Software Defined Perimeter (SDP) Prevailing after Hackathon Kickoff at Cloud Security Alliance Congress 2014
14 Days Left to Attempt Breach of SDP Protected Public Cloud and Earn a Prize of $10,000San Jose, CA – October 2, 2014 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes the use of best practices for providing security assurance within cloud computing, today announced that Software Defined Perimeter (SDP) has yet to be hacked after 2.9 billion packets fired from 104 countries attempting breach of the SDP protected public cloud. CSA data shows nearly 11 million attempts have been made to break the first layer of the SDP, but none has succeeded at this time. Denial of Service attacks have been most used, including resource and bandwidth attacks. Additionally, directed attacks against TCP 443 and port scan are among the attacks used. Last month, CSA invited Congress participants, along with hackers from all over the world, to attempt to access a file server in a public cloud protected by the SDP, via a different public cloud. The first participant to successfully capture the target information on the protected file server will receive the still-available prize of $10,000. The contest is open through October 16th. “We look forward to seeing hackers continue to brave this challenge,” said Junaid Islam, CTO of Vidder Inc. and co-chair of the CSA SDP Working Group. “The early results only reinforce SDP’s intrinsic ability to secure connectivity – one application at a time – anywhere in the world, including in a public cloud.” To join or follow the SDP hackathon in progress, visit the CSA Hackathon home page and the CSA Twitter feed. About Software Defined Perimeter The Software Defined Perimeter (SDP) is a new approach to security being developed as an open standard by the Cloud Security Alliance (CSA). SDP mitigates network-based attacks by creating dynamically provisioned perimeters anywhere in the world–including in a cloud, on the DMZ, and in the data center. Intrinsically secure, the SDP starts with zero visibility and zero connectivity. Only after the user and his device have been authenticated, the SDP dynamically builds networks to authorized applications. Enterprise companies use Software Defined Perimeter to protect applications on the Internet, such as business and partner portals, cross-company collaboration, and for their migration to Infrastructure-as-a-Service and SaaS services. And, in addition to using SDP to internally isolate critical applications, enterprises use it to protect internal business critical applications for non-employee and BYOD access. About the Cloud Security Alliance The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at https://cloudsecurityalliance.org, and follow us on Twitter @cloudsa. Media Contact Zenobia Godschalk [email protected] 650.269.8315
Share this content on your favorite social network today!
About Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, follow us on Twitter @cloudsa.
For press inquiries, email Zenobia Godschalk of ZAG Communications or reach her by phone at 650.269.8315.