Souhwan Jung.
|
|
- Evelyn McDonald
- 5 years ago
- Views:
Transcription
1 Souhwan Jung
2 Outline 2
3 Paradigm Shift of Computing 3 Mainframe Computing Sharing of Computing resources Distributed Computing Distribution and networking for computing capability Cloud Computing Virtualization Mainframe computing Client-Server computing Cloud computing
4 Cloud Computing 4 Key technology is virtualization Computing virtualization Network virtualization Storage virtualization Virtualization is Logical machine VM on Hypervisor Logical separation no physical borderline for a company Logical domain virtual LAN, virtual storage etc
5 Why cloud computing spreads fast? 5 Economic reason cost efficiency Smart devices phone, car, TV etc Big Data Productivity for distributed collaboration Security control at the uniform level
6 Types of cloud computing 6 Private cloud - Many institute build their own clouds Public cloud - e.g. AWS, Force.com Hybrid cloud - a hybrid form of private (or legacy) and public cloud
7 Security appliances 7 Many security appliances Firewall IPS/IDS Web Firewall AntiVirus sofrware Anti-DDoS system Privacy software DB encryption Authentication server Etc...
8 Secure enough? 8 The answer is NOT yet. Still many unknown vulnerabilities Heterogeneous security solutions Complicate security management Too many sites to monitor Hard to maintain security at the uniform level
9 Need to change Security Paradigm 9 Appliance-based Security Solution Cloud-based Security Service Web security & filter security Message security Anti-virus VPN / SSL Firewall / Web firewall IPS / IDS, DDoS Advantages Centralized security controls Provide stable and specialized security service
10 Cloud Security 10 Security platform for cloud computing itself Security platform and cloud platform are tightly coupled Correspondence in each layer from kernel to user Restriction to supporting various requirements from clients Security as a Service Provide a reconfigurable security service for clients Centralized security control Maintaining a unified security level Easy security patch at the cloud
11 SecaaS: Security as a Service 11 SecaaS is a kind of SaaS Software security service based on cloud computing Motivation
12 Architecture of SecaaS 12 CSP (IaaS, PaaS, SaaS) Standalone SecaaS Cloud SecaaS Cloud Clients Cloud SecaaS Security service for protecting it s clients Standalone SecaaS Security service for end-point Legacy System
13 CSA (Cloud Security Alliance) 13 CSA Initiated at ISSA CISO Forum in Nov / Published in Dec The organization to provide security in cloud computing Nonprofit organization for educating cloud computing security Top Threats to Cloud Computing Source : Personal Cloud Security Framework (TTA) Threat #1 : Abuse and Nefarious Use of Cloud Computing Threats #2 : Insecure Interfaces and APIs Threats #3 : Malicious Insiders Threats #4 : Shared Technology Issue Threats #5 : Data Loss or Leakage Threats #6 : Account or Service Hijacking Threats #7 : Unknown Risk Profile
14 SecaaS WG defined 10 categories Identity and Access Management (IAM) 2. Data Loss Prevention (DLP) 3. Web Security 4. Security 5. Security Assessments 6. Intrusion Management (IM) 7. Security Information and Event Management (SIEM) 8. Encryption 9. Business Continuity and Disaster Recovery (BCDR) 10. Network Security
15 IAM Service 15 Identity and Access Management (IAM) SecaaS Provide controls for assured identities and access management Service: user-centric ID provider, Federated IDs, Policy provider, authorization management, Electronic signature etc
16 Data Loss Prevention (DLP) Service 16 DLP SecaaS Monitoring, protecting, and verifying the security of data in-use(endpoint action), in-motion (network traffic), at-rest (data storage) Service: meta-data tagging, data-leakage detection, transparent data encryption, dynamic data masking, policy controlled data access, multilingual fingerprinting etc
17 Web Security Service 17 Web security SecaaS Proxying and redirecting web traffic to the cloud provider Added layer of protection for entering the enterprise via web browsing Service: web filtering, web monitoring, anti-phishing, server, anti-spam etc
18 Security Service 18 Security SecaaS Provide control over inbound and outbound Policy-based encryption of s, digital signatures Service: content security, anti-virus/anti-malware, spam filtering, encryption etc
19 Security Assessment Service 19 Security Assessment SecaaS Third-party audits of cloud services or assessments of on-premises systems Compliance control for IaaS, PaaS, and SaaS platforms Service: internal/external penetration test, application penetration test, host and guest assessments, virtual infrastructure assessment etc
20 Intrusion Management Service 20 Intrusion Management (IM) SecaaS Using pattern recognition to detect and react to statistically unusual events Reconfiguring system components in real time to stop an intrusion Service: packet inspection, detection, prevention event correlation and pattern recognition, DPI etc
