SlideShare a Scribd company logo
1 of 17
0
The M&A Story:Then and Now
Casey Lee
Director, IT Security
Chris Hines
Head of PMM (ZPA)
1 1
Every story begins with a Merger or Acquisition
2
One the excitement wears off, the fun begins…
Need identical
security
1 2 3
Must maintain
compliance levels
Visibility becomes
a factor
Acquired company may
not be as security
conscious
Access policies
Which security tech to
standardize on? Data privacy
Granular visibility and
security based on
identify
How do you determine who
across each company gets
access to SOC?
Liability site
Personal devices
3
MPLS Integration to the rescue?
1. Often requires network address translations (NATING)
2. Now you must deal with overlapping IP for branches and datacenters
3. The appliance game begins – do we need more appliances? Who’s appliances do we use
4. Do I have enough concurrent connection handling capacity on VPN concentrators?
5. Users do not have our VPN clients on their PC
6. I want to enable access to HR and Payroll portal for acquired org immediately, but this
requires full network access and ACLs
7. Data locality – how do we treat German traffic compared to US traffic?
How can IT ensure that business is ready to allow access to apps for acquisition employees without
compromising security and performance?
4
If legacy, network –centric
approaches are such a pain….
…what if we used the internet
to secure access instead?
Then Now
5
National Oilwell & Varco’s Story
Making zero trust possible and accelerating M&A
6©2018 Zscaler, Inc. All rights reserved. / Confidential
Casey Lee
Director IT Security
National Oilwell Varco
• About NOV – Oil & Gas manufacturer
• 38,000 employees
• 635 sites across 66 countries
• 11 regional hubs
• 300+ M&A over 15 years
7©2018 Zscaler, Inc. All rights reserved. / Confidential
Legacy Security Environment
Howdowestandardize?
1
2 Managed three sets of appliances
- Firmware, patching, troubleshooting and frequent need to
update appliances
3 Endpoints
- 70-75% laptops, lacked visibility, no protection off-net
4 Rise of SSL – loss of visibility
- Created need for decryption. More appliances?
Multiple security providers
- CheckPoint, BlueCoat, FireEye and OpenDNS
8
Architecture for Network Transformation
- Cheap Boxes
- Zscaler for Security
- 4X less MPLS $$$$
- 10x – 20x Speed Increase
- VPN tunnel – provider network
- Streamlined M&A process
9
Remote Access – Then & Now
Then
Network-
centric
Now
User & App
centric
Radius
ADFS
LAN
Now
Zero trust
10
Zscaler User Count: 38,000
employees. 10,000 users
secured by ZPA
Zscaler Products: ZPA, ZIA
Benefits of Zscaler Platform
• Was able to embrace a zero trust strategy with ZPA. Now hackers
can’t attack what they can’t see.
• 7,500 apps being discovered by ZPA connectors; of those 3,400 are
accessed by remote users.
• Now have a single security platform. Can secure access to internet
with ZIA and ZPA for secure access to internal apps.
• Leverages browser access capability
• Fast ZPA deployment shortens time for M&A while ensuring security.
11
Zscaler Private Access
12
ZPA: Zero trust access to any internal app, from any device anywhere
Public Cloud
Private Cloud
/ Data Center
Goal: Simplify network security. Accelerate process for acquired or divested assets.
INTERNALLY
MANAGED
HQ
location
Acquired or
divested mobile
users
Acquired or
divested
company
IOT devices
1. Standardize security policies for
newly acquired companies
2. Control user application
access, w/o network access
3. Consistent remote user
experience for all, without VPN
4. No change to infrastructure to
bring newly merged assets in
The value of cloud-based security
Secure and standard experience across all
users and assets
13
Software-defined
perimeter architecture
ZPA ZENs
secure user to app connection
1
Z-App / Browser Access
request access to app
2
App Connectors
sit in front of apps –
outbound-only connection
3
Zscaler Private Access – simplifying M&A
Zero trust security
with ZPA
• Treat all as untrusted –
both outside & inside the perimeter
• Verification prior to granting access
• Access is granted on a strict
“need to know” basis
• App access without requiring network
access
• Segment of one is created between
named users & named application
Z App
Browser Access
2
App Connectors
3 3
1 ZPA ZENs
Company A Company B
14
Comparing then, to now
Then Now
Application
Location
1. Examine the acquired company’s
network hygiene to determine risk
Subscribe to Zscaler Private
Access - no need for new
circuits or network changes
Network
Architecture
2. Order circuits from telecom
companies (and wait 3-9 months)
Turn on application
discovery
Security
Approach
3. Set up flexible IP addressing
scheme and/or NAT to absorb devices
on new network(s)
Configure user-to-
application access based
on discovery & user
context
4. Coordinate joint internal firewall
changes – ports, source addresses, NAT
5. Perform joint application inventory
6. Determine how to enforce access
control rules - firewall, NAT, proxy
7. Configure various required access
control mechanisms, load-balancing, etc.
15
CostExperience Security Simple
• Consistent
experience for all
acquired users
• No remote access
VPN login
• Users never on network
• Standardized security
• Control application
access
• Visibility into user
activity
• Weeks vs. years
• No change
• No network
segmentation
• Faster product
delivery
• No hardware
appliances
• No hardware
replacement
• Zero IP convergence
and segmentation costs
Benefits
16
Summary
Take ZPA
for a test drive.
https://www.zscaler.com/zpa-
interactive
Learn more about
Zscaler for M&A
https://www.zscaler.com/solutions
/mergers-acquisitions-divestitures
Casey Lee
Director, IT Security
National Oilwell & Varco
Chris Hines
Principal Product Manager
Zscaler

