SlideShare a Scribd company logo
copyright 2015
Cloud Applications Secured
copyright 2015
Presenters
2
Patrick Kerpan
CEO
@pjktech
Chris Swan
CTO
@cpswan
copyright 2015
Cohesive Networks - Cloud Applications Secured
3
VNS3 family of security and
connectivity solutions protects
cloud-based applications from
exploitation by hackers, criminal
gangs, and foreign governments

1000+ customers in 20+ countries
across all industry verticals and
sectors
Partner
Network
TECHNOLOGY PARTNER
copyright 2015
Our lineup
4
Application Security Controller
turret
free, self-service cloud connectivity
vpn
security and connectivity networking
net
scalable
VPN
end-to-end
encryption
multi-cloud,
multi-region
monitor &
manage
automatic
failover
secure app
isolation
✓ ✓ ✓ ✓ ✓ ✓
✓ ✓ ✓ + +
✓ ✓
virtual network management system
ms
high availability & automatic failover
ha
ADD-ONs
+
+
copyright 2015
Available everywhere in Microsoft Azure
5
copyright 2015 6
VNS3 connectivity and security with L4-L7 plug-in system
Isolated Docker containers withinVNS3 allows Partners and Customers to embed
features and functions safely and securely into their Cloud Network.
Router Switch Firewall Protocol
Redistributor
VPN
Concentrator
Scriptable
SDN
VNS3 Core Components
Proxy Reverse Proxy Content Caching Load Balancer IDS Custom Container
copyright 2015
VNS3 and Cloud Application Segmentation
7
copyright 2015
I don’t need to tell you about the security landscape
8
FUD
copyright 2015 9
The Problem - Lots of apps sprawled across enterprise clouds
The Solution -VNS3 Application Segmentation
copyright 2015
A typical business application
10
WebTier
AppServer
Tier
Database
Tier
Message
Queues
copyright 2015
PerimeterSecurity
Public and Private clouds are filled with these applications,
many of them “critical” infrastructure
11
80% of Security $s
20% of Security $s
(RSA)
copyright 2015
PerimeterSecurity
Hard on the outside, soft on the inside
12
copyright 2015
PerimeterSecurity
One penetration creates significant potential

for “East-West” expansion of the attack
13
copyright 2015 14
The Problem - Lots of apps sprawled across enterprise clouds
The Solution -VNS3 Application Segmentation
copyright 2015
“Application Segmentation” completes the cloud security model
15
Hardware
Managed by
Azure
Hypervisor
Managed by
Azure
Application
Policies
Customers Control
Layer 7


Layer 6
Layer 5
Layer 4
Layer 3
Layer 3
Layer 2
Layer1
Layer 0
App 1 App 2
Limit of user access,
control and visibility
Azure Layer 3
Network
Cloud
Service
Provider
Cloud
Customer
copyright 2015
Introducing theVNS3 Application Security Controller
16
M
Virtual Adapter Virtual Adapter Virtual Adapter
Layer 3
Encrypted
Switch
Layer 3
Encrypted
Router
GRE
Protocol
Bridge
Protocol
Re-
Distributor
Industry Standard L4 - L7 PLUGIN System
Mesh Transaction
Management
Core Mesh
Firewall
Mesh Key
Management
Net Management
Interfaces
SSLVPN

Edge
IPsecVPN
Edge
Autonomics
Agents
RESTful
API Service Cloud Capacity Interfaces
Virtual
CPU(s)
AES-NI

Interface
Provisioned
IOPS
Enhanced
Network
Drivers
App

FW
Custom
Mods
SSL/TLS
Offload
Content
Cache
Internal
LB
IDS
IPS
Application Security Controller NIC(s)
Unique Encrypted Topology Identity
UniqueEncryptedTopologyIdentity
UniqueEncryptedTopologyIdentity
copyright 2015
VNS3 Application Segmentation
17
turret
VNS3 creates a micro-perimeter around critical applications in any data center,
cloud or virtualized environment
Traffic only flows in
permitted directions,
from permitted locations.
None of the servers
talks to any other server
without going through a
secureVNS3 switch.
copyright 2015
Why now - “demand”?
18
NIST Cyber Security Framework
PR.AC-5
Network integrity is protected, 

incorporating network segregation
where appropriate
copyright 2015
Why now - “supply”?
19
Network FunctionVirtualization
- we can make networks out of

virtual machines and containers
Software Defined Networking
- we can manage networks

through APIs
DevOps and Containers
- makes application networks 

just another config
copyright 2015
Once the micro-perimeter is established the broad policy
enforcement mechanism is in place, with strict traffic flow controls.
20
copyright 2015
Demo
21
copyright 2015
DemoTopology
22
VNS3 Manager 1 VNS3 Manager 2 VNS3 Manager 3
VNS3 Overlay Network - 192.168.56.0/24
Overlay IP: 192.168.56.111 Overlay IP: 192.168.56.101*
Sinatra App Tier Primary DB Backup DB
Active IPsec Tunnel
Public IP: 104.40.234.149 Public IP: 191.236.146.199
Peered
Overlay IP: 192.168.56.101
Public IP: 104.42.102.143
VNS3 Manager 4
Public IP: 191.236.53.137 VNS3 Overlay - 172.31.0.0/22
Nginx Server
Overlay IP: 172.31.1.1
Peered
Customer 

