Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc."

Transcription

1 Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

2 Why Are We Here? Expanded Enterprise Data access anywhere, anytime Traditional IT perimeters have disappeared New technologies = New complexities = New opportunities Cloud Computing A new frontier New insecurities Stringent regulatory compliance 8-Step Journey to a Secure and Compliant Cloud Determine technology requirements Determine security requirements Determine policy requirements 3

3 Cloud Insecurity Uptime Seamlessly scalable Shared resources Logical separation Location agnostic Co-located rivals 4 The cloud is a magnet for hackers!

4 The Cloud Paradigm You see: Hosted applications You don t see: Virtualization Elastic workload Chargeback / billing Audit and log monitoring Continuous compliance Data(base) tenancy High availability 5

5 Security Tops Cloud Concerns Q: Rate the challenges/issues of the cloud /on-demand model (Scale: 1 = Not at all concerned; 5 = Very concerned) Security Availability Performance On-demand payment model may cost more Lack of interoperability standards Bringing back in-house may be difficult Hard to integrate with in-house IT 87.5% 83.3% 82.9% 81.0% 80.2% 79.8% 76.8% Not enough ability to customize 76.0% (% responding 3, 4, or 5) Source: IDC exchange, New IDC IT Cloud Services Survey: Top Benefits and Challenges, (http://blogs.idc.com/ie/?p=730) December

6 What is the Biggest Barrier to Adoption of Cloud Services? 497 responses 7 Source: Tech Target: Cloud Computing Readership Survey, 2009

7 Cloud Architectures and Models ESSENTIAL CHARACTERISTICS Broad Network Access Rapid Elasticity Measured Service On-Demand Self-Service Resource Pooling ARCHITECTURES Softwareas-a-Service (SaaS) Platformas-a-Service (PaaS) Infrastructureas-a-Service (IaaS) DEPLOYMENT MODELS Public Private Hybrid Community 8

8 Bridging Security Requirements to the Cloud Traditional IT Dedicated compute, storage and network infrastructure Defined locations for data storage and backup Proprietary security controls and policies Compliance standards designed for traditional IT Cloud Computing Complex, shared deployment models Varying data location Security controls and policies defined by service provider Interpretation of compliance standards 9

9 An Eight-Step Journey to a Secure Cloud 1 Determine your application s suitability for the cloud Payment Processing Corporate Systems ERP CRM Company Web Site Test and Development e-commerce 10

10 An Eight-Step Journey to a Secure Cloud 2 Classify your data Financial Newsfeeds/Blogs Marketing Customer Records Government Healthcare/PHI EU Citizens 11

11 An Eight-Step Journey to a Secure Cloud 3 Classify your cloud type (Think about applications) Software-as-a-Service (SaaS) Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) 12

12 An Eight-Step Journey to a Secure Cloud 4 Select a delivery model (Think about data classification) Private: Public: Hybrid: Self-managed Outsourced Commodity Enterprise Private + Public Private + Exchange Private + Customer Cloud bursting Public Hybrid Private 13

13 Security An Eight-Step Journey to a Secure Cloud 5 Specify platform architecture Compute Storage and backup Network and routing System Device Drivers API/ System Call Cloud Automation Application Customer Application VPDC Cloud OS (ex. IaaS) Customer Application VPDC Virtualization vs. dedicated Compute Network Storage Data Center Ethernet Fabric 14

14 Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Security at the Different Layers Applications Layer Presentation Modality Presentation Platform End Users APIs Applications Management Layer Business Owners Data Metadata Content Integration and Middleware APIs Infrastructure Layer Core Connectivity and Delivery Abstraction IT Administrators Hardware Facilities 15 Source: Cloud Security Alliance specification, 2009

15 An Eight-Step Journey to a Secure Cloud 6 Specify security controls Firewall Intrusion detection/prevention Log management Application protection Database protection Identity and access management Vulnerability scanning 16

16 An Eight-Step Journey to a Secure Cloud 7 Determine policy requirements Policy Creation and Enforcement What are my service provider s policies? Can I specify my own? How do they handle critical events? Policy Bursting If I choose a cloud-bursting model, will my policies burst along with my VMs? Policy Migration If I contract for cloud-based DR, will my polices migrate with my VMs? 17

17 Compliance is a Journey It s Reporting, But It s Also About Managing Risk Drive to Compliance Assurance Manual Processes Spreadsheet driven compliance Manually collected audit logs Achieve Continuous Compliance Compliance Assurance Robust methods for compliance reporting Automated certification and log collection Continuous Compliance Full visibility to IT risks No infrastructure holes or silos Identity and security integration Compatibility with IT GRC management for big picture view 18

18 An Eight-Step Journey to a Secure Cloud 8 Determine service provider requirements Delivery-model integration Automation Scalability Monitoring SLAs Services Security controls Stability Terms Compliance 19

19 Journey to The Cloud Key Considerations Determine service provider requirements Determine policy requirements Specify security controls Specify platform architecture Select delivery model Determine type of cloud Classify data Understand your application s applicability to the cloud 20

20 Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Mapping the Model to the Metal Cloud Model Presentation Modality APIs Presentation Platform Security Control Model Applications Data Metadata Content Application Information Compliance Model Integration and Middleware Management PCI APIs SOX Core Connectivity and Delivery Network GLBA Abstraction Trust HIPPA Hardware Storage Facilities Physical 21 Source: Cloud Security Alliance specification, 2009

21

22 Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners Savvis, Inc. All rights reserved. Savvis is the registered trademark of Savvis Communications Corporation.

Docker Networking In OpenStack What you need to know now. Fawad Khaliq

Docker Networking In OpenStack What you need to know now. Fawad Khaliq Docker Networking In OpenStack What you need to know now Fawad Khaliq About Me OpenStack Community Member Developer in Neutron Maintainer of PLUMgrid Neutron Plugin (networking-plumgrid) How to contact

More information

Managing Linux Servers Comparing SUSE Manager and ZENworks Configuration Management

Managing Linux Servers Comparing SUSE Manager and ZENworks Configuration Management Managing Linux Servers Comparing SUSE Manager and ZENworks Configuration Management Product Support As of September 30,2012, Novell no longer offers general support and will only provide limited updates

More information

How To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger

How To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger How To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger SUSE Sales Engineer mikef@suse.com Agenda Clarify the term "Availability" What is High Availability Minimize a Database

More information

Using Crowbar to Deploy Your OpenStack Cloud. Adam Spiers Vincent Untz John H Terpstra

Using Crowbar to Deploy Your OpenStack Cloud. Adam Spiers Vincent Untz John H Terpstra Using Crowbar to Deploy Your OpenStack Cloud Adam Spiers Vincent Untz John H Terpstra Clouds don t come with an auto-pilot 2 IT Problem: Scale Explosion Mainframe 1980 3 Client / Server 1990 Datacenter

More information

Using Linux Containers as a Virtualization Option

Using Linux Containers as a Virtualization Option Using Linux Containers as a Virtualization Option Michal Svec Product Manager msvec@suse.com Mike Friesenegger Sales Engineer mfriesenegger@suse.com 2 Containers Linux Containers Virtualization OS Level

More information

SUSE Linux Enterprise Kernel Back to the Future

SUSE Linux Enterprise Kernel Back to the Future SUSE Enterprise Kernel Back to the Future Olaf Kirch Director Server Engineering okir@suse.com Agenda SUSE Enterprise Service Packs What makes a SUSE Enterprise kernel an