More Related Content

What's hot

Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Sayeed Shawon
 
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfQuantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfMiguelFernandoBarrio
 
Reflex klystron amplifier , microwave klystron amplifier
Reflex klystron amplifier , microwave klystron amplifierReflex klystron amplifier , microwave klystron amplifier
Reflex klystron amplifier , microwave klystron amplifierKamal Bhagat
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security systemStudent
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using ArduinoApoorv Anand
 
Digital modeling of speech signal
Digital modeling of speech signalDigital modeling of speech signal
Digital modeling of speech signalVinodhini
 
Wireless led notice board
Wireless led notice boardWireless led notice board
Wireless led notice boardRohith R
 
Hollow Core Fiber.
Hollow Core Fiber.Hollow Core Fiber.
Hollow Core Fiber.Karan Bhatia
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
paper presentation on fss 19 feb
paper presentation on fss 19 febpaper presentation on fss 19 feb
paper presentation on fss 19 febANKUSH PRAJAPAT
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)Abdullah Ozturk
 
optical transmitter
optical transmitteroptical transmitter
optical transmitter@zenafaris91
 

What's hot (20)

Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1Border security-using-wireless-integrated-network-sensors-1
Border security-using-wireless-integrated-network-sensors-1
 
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdfQuantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf
 
Reflex klystron amplifier , microwave klystron amplifier
Reflex klystron amplifier , microwave klystron amplifierReflex klystron amplifier , microwave klystron amplifier
Reflex klystron amplifier , microwave klystron amplifier
 
Presentation on Wireless border security system
Presentation on  Wireless border security systemPresentation on  Wireless border security system
Presentation on Wireless border security system
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
 
Spiral Antenna
Spiral Antenna  Spiral Antenna
Spiral Antenna
 
Digital modeling of speech signal
Digital modeling of speech signalDigital modeling of speech signal
Digital modeling of speech signal
 
plasma antenna
plasma antenna plasma antenna
plasma antenna
 
Wireless led notice board
Wireless led notice boardWireless led notice board
Wireless led notice board
 
Hollow Core Fiber.
Hollow Core Fiber.Hollow Core Fiber.
Hollow Core Fiber.
 