21 SIEM Service 21 Security Information and Event Management (SIEM) SecaaS Accept log, event and flow information from a diverse set of devices Conduct information security analysis, correlation Real-time reporting and alerting on incidents/events Service: log management, event correlation, security/incident response, log and event storage, interactive searching and parsing of log data etc
22 Encryption Service 22 Encryption SecaaS One of the most effective data protection controls Critical customer and enterprise data could be held by third-party cloud providers in multi-tenant shared computing and storage environments Service: VPN service, Key management, virtual storage encryption etc
23 BC / DR Service 23 Business Continuity and Disaster Recovery (BC / DR) SecaaS The contingency plans and measures to ensure operational resiliency How to maintain the ability to quickly and reliably recover Cloud centric BC/DR makes use of the cloud s flexibility to minimize cost and maximize benefic Service: file recovery provider, file backup provider, Replication etc
24 Network Security Service 24 Network Security SecaaS Security control at the network in aggregate Requires tight integration with the hypervisor Service: Firewall, DDoS protection, IDS/IPS etc
25 Security as a Service 25 Cloud-based Security Service Market To reach $4.2 billion by 2016 Cloud security services market by the end of 2013, with a growth rate of 30%, is expected to surpass the traditional security market. Segment year CAGR(%) Secure Gateway Secure Web Gateway Remote Vulnerability Assessment Identity and Access Management Security Information Event Management Other Cloudbased Security Services ,000 1,200 1,400 1,530 1, Total 1,115 1,470 1,977 2,570 3,231 3,758 4, Source : Gartner <Market Trends: Cloud-Based Security Services Market, Worldwide, 2012>
26 SecaaS Solutions 26 Current solutions Segment Core function Products or Vendor Cloud SecaaS Standalone SecaaS IAM Network security Web security BC / DR IAM Web Security DLP Security Assessment Intrusion management Encryption BC / DR Network security AWS IAM, IBM IAM VPC, Monitoring, Firewall, IDS Web firewall Backup, Disaster Recovery CA Arcot Webfort (Pendo systems) Cyber Ark Software Privileged Identity Manager (McAfee) Nevell Cloud Security Services (NetIQ) BlueCoat, RSA, TrendMicro, Websense, zscaler Symantec(Data Loss Prevention) Websense(Data Seucriyt Suite) Zenprise(XenMobile MDM) Zscaler(Data Protection) Gmail, McAfee, TrendMicro, Zscaler, Microsoft Cloud Services Agiliance, Core Security, Modulo, Qualys, Veracode, WhiteHat Cymtec Scout, Sourcefire, StoneGate, Symantec, TrendMicro Credant, Cypher Cloud, enstratus, Novaho, Perpecsys Atmos, Decco, Digital Prallels, Rackspace CloudFlare, Imperva, Rackspace, Symantec, Stonesoft
27 Two approaches for SecaaS 27 Cloud SecaaS by CSP The security service for protecting it s customers and cloud system Cloud customers will use Cloud SecaaS Major company(hybrid cloud) : Cloud SecaaS in the public cloud Small and medium businesses(public cloud) : Cloud SecaaS Standalone SecaaS Standalone SecaS for end-point security service Thin client + Public Cloud(ex: google chrome notebook) : not activation DaaS(Desktop-as-a-service) : leaks of company information End-user device : not easy to apply pc-level security Mobile Anti-virus : SecaaS is more suitable
28 Our Work 28 Installing Cloud Test-bed Our test-bed was installed using CloudStack What is CloudStack? Open source software designed to deploy and manage large networks of virtual machines Work as a highly available, highly scalable Infrastructure as a Service (IaaS) cloud computing platform CloudStack 4.0 (apache) Hypervisor : KVM (RedHat) CPU 6 core, RAM 32GB Storage : NFS
29 Our Work 29 The Model of SecaaS Platform VPN connection Tenants Internet Server (web, , etc) Guest VM SeccaS Platform Guest VM SeccaS Platform DB Guest VM Packet Controller Guest VM Service 1 Guest VM Service 2 Guest VM Service N
30 Our Work 30 The Architecture of SecaaS Platform Packet Controller : handling tenants packets to security service they want VM Management : managing VMs to install security service IaaS API Handler : APIs provided by CloudStack to manage computing resources Platform Admin Portal Portal SSP Admin Portal Tenant Admin Service Offering Report Tenant Application Subscription Order Account BSS Pricing Settlement Billing Metering SLA Provisioning Configuration Packet Control OSS VM Mgmt Resource Scaling Monitoring Reporting IaaS API Handler (Cloudstack) Infrastructure (IaaS: Cloudstack)
31 Our Work 31 SSP Admin Service Management: Create, delete, Subscribe, Unsubscribe services VM Management: Start, stop and checks VMs status Billing and Report based on Tenant users Portal SSP Admin Portal Tenant Admin Platform Admin Portal Service Offering Report Tenant Application Subscription Order Account BSS Pricing Settlement Billing Metering