Corp Office
West Europe West US North Central US
East US
copyright 2015
Anywhere an application can go - it needs
security & connectivity.
• Perimeter based security models are no longer sufficient. One
compromise becomes the starting point for East-West attacks
across a series of application deployments.
• Application Security Controllers use NFV and SDN to build an
application-centric perimeter rather than traditional “edge”
perimeter.
• Application-centric Security is portable across Azure zones and
locations.
23

More Related Content

PPTX
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
armmbed
 
PPTX
mbed Connect Asia 2016 mbed HDK From prototype to production
armmbed
 
PPTX
mbed Connect Asia 2016 David Morning Welcome and Kickoff
armmbed
 
PPTX
mbed Connect Asia 2016 Intro to mbed OS
armmbed
 
PDF
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
VMUG IT
 
PPTX
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
PPTX
mbed Connect Asia 2016 Overview of mbed Device Connector
armmbed
 
PPTX
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
armmbed
 
mbed Connect Asia 2016 Developing IoT endpoints with mbed client
armmbed
 
mbed Connect Asia 2016 mbed HDK From prototype to production
armmbed
 
mbed Connect Asia 2016 David Morning Welcome and Kickoff
armmbed
 
mbed Connect Asia 2016 Intro to mbed OS
armmbed
 
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
VMUG IT
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
mbed Connect Asia 2016 Overview of mbed Device Connector
armmbed
 
mbed Connect Asia 2016 Developing IoT devices with mbed OS 5
armmbed
 

What's hot (19)

PDF
IoT Peplink
HeadAdmin
 
PDF
Building a chain of trust from the device to the cloud in 5G
Paul Bradley
 
PPTX
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays
 
PPTX
Jimbob's Towing and Wrecker Services Presentation
Tony DeGonia (LION)
 
PPTX
JWTS Presentation
Tony DeGonia
 
PDF
Cloud networking use cases with VNS3
Cohesive Networks
 
PPSX
authentication and access control(http://4knet.ir)
Azad Kaki
 
PDF
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
Justrassity996
 
PPT
MIT EmTech TR35 India 2011
manav416
 
PDF
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Cohesive Networks
 
PPTX
CCI2019 - Architecting and Implementing Azure Networking
walk2talk srl
 
PDF
Novosco Zero day protection webinar
Novosco
 
PDF
Comparison: VNS3 vs Vyatta
Cohesive Networks
 
PDF
Lancope and-cisco-asa-for-advanced-security
Lancope, Inc.
 
PDF
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata
 
PDF
Cisco, Sourcefire and Lancope - Better Together
Lancope, Inc.
 
PDF
Hope, fear, and the data center time machine
Cisco Canada
 
PDF
Mqtt & Kafka & Security
Virgil Borcea
 
IoT Peplink
HeadAdmin
 
Building a chain of trust from the device to the cloud in 5G
Paul Bradley
 
apidays LIVE Paris - Multicluster Service Mesh in Action by Denis Jannot
apidays
 
Jimbob's Towing and Wrecker Services Presentation
Tony DeGonia (LION)
 
JWTS Presentation
Tony DeGonia
 
Cloud networking use cases with VNS3
Cohesive Networks
 
authentication and access control(http://4knet.ir)
Azad Kaki
 
The-Cisco-Aironet-1130AG-Series-Access-Point-Is-An95
Justrassity996
 
MIT EmTech TR35 India 2011
manav416
 
Patrick Kerpan's CSA EMEA Congress presentation "Overlay Networks: Connecting...
Cohesive Networks
 
CCI2019 - Architecting and Implementing Azure Networking
walk2talk srl
 
Novosco Zero day protection webinar
Novosco
 
Comparison: VNS3 vs Vyatta
Cohesive Networks
 
Lancope and-cisco-asa-for-advanced-security
Lancope, Inc.
 
Cisco discovery d homesb module 7 - v.4 in english.
igede tirtanata
 
Cisco, Sourcefire and Lancope - Better Together
Lancope, Inc.
 