Wireless notice board using zigbee
Wireless notice board using zigbeeWireless notice board using zigbee
Wireless notice board using zigbee
 
CEH
CEHCEH
CEH
 
Rf fundamentals
Rf fundamentalsRf fundamentals
Rf fundamentals
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Path loss models
Path loss modelsPath loss models
Path loss models
 
paper presentation on fss 19 feb
paper presentation on fss 19 febpaper presentation on fss 19 feb
paper presentation on fss 19 feb
 
Sun transit outage
Sun transit outageSun transit outage
Sun transit outage
 
TinyOS
TinyOSTinyOS
TinyOS
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
optical transmitter
optical transmitteroptical transmitter
optical transmitter
 

Similar to Ma story then_now_webcast_10_17_18

3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019Zscaler
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?Zscaler
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityCryptzone
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Zscaler
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Solution note-cryptoflow-lan
Solution note-cryptoflow-lanSolution note-cryptoflow-lan
Solution note-cryptoflow-lancnnetwork
 

Similar to Ma story then_now_webcast_10_17_18 (20)

3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
What Comes After VPN?
What Comes After VPN?What Comes After VPN?
What Comes After VPN?
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8Three ways-zero-trust-security-redefines-partner-access-v8
Three ways-zero-trust-security-redefines-partner-access-v8
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Solution note-cryptoflow-lan
Solution note-cryptoflow-lanSolution note-cryptoflow-lan
Solution note-cryptoflow-lan
 

More from Zscaler

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinarZscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinarZscaler
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chZscaler
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly servicesZscaler
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Zscaler
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copyZscaler
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Zscaler
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZscaler
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalZscaler
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experienceZscaler
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deploymentZscaler
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud securityZscaler
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branchZscaler
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments failZscaler
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?Zscaler
 

More from Zscaler (20)

Zscaler mondi webinar
Zscaler mondi webinarZscaler mondi webinar
Zscaler mondi webinar
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Three ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-chThree ways-zero-trust-security-redefines-partner-access-ch
Three ways-zero-trust-security-redefines-partner-access-ch
 
Office 365 kelly services
Office 365 kelly servicesOffice 365 kelly services
Office 365 kelly services
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
Schneider electric powers security transformation with one simple app copy
Schneider electric powers security transformation with one simple app   copySchneider electric powers security transformation with one simple app   copy
Schneider electric powers security transformation with one simple app copy
 
Top 5 mistakes deploying o365
Top 5 mistakes deploying o365Top 5 mistakes deploying o365
Top 5 mistakes deploying o365
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Moving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospitalMoving from appliances to cloud security with phoenix children's hospital
Moving from appliances to cloud security with phoenix children's hospital
 
O365 quick with fast user experience
O365 quick with fast user experienceO365 quick with fast user experience
O365 quick with fast user experience
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Office 365 deployment
Office 365 deploymentOffice 365 deployment
Office 365 deployment
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Top reasons o365 deployments fail
Top reasons o365 deployments failTop reasons o365 deployments fail
Top reasons o365 deployments fail
 
GDPR - are you ready?
GDPR - are you ready?GDPR - are you ready?
GDPR - are you ready?
 

Recently uploaded

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...SUHANI PANDEY
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceEscorts Call Girls
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 

Recently uploaded (20)