32 Our Work 32 Platform Admin Account Management: Activate/deactivate admins accounts System Management: Handling offering services, pricing, and metering information Portal SSP Admin Portal Tenant Admin Platform Admin Portal Service Offering Report Tenant Application Subscription Order Account BSS Pricing Settlement Billing Metering
33 Our Work 33 Tenant Admin Tenant Management: handler users information Tenant Group Management: users who use the same security services will belong to the same group Portal SSP Admin Portal Tenant Admin Platform Admin Portal Service Offering Report Tenant Application Subscription Order Account BSS Pricing Settlement Billing Metering
34 Our Work 34 Design of SecaaS Platform
35 Our Work 35 Flexible configuration of security policies Apply multiple security functions to a single data stream Standard APIs for security modules
36 Conclusion 36 New paradigm for security service Appliance-based security solution moves to Cloud-based security service SecaaS is a new platform for providing security service Existing security services can be transformed into SecaaS (10 categories) Many advantages in upgrading and patching at centralized SecaaS platform
37 37 Thank you
Copyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationSecuring Data in the Cloud: Point of View
Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationSymantec & Blue Coat Technical Update Webinar 29. Juni 2017
Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication
More informationEmbracing a Secure Cloud. Cloud & Network Virtualisation India 2017
Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationDynamic Datacenter Security Solidex, November 2009
Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic
More informationTotal Threat Protection. Whitepaper
Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in
More informationEMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security
EMERGING THREATS & STRATEGIES FOR DEFENSE Paul Fletcher Cyber Security Evangelist @_PaulFletcher Threats by Customer Environment Cloud Environment On Premise Environment 1.96% 0.13% 0.02% application-attack
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationDeveloping, Deploying and Managing Applications on the Cloud
Developing, Deploying and Managing Applications on the Cloud Jayabalan S CTO & Co-Founder September 10, 2011 Agenda 1 2 3 4 5 6 7 8 9 10 Introduction Computing Evolution IT Challenges and Importance of
More informationADC im Cloud - Zeitalter
ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s
More informationCloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com
Cloud Computing Faculty of Information Systems Duc.NHM nhmduc.wordpress.com Evaluating Cloud Security: An Information Security Framework Chapter 6 Cloud Computing Duc.NHM 2 1 Evaluating Cloud Security
More informationProtecting Your Cloud
WHITE PAPER Protecting Your Cloud Maximize security in cloud-based solutions EXECUTIVE SUMMARY With new cloud technologies introduced daily, security remains a key focus. Hackers and phishers capable of
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationMake Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)
Make Cloud the Most Secure Environment for Business Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks) Enterprise cloud apps Consumer cloud apps The average organization now uses
More informationMcAfee Network Security Platform 9.1
Revision A McAfee Network Security Platform 9.1 (9.1.7.73-9.1.3.11 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation
More informationThe Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy
The Next Generation Security Platform Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Enterprise Security Platform Core Value Proposition An Enterprise Security
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationManaging your Cloud with Confidence
Mobility Cloud and Security Managing your Cloud with Confidence Stephen Miles VP Service Assurance - APJ Agenda The Digital Revolution and the changing IT Landscape Management challenges in the new world
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More informationSecuring the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA
Securing the cloud ISACA Korea Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA What is cloud computing? Source: Wikipedia 2 What is cloud computing A model for enabling:- convenient on-demand network
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationJavier Villegas. Azure SQL Server Managed Instance
Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server
More informationKASPERSKY ENDPOINT SECURITY FOR BUSINESS
KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 WHAT WE SEE TODAY 325,000 New Endpoint Threats per day Targeted attacks and malware campaigns Threat reports Continued Exploitation of Vulnerabilities in 3rd
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More information85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges
Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats
More informationExam C Foundations of IBM Cloud Reference Architecture V5
Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationIntroduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview
IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationCYBER SECURITY WHITEPAPER
CYBER SECURITY WHITEPAPER ABOUT GRIDSMART TECHNOLOGIES, INC. GRIDSMART Technologies, Inc. provides Simple, Flexible, and Transparent solutions for the traffic industry that collect and use data to make
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationMicrosoft Azure for AWS Experts
Microsoft Azure for AWS Experts OD40390B; On-Demand, Video-based Course Description This course provides an in-depth discussion and practical hands-on training of Microsoft Azure Infrastructure Services
More informationThe Business of Security in the Cloud
The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing
More informationIntroduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike
Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationVendor: HP. Exam Code: HP0-D31. Exam Name: Designing HP Data Center and Cloud Solutions. Version: Demo
Vendor: HP Exam Code: HP0-D31 Exam Name: Designing HP Data Center and Cloud Solutions Version: Demo QUESTION 1 Which tool uses what-if scenarios and price-to-performance tradeoffs to provide valid, supported
More informationThe Eight Components of a Strong Cyber Security Defense System
The Eight Components of a Strong Cyber Security Defense System SEG Secure Email Gateway An appliance that provides anti-spam and anti-malware protection. It is installed on top of a corporation s Email
More informationSymantec Hosted Services. Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1
Symantec Hosted Services Eugenio Correnti / Senior Pre-Sales Consultant EMEA 1 Agenda What is SaaS The SaaS Shift SaaS Key Objections Symantec Hosted Services Portfolio SaaS as an SLA Insurance service
More informationSoftware-as-a-Service. with Genero Cloud Q&A. Walter Koenigseder Regional Director. Software-as-a-Service. With Genero Cloud Page 1
Q&A with Genero Cloud Walter Koenigseder Regional Director www.4js.com With Genero Cloud Page 1 Why Cloud? Cloud offers better ROI, shifts CAPEX to OPEX On-Premises Cloud Computing Software Licenses Subscription
More informationDelivering Complex Enterprise Applications via Hybrid Clouds
Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationHybride Cloud Szenarien HHochverfügbar mit KEMP Loadbalancern. Köln am 10.Oktober 2017
Hybride Cloud Szenarien HHochverfügbar mit KEMP Loadbalancern Köln am 10.Oktober 2017 Manfred Pfeifer PreSales Consultant DACH & EE @ KEMP Technologies Email: mpfeifer@kemptechnologies.com Office: +49
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationA Single Cloud for Business Applications
A Single Cloud for Business Applications Treb Ryan, Chief Strategy Officer 18 December 2013 Cloud Business Unit, Dimension Data Dimension Data today 2012 global revenues of US$5.8 billion Client-centric,
More informationKaspersky Managed Service Providers Program
Kaspersky for Business MOBILE CONTROLS CLOUD ENDPOINT NETWORK SECURITY REPORTING VIRTUALIZATION SIEM SUPPORT SERVERS SERVICES CLOUD APPS Kaspersky Managed Service Providers Program Technical Reference
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationOverview. Application security - the never-ending story
RIVERBED STINGRAY APPLICATION FIREWALL Securing Cloud Applications with a Distributed Web Application Firewall Overview Responsibility over IT security is moving away from the network and IT infrastructure
More informationSecurity as a Service (Implementation Guides) Research Sponsorship
Security as a Service (Implementation Guides) Research Sponsorship Overview The purpose of the Security as a Service (SecaaS) Working Group will be to identify consensus definitions of what Security as
More informationSaaS. Public Cloud. Co-located SaaS Containers. Cloud
SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to
More informationUnderstanding Cloud Migration. Ruth Wilson, Data Center Services Executive
Understanding Cloud Migration Ruth Wilson, Data Center Services Executive rhwilson@us.ibm.com Migrating to a Cloud is similar to migrating data and applications between data centers with a few key differences
More informationCountering ransomware with HPE data protection solutions
Countering ransomware with HPE data protection solutions What is ransomware? Definition Malware that prevents or limits users from accessing their system by: Locking the system s screen Encrypting files
More informationSecurity for the Cloud Era
Security for the Cloud Era Make the Most Out of Your Cloud Journey Fadhly Hassim Sales Engineer South East Asia & Korea Barracuda Networks Current Weather Situation Customer Provisions & Manage On-Premises
More informationAngelo Gentili Head of Business Development, EMEA Region, PartnerNET
Angelo Gentili Head of Business Development, EMEA Region, PartnerNET The Innovation Solution in the Business Security Field. PartnerNet introduces Seqrite Welcome To Dynamic. Scalable. Future-Ready. Why
More informationInfrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT
Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...