Hope, fear, and the data center time machine
Cisco Canada
 
Mqtt & Kafka & Security
Virgil Borcea
 
Ad

Viewers also liked (9)

PPTX
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Codit
 
PPTX
Lessons from migrating container applications to azure
Christoph Schittko
 
PDF
Architecting Microsoft Azure Solutions
Vijayananda Mohire
 
PPTX
Using windows azure to develop secure and deploy cloud applications Santiago ...
Juan Pablo
 
PPTX
TechDays NL 2016 - Building your scalable secure IoT Solution on Azure
Tom Kerkhove
 
PDF
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
DotNetCampus
 
PPTX
Securing sensitive data with Azure Key Vault
Tom Kerkhove
 
PPTX
Design Practices for a Secure Azure Solution
Michele Leroux Bustamante
 
PPTX
Windows Azure Active Directory: Identity Management in the Cloud
Chris Dufour
 
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Codit
 
Lessons from migrating container applications to azure
Christoph Schittko
 
Architecting Microsoft Azure Solutions
Vijayananda Mohire
 
Using windows azure to develop secure and deploy cloud applications Santiago ...
Juan Pablo
 
TechDays NL 2016 - Building your scalable secure IoT Solution on Azure
Tom Kerkhove
 
70-534: ARCHITECTING MICROSOFT AZURE SOLUTIONS
DotNetCampus
 
Securing sensitive data with Azure Key Vault
Tom Kerkhove
 
Design Practices for a Secure Azure Solution
Michele Leroux Bustamante
 
Windows Azure Active Directory: Identity Management in the Cloud
Chris Dufour
 
Ad

Similar to Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Overlay Networks" (20)

PPT
Vpn rsvp
Swarup Kumar Mall
 
PPTX
Digital Transformation Drives WAN Evolution
Marco
 
PDF
Ip tunneling and vpns
DAVID RAUDALES
 
PDF
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
PDF
Ip tunnelling and_vpn
Rajesh Porwal
 
PDF
Cloud Security Best Practices - Part 2
Cohesive Networks
 
PPSX
Síťová virtualizace s VMware
MarketingArrowECS_CZ
 
PDF
Comparison: VNS3 and Openswan
Cohesive Networks
 
PDF
GAMO VMware vCloud Air
GAMO a.s.
 
PDF
Secure SDN
APNIC
 
PDF
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Plain Concepts
 
PPT
V P N
bhathiji
 
PPTX
The Data Center Network Evolution
Cisco Canada
 
PPTX
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Nur Shiqim Chok
 
PPTX
New NSX Pitch Deck 2023 030302020202.pptx
contaworldigital
 
PDF
Banv meetup 04162014
ozkan01
 
PDF
Simplifying the secure data center
Cisco Canada
 
PDF
Docker meetup talk - chicago March 2014
Ryan Koop
 
PDF
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
Indonesia Network Operators Group
 
Digital Transformation Drives WAN Evolution
Marco
 
Ip tunneling and vpns
DAVID RAUDALES
 
VMware NSX for vSphere - Intro and use cases
Angel Villar Garea
 
Ip tunnelling and_vpn
Rajesh Porwal
 
Cloud Security Best Practices - Part 2
Cohesive Networks
 
Síťová virtualizace s VMware
MarketingArrowECS_CZ
 
Comparison: VNS3 and Openswan
Cohesive Networks
 
GAMO VMware vCloud Air
GAMO a.s.
 
Secure SDN
APNIC
 
Protección y acceso a tu información y aplicaciones en Azure y O365 – Barracuda
Plain Concepts
 
V P N
bhathiji
 
The Data Center Network Evolution
Cisco Canada
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
Nur Shiqim Chok
 
New NSX Pitch Deck 2023 030302020202.pptx
contaworldigital
 
Banv meetup 04162014
ozkan01
 
Simplifying the secure data center
Cisco Canada
 
Docker meetup talk - chicago March 2014
Ryan Koop
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
Indonesia Network Operators Group
 

More from Cohesive Networks (20)

PDF
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
PDF
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cohesive Networks
 
PDF
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Cohesive Networks
 
PPTX
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Cohesive Networks
 
PDF
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks
 
PDF
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks
 
PDF
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cohesive Networks
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Cohesive Networks
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Cohesive Networks
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks
 

Recently uploaded (20)

PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
The Future of Artificial Intelligence (AI)
Mukul
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 

Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Overlay Networks"