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 

Ma story then_now_webcast_10_17_18

  • 1. 0 The M&A Story:Then and Now Casey Lee Director, IT Security Chris Hines Head of PMM (ZPA)
  • 2. 1 1 Every story begins with a Merger or Acquisition
  • 3. 2 One the excitement wears off, the fun begins… Need identical security 1 2 3 Must maintain compliance levels Visibility becomes a factor Acquired company may not be as security conscious Access policies Which security tech to standardize on? Data privacy Granular visibility and security based on identify How do you determine who across each company gets access to SOC? Liability site Personal devices
  • 4. 3 MPLS Integration to the rescue? 1. Often requires network address translations (NATING) 2. Now you must deal with overlapping IP for branches and datacenters 3. The appliance game begins – do we need more appliances? Who’s appliances do we use 4. Do I have enough concurrent connection handling capacity on VPN concentrators? 5. Users do not have our VPN clients on their PC 6. I want to enable access to HR and Payroll portal for acquired org immediately, but this requires full network access and ACLs 7. Data locality – how do we treat German traffic compared to US traffic? How can IT ensure that business is ready to allow access to apps for acquisition employees without compromising security and performance?
  • 5. 4 If legacy, network –centric approaches are such a pain…. …what if we used the internet to secure access instead? Then Now
  • 6. 5 National Oilwell & Varco’s Story Making zero trust possible and accelerating M&A
  • 7. 6©2018 Zscaler, Inc. All rights reserved. / Confidential Casey Lee Director IT Security National Oilwell Varco • About NOV – Oil & Gas manufacturer • 38,000 employees • 635 sites across 66 countries • 11 regional hubs • 300+ M&A over 15 years
  • 8. 7©2018 Zscaler, Inc. All rights reserved. / Confidential Legacy Security Environment Howdowestandardize? 1 2 Managed three sets of appliances - Firmware, patching, troubleshooting and frequent need to update appliances 3 Endpoints - 70-75% laptops, lacked visibility, no protection off-net 4 Rise of SSL – loss of visibility - Created need for decryption. More appliances? Multiple security providers - CheckPoint, BlueCoat, FireEye and OpenDNS
  • 9. 8 Architecture for Network Transformation - Cheap Boxes - Zscaler for Security - 4X less MPLS $$$$ - 10x – 20x Speed Increase - VPN tunnel – provider network - Streamlined M&A process
  • 10. 9 Remote Access – Then & Now Then Network- centric Now User & App centric Radius ADFS LAN Now Zero trust
  • 11. 10 Zscaler User Count: 38,000 employees. 10,000 users secured by ZPA Zscaler Products: ZPA, ZIA Benefits of Zscaler Platform • Was able to embrace a zero trust strategy with ZPA. Now hackers can’t attack what they can’t see. • 7,500 apps being discovered by ZPA connectors; of those 3,400 are accessed by remote users. • Now have a single security platform. Can secure access to internet with ZIA and ZPA for secure access to internal apps. • Leverages browser access capability • Fast ZPA deployment shortens time for M&A while ensuring security.
  • 13. 12 ZPA: Zero trust access to any internal app, from any device anywhere Public Cloud Private Cloud / Data Center Goal: Simplify network security. Accelerate process for acquired or divested assets. INTERNALLY MANAGED HQ location Acquired or divested mobile users Acquired or divested company IOT devices 1. Standardize security policies for newly acquired companies 2. Control user application access, w/o network access 3. Consistent remote user experience for all, without VPN 4. No change to infrastructure to bring newly merged assets in The value of cloud-based security Secure and standard experience across all users and assets
  • 14. 13 Software-defined perimeter architecture ZPA ZENs secure user to app connection 1 Z-App / Browser Access request access to app 2 App Connectors sit in front of apps – outbound-only connection 3 Zscaler Private Access – simplifying M&A Zero trust security with ZPA • Treat all as untrusted – both outside & inside the perimeter • Verification prior to granting access • Access is granted on a strict “need to know” basis • App access without requiring network access • Segment of one is created between named users & named application Z App Browser Access 2 App Connectors 3 3 1 ZPA ZENs Company A Company B
  • 15. 14 Comparing then, to now Then Now Application Location 1. Examine the acquired company’s network hygiene to determine risk Subscribe to Zscaler Private Access - no need for new circuits or network changes Network Architecture 2. Order circuits from telecom companies (and wait 3-9 months) Turn on application discovery Security Approach 3. Set up flexible IP addressing scheme and/or NAT to absorb devices on new network(s) Configure user-to- application access based on discovery & user context 4. Coordinate joint internal firewall changes – ports, source addresses, NAT 5. Perform joint application inventory 6. Determine how to enforce access control rules - firewall, NAT, proxy 7. Configure various required access control mechanisms, load-balancing, etc.
  • 16. 15 CostExperience Security Simple • Consistent experience for all acquired users • No remote access VPN login • Users never on network • Standardized security • Control application access • Visibility into user activity • Weeks vs. years • No change • No network segmentation • Faster product delivery • No hardware appliances • No hardware replacement • Zero IP convergence and segmentation costs Benefits
  • 17. 16 Summary Take ZPA for a test drive. https://www.zscaler.com/zpa- interactive Learn more about Zscaler for M&A https://www.zscaler.com/solutions /mergers-acquisitions-divestitures Casey Lee Director, IT Security National Oilwell & Varco Chris Hines Principal Product Manager Zscaler

Editor's Notes

  1. 1. Do you still use MPL