Teradata Secures Workloads at Scale with Cisco

Multicloud data and analytics leader chooses Cisco for agility, control, and lower TCO.

Teradata

Teradata, a connected multicloud data platform company for enterprise analytics, solves business challenges from start to scale. Teradata enables enterprises to handle the massive and mixed data workloads of the future today.

Industry: Technology
Location: San Diego, California
Size: 7000 employees
Website: teradata.com

Summary

Challenges

  • Faster security provisioning for customer onboarding
  • Scaling egress security across a multicloud environment took time
  • Desired reduction in maintenance-driven downtime
  • Faced with trade-offs supporting customers and updating infrastructure simultaneously
  • Reducing cost

Results

  • 50% reduction in provisioning time
  • Deployed egress security in minutes to hundreds of cloud sites
  • Fully Qualified Domain Name (FQDN) updates decreased from hours to seconds; gateway upgrades reduced to minutes
  • Able to prioritize support for hundreds of customers and infrastructure at the same time
  • 35% reduction in infrastructure cost through architecture optimization

Balancing multicloud agility and security

Dr. Stacy Lanier, director of cloud engineering for Teradata, faced a dilemma. Teradata was a fast-growing market leader in delivering data and analytics across their varied cloud infrastructure. The company's growth and success meant Dr. Lanier needed to evolve his tool stack to keep up with demand while enabling business agility and consistent security policy across each major public cloud. As Dr. Lanier began defining his requirements, he focused on improving security through cloud egress-filtering while enhancing resilience and customer experience. He needed to meet a few core requirements with this new solution.

Security provisioning in minutes to enhance customer onboarding

Security couldn't get in the way of service delivery. Dr. Lanier wanted his team to not just meet, but exceed, requirements for customer agility.

Security rule updates at scale

Due to Teradata's large number of cloud sites, updating security rules and managing security tools were top of mind for the company. Waiting hours wasn't an option since that impacted their posture and ability to respond to incidents.

Low operational overhead through a cloud-native approach

Teradata needed to minimize the time it spent troubleshooting and managing operational requirements. Dr. Lanier wanted a scalable, cloud-native approach so that his team could focus on addressing new business priorities rather than spending hours maintaining Teradata's cloud security infrastructure.

Dr. Lanier also realized that to protect their resources, they required additional security capabilities like decryption and advanced content inspection (Intrusion Prevention (IDS/IPS), URL filtering) that cloud service providers could not fully support.

The business wasn't slowing down. Dr. Lanier needed a new solution, and he needed it fast.

Cisco enables us to do in minutes what previously took hours. When you multiply the many tasks to update gateways, change rules, and support new customers, Cisco Multicloud Defense has the potential to save Teradata in terms of both dollars and hours.

Dr. Stacy Lanier, Director of Cloud Engineering

Finding a modern solution to secure multicloud infrastructure

One of Dr. Lanier's cloud security architects came across Cisco Multicloud Defense while researching new cloud security solutions. Initially, the team signed up to address their high-level requirements. As they dug in, they were pleased with the benefits of Cisco Multicloud Defense and could deploy into a test environment without issue.

"Before we even talked to the Cisco team, we could see the potential fit of their platform with our needs. It was a good sign that we could sign up in minutes on their website."

"The 'a-ha' moment for us was that we could deploy cloud security gateways in minutes, which meant we could remove the bottleneck to customer provisioning. Similarly, security gateway updates could be automated with little downtime and minimal maintenance windows," said Dr. Lanier.

Dr. Lanier and his team set up a meeting with Cisco to discuss architecture and run a proof-of-concept trial.

"Once we met with the Cisco team, we were impressed by what we found. The Cisco Multicloud Defense architecture was differentiated from other options and our existing solution. This meant that it would not only meet our needs but could grow as the business grew in the future," Dr. Lanier added.

To complete their due diligence, Dr. Lanier's team also compared Cisco Multicloud Defense with a solution from a next-generation firewall (NGFW) vendor. What they found further confirmed their direction with Cisco:

  • The competing appliance took 30 minutes to boot up— an issue for a dynamic and changing environment.
  • The management and controller architecture would require Dr. Lanier's team to manage and maintain another piece of controller software, which was less desirable.
  • The cloud network orchestration required placing the NGFW in the traffic path and would create additional implementation and operational burdens on Dr. Lanier's cloud engineering team.
  • High availability (HA) and scale did not meet the operational requirements. The competing appliance required multiple virtual machines (VMs) for HA, which increased cost and complexity, versus a single Multicloud Defense Gateway that could be restarted quickly. In the team's tests, the NGFW failed to deliver at Teradata's scale requirement, thus creating a potential business bottleneck.