  • 3. copyright 2015 Cohesive Networks - Cloud Applications Secured 3 VNS3 family of security and connectivity solutions protects cloud-based applications from exploitation by hackers, criminal gangs, and foreign governments
 1000+ customers in 20+ countries across all industry verticals and sectors Partner Network TECHNOLOGY PARTNER
  • 4. copyright 2015 Our lineup 4 Application Security Controller turret free, self-service cloud connectivity vpn security and connectivity networking net scalable VPN end-to-end encryption multi-cloud, multi-region monitor & manage automatic failover secure app isolation ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ + + ✓ ✓ virtual network management system ms high availability & automatic failover ha ADD-ONs + +
  • 5. copyright 2015 Available everywhere in Microsoft Azure 5
  • 6. copyright 2015 6 VNS3 connectivity and security with L4-L7 plug-in system Isolated Docker containers withinVNS3 allows Partners and Customers to embed features and functions safely and securely into their Cloud Network. Router Switch Firewall Protocol Redistributor VPN Concentrator Scriptable SDN VNS3 Core Components Proxy Reverse Proxy Content Caching Load Balancer IDS Custom Container
  • 7. copyright 2015 VNS3 and Cloud Application Segmentation 7
  • 8. copyright 2015 I don’t need to tell you about the security landscape 8 FUD
  • 9. copyright 2015 9 The Problem - Lots of apps sprawled across enterprise clouds The Solution -VNS3 Application Segmentation
  • 10. copyright 2015 A typical business application 10 WebTier AppServer Tier Database Tier Message Queues
  • 11. copyright 2015 PerimeterSecurity Public and Private clouds are filled with these applications, many of them “critical” infrastructure 11 80% of Security $s 20% of Security $s (RSA)
  • 12. copyright 2015 PerimeterSecurity Hard on the outside, soft on the inside 12
  • 13. copyright 2015 PerimeterSecurity One penetration creates significant potential
 for “East-West” expansion of the attack 13
  • 14. copyright 2015 14 The Problem - Lots of apps sprawled across enterprise clouds The Solution -VNS3 Application Segmentation
  • 15. copyright 2015 “Application Segmentation” completes the cloud security model 15 Hardware Managed by Azure Hypervisor Managed by Azure Application Policies Customers Control Layer 7 
 Layer 6 Layer 5 Layer 4 Layer 3 Layer 3 Layer 2 Layer1 Layer 0 App 1 App 2 Limit of user access, control and visibility Azure Layer 3 Network Cloud Service Provider Cloud Customer
  • 16. copyright 2015 Introducing theVNS3 Application Security Controller 16 M Virtual Adapter Virtual Adapter Virtual Adapter Layer 3 Encrypted Switch Layer 3 Encrypted Router GRE Protocol Bridge Protocol Re- Distributor Industry Standard L4 - L7 PLUGIN System Mesh Transaction Management Core Mesh Firewall Mesh Key Management Net Management Interfaces SSLVPN
 Edge IPsecVPN Edge Autonomics Agents RESTful API Service Cloud Capacity Interfaces Virtual CPU(s) AES-NI
 Interface Provisioned IOPS Enhanced Network Drivers App
 FW Custom Mods SSL/TLS Offload Content Cache Internal LB IDS IPS Application Security Controller NIC(s) Unique Encrypted Topology Identity UniqueEncryptedTopologyIdentity UniqueEncryptedTopologyIdentity
  • 17. copyright 2015 VNS3 Application Segmentation 17 turret VNS3 creates a micro-perimeter around critical applications in any data center, cloud or virtualized environment Traffic only flows in permitted directions, from permitted locations. None of the servers talks to any other server without going through a secureVNS3 switch.
  • 18. copyright 2015 Why now - “demand”? 18 NIST Cyber Security Framework PR.AC-5 Network integrity is protected, 
 incorporating network segregation where appropriate
  • 19. copyright 2015 Why now - “supply”? 19 Network FunctionVirtualization - we can make networks out of
 virtual machines and containers Software Defined Networking - we can manage networks
 through APIs DevOps and Containers - makes application networks 
 just another config
  • 20. copyright 2015 Once the micro-perimeter is established the broad policy enforcement mechanism is in place, with strict traffic flow controls. 20
  • 22. copyright 2015 DemoTopology 22 VNS3 Manager 1 VNS3 Manager 2 VNS3 Manager 3 VNS3 Overlay Network - 192.168.56.0/24 Overlay IP: 192.168.56.111 Overlay IP: 192.168.56.101* Sinatra App Tier Primary DB Backup DB Active IPsec Tunnel Public IP: 104.40.234.149 Public IP: 191.236.146.199 Peered Overlay IP: 192.168.56.101 Public IP: 104.42.102.143 VNS3 Manager 4 Public IP: 191.236.53.137 VNS3 Overlay - 172.31.0.0/22 Nginx Server Overlay IP: 172.31.1.1 Peered Customer 
 Corp Office West Europe West US North Central US East US
  • 23. copyright 2015 Anywhere an application can go - it needs security & connectivity. • Perimeter based security models are no longer sufficient. One compromise becomes the starting point for East-West attacks across a series of application deployments. • Application Security Controllers use NFV and SDN to build an application-centric perimeter rather than traditional “edge” perimeter. • Application-centric Security is portable across Azure zones and locations. 23