Value with a High-Speed IT Organization

Hitachi Solutions. Ground to Cloud Dynamics AX 2012 Migration to D365

CONSULTING & CYBERSECURITY SOLUTIONS

CA Network Automation

Evanios Capabilities. The Top 16 Things We Do Really Well TRUSTED BY

Increase Value and Reduce Total Cost of Ownership and Complexity with Oracle PaaS

PARTNER SOLUTION BRIEF

Best Practices for IT Service Management in 2017+

I D C I N C O N V E R S A T I O N. Ac c e l e r a t e d Ap plication Deve l o p m e n t : B u i l d, D e l i ve r a n d M a n a g e

Moving to the Cloud: What They Don t Tell You ARTICLE. Human Focused. Technology Solutions.

Integrated IT Management Solutions. Overview

Artificial Intelligence-Driven, Cloud-based Systems Management Platforms Fill an Important Market Need

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant

Application Performance Management for Microsoft Azure and HDInsight

Aprimo Marketing Productivity

5 Things to Know About Network Monitoring in a Cloud-Centric World

4 Reasons Organizations Are Taking an End-to-End Approach to Accounts Payable Automation

ITSM + ITOM = Outsmart Service Outages

On-premise or Cloud: Which is Right for Your Business

IBM Security Investor Briefing 2018

AUTOMATE YOUR ORGANIZATION

State of Software Delivery Trends in the market now and in the future. XebiaLabs

Mastering Wellbeing & Compliance. Practical advice on how to protect people, reputations and revenues

Solution White Paper Drive Radical Business Value with a High-Speed IT Organization

Predix Asset Performance Management. A Digital Mine solution

Fast Innovation requires Fast IT

Service management solutions White paper. Six steps toward assuring service availability and performance.

incontact Analytics Consolidated reporting and analytics for your contact center.

Enterprise Monitoring Management

BMC - Business Service Management Platform

Secure information access is critical & more complex than ever

8 Steps CIOs Must Take To Transform With Artificial Intelligence

Commvault XaaS Solutions for Service Providers

Capability Statement

Configuration Management in cloud environment

Software Composition Analysis Maturity Model

Transcription:

Enabling FinTechs for Success through Business-Driven Cloud Security How Proactive and Automated Cloud Security Aligns Security Initiatives with Business Goals Sesh Murthy, CTO of Cloud Raxak Cloud Expo East 2017 2017 Cloud Raxak Inc.

Overview What security challenges do FinTechs face on the cloud and with their customers? Why is it crucial to handle residual risk on the cloud? What is the business value of proactive automated cloud security? 2

Why do FinTechs use the cloud? Flexibility Managed cloud services for employees and customers Hybrid environments for flexible security, services, and costs Scalability Supports business growth and handles customer demand Agility Speeds time to market Enables quicker response time Lower and predictable costs 3

What cloud security challenges do FinTechs face? Complex cloud environments Dynamic nature of cloud, scale, hybrid environments, and novice users lead to security complexity that traditional security processes can t handle Lack of security expertise and resources Cloud security is a shared responsibility between the CSP and the FinTech Managing security requires a deep understanding of how to effectively implement regulations Budget limitations FinTechs don t have the budget of a large bank to develop this security in-house Impediment to business operations Traditional (manual/semi-automated) security management processes slow down DevOps and other business operations Gaining customers trust FinTech solutions need to be secure and compliant with complex regulations If not compliant, FinTechs cannot sell their services and grow their business 4

Example: Amberoon Amberoon is a FinTech that specializes in the dynamic analysis of data to provide insights around risk management and fraud detection for banks Their SaaS solution needed to be compliant with FFIEC regulations in order to sell to their first few customers and diminish ongoing residual risk Implementing compliance manually was costly, time consuming, prone to errors, and slowed down rapid development and business agility Proactive automated cloud security enabled Amberoon to gain customers trust and grow their business Enabled secure DevOps without slowing it down Provided proof of continuous FFIEC compliance to regulators and customers (banks) Diminished residual risk through 24/7 automated security monitoring and visibility into company security posture 5

Why is it crucial to handle residual risk on the cloud? Residual risk is the financial impact that your organization could be exposed to if security is breached This exposure increases as a result of incorrect initial setup or because of configuration drift from the initial controlled state Ignoring residual risk leads to high security costs, greater chance of a breach, and broken business continuity Cloud security is a configuration management issue Thousands of security configurations that need to be consistently managed Incidents like WannaCry show that just one misconfiguration is all it takes for a breach to happen to you 6

What is the solution? Build proactive and automated security into the cloud environment through configuration management. Why proactive? You can no longer afford reactive practices becauses the costs and risks are too high. Proactive security first is the only way to truly protect yourself. Why automated? Automation enables proactivity. It s the only way to continuously and consistently manage the thousands of security configurations on the cloud. 7

What is the business value of proactive automated cloud security for FinTechs? FinTechs cannot do business unless they can prove compliance Accelerates business growth by aligning security and business goals Cuts costs FinTechs can finally gain customer trust and sell their services, because they can prove compliance to customers and regulators Improves business agility by speeding development (improves top line) Facilitates cloud-based transformations Cuts cost of cloud security and compliance management by up to 80% Substantially reduces residual risk Diminishes residual risk by up to 97% (improves top line by enabling better selling) Truly continuous, consistent protection of data, employees, and customers Speeds reactive measures through instant visibility of environment s security state 8

9

How Proactive Automated Cloud Security Works (DevOps Example) 1. Off-band process: Cloud Raxak + FinTech CTO/CISO create a set of standard images that can be used to provision new VMs Images are up to date with patches and auto-enroll created instances into Raxak Protect Each image has a comprehensive CISO-defined security profile attached to it 2. DevOps user logs into the cloud platform and chooses the appropriate image from this list of available standard images to create VMs 3. Upon creation, the VMs are automatically enrolled in Raxak Protect Raxak Protect automatically scans the created VMs using the appropriate CISO-defined security profile, and automatically remediates any findings (misconfigurations) Raxak Protect re-scans the VMs on a pre-defined schedule and automatically remediates any configuration drift Raxak Protect creates audit-ready reports with each scan, which are available on demand The DevOps user can continue with development, knowing their workloads are secure but not needing to know the complex details of how to manage security 4. The SysAdmin/CISO office uses Raxak Protect to govern the security and compliance status of all enrolled VMs We guarantee the desired configuration of your cloud assets. 10

THANK YOU! For more information, please reach out to us at: info@cloudraxak.com www.cloudraxak.com 2017 Cloud Raxak Inc.