The Cisco solution: Cloud-native architecture to achieve agility for multicloud networking and security

After extensive evaluation, Dr. Lanier and his team chose Cisco Multicloud Defense to address their needs. It will provide an agile, scalable, and robust solution to address their secure cloud networking requirements—now and in the future.

"Cisco Multicloud Defense gives us the best of both worlds. We will be enabled to standardize for consistency across each cloud deployment, reduce operational overhead, and increase our business agility," said Dr. Lanier. "Cisco enables us to do in minutes what previously took hours. When you multiply the many tasks to update gateways, change rules, and support new customers, Cisco Multicloud Defense has the potential to save Teradata in terms of both dollars and hours."

Dr. Lanier's team worked with Cisco to build a distributed cloud security architecture to support multicloud while keeping data local to each customer account. As a result of the Multicloud Defense Controller and Cloud Gateway architecture, they could meet their business requirements to keep data local to each customer while maintaining consistency and centralized policy management across clouds.

The software as a service (SaaS) Multicloud Defense Controller increased efficiency for Teradata by eliminating maintenance and scale management. Also, proactive monitoring provided by the Multicloud Defense Controller through integration with Slack, Datadog, and other monitoring tools enabled critical escalations and accelerated workflow.

The Multicloud Defense Gateway provided Teradata with architectural flexibility for distributed and centralized security. This flexibility was essential to support a variety of use cases, including multi-tenant and single-tenant data clouds.

Infrastructure as Code (IaC) and Policy as Code (PaC) enabled complete automation through Terraform and REST-based API integrations. With Cisco Multicloud Defense, Teradata could achieve the separation of infrastructure and policies that gave them the desired agility.

As a result, Teradata was able to meet its business goals with the following outcomes:

  • Decreased customer provisioning time—Cisco provided Teradata with an approach to achieve their security and compliance goals without slowing down business delivery.
  • Increased agility—Policy updates were applied in minutes across hundreds of security control points using a centralized multicloud security architecture, accelerating incident response.
  • Reduced maintenance and troubleshooting—Time saved by automating routine maintenance and troubleshooting tasks allowed the team to focus on more important security and compliance needs.

"Cisco Multicloud Defense was the right solution to modernize our secure cloud networking infrastructure. They enabled a first-class architecture centralizing multicloud visibility and control across our customer accounts. We're excited to partner with Cisco," said Dr. Lanier.

Opportunities for the future

While starting with egress security, Dr. Lanier was excited about the other opportunities that Cisco Multicloud Defense, as a security platform, opened up for his team. IPS/IDS was of special interest to help block exploit attempts and other threats. The ability to remove other tools and consolidate policy management provides significant agility and economic benefits.

Additionally, Dr. Lanier's team needed to create a more centralized security model for both ingress and egress traffic for a new multi-tenant offering. Cisco Multicloud Defense's architectural flexibility for centralized and distributed use cases allowed Teradata to maintain centralized security visibility and control regardless of the security architecture.

What is cloud egress filtering and why is it important?

Having control over outbound destinations from your cloud workloads and data stores is a fundamental best practice. However, few organizations implement this practice in their environment. For those that do, it often proves ineffective for their organization.

FQDN filtering—FQDN (fully qualified domain name) filtering operates on the destination name to either allow or deny an outbound request based on a set of parameters. Outbound connections can be allowed or denied based on a list of known good domains (allowlisting) or known bad domains (blocklisting).

URL filtering—URL filtering works by analyzing web traffic and filtering it based on the URLs (for example, https://domain.com/URL) accessed. This involves identifying the URLs accessed by your applications and then comparing those URLs to a list of known malicious or potentially harmful URLs or known good URLs. URL filtering requires transport layer security (TLS) decryption since the URL is part of the TLS-encrypted HTTP traffic. FQDN domain filtering doesn't require decryption, although it does require category-based domain intelligence that most solutions don't provide. A great example of a domain where you also need to consider the URL is github.com. Whether the URL is github.com/MyOrganization vs. github.com/MaliciousSite, is important when implementing a secure egress strategy. Clearly, FQDN filtering will not help in this case. You need to filter based on the URL.

Domain and URL category classification is provided by a service built into your security platform that can classify any domain/site and URL in real time. This means that you don't have to explicitly list the specific ones you want in your policy out of the millions of domains and billions of URLs.

As a result, you can:

  • Block all malicious categories like malware, phishing, botnets, etc.
  • Allow only approved pre-defined categories like Financial Services, AWS Cloud Services, etc.
  • Permit only approved customer-defined categories: My Payment Processors, My Third-Party Vendors