More information12,000+ Associates. Worldwide. Worldwide. 36 Countries. Customer Base 230+ Infra Supported Data Centers. 300,000+ End Users.
Tech Mahindra IT Infrastructure Management Services (IMS) offers a suite of reliable, responsive, flexible and proven Infrastructure services and solutions that deliver differentiated value to our customers
More informationSecuring the Cloud Today: How do we get there?
Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young
ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture
More informationLaunching a Highly-regulated Startup in the Cloud
Launching a Highly-regulated Startup in the Cloud Poornaprajna Udupi (@poornaudupi) 1 Starting in the 86%by 2020 Cloud Cisco Global Cloud Index: Forecast and Methodology, 2015 2020 2 Building blocks, Cost,
More informationQualys Cloud Platform
18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform
More informationIntegrated Security Management Framework
Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016 Internet Of Things The Vision 2 Instrumented
More informationExtend your datacenter with the power of Citrix Open Cloud
Extend your datacenter with the power of Citrix Open Cloud Peter Leimgruber Sr. SE Datacenter & Networking, CE Mikael Lindholm Sr. SE XenServer & Cloud, EMEA Sales Dev Agenda Cloud Expectations and reality
More informationOracle IaaS, a modern felhő infrastruktúra
Sárecz Lajos Cloud Platform Sales Consultant Oracle IaaS, a modern felhő infrastruktúra Copyright 2017, Oracle and/or its affiliates. All rights reserved. Azure Window collapsed Oracle Infrastructure as
More informationA MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE
SESSION ID: SPO2-W12 A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE Frank Bunton VP, CISO MedImpact Healthcare Systems, Security @frankbunton Larry Biggs Security Engineer III - Threat
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationT22 - Industrial Control System Security
T22 - Industrial Control System Security PUBLIC Copyright 2017 Rockwell Automation, Inc. All Rights Reserved. 1 Holistic Approach A secure application depends on multiple layers of protection and industrial
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationLook Who s Hiring! AWS Solution Architect AWS Cloud TAM
Look Who s Hiring! AWS Solution Architect https://www.amazon.jobs/en/jobs/362237 AWS Cloud TAM https://www.amazon.jobs/en/jobs/347275 AWS Principal Cloud Architect (Professional Services) http://www.reqcloud.com/jobs/701617/?k=wxb6e7km32j+es2yp0jy3ikrsexr
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationThe Challenge of Cloud Security
The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you
More informationSimple and Powerful Security for PCI DSS
Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them
More informationAuthor: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0
Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the
More informationORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017
ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS December 1, 2017 Table of Contents Oracle Managed Security Database Encryption Service for Oracle IaaS... 3 Oracle Managed Security Database
More informationProtecting organisations from the ever evolving Cyber Threat
Protecting organisations from the ever evolving Cyber Threat Who we are .At a glance 16+ Up to 190B 2B+ Dell SecureWorks is one of the most promising MSSPs in the GCC region MSS Market Report on GCC, Frost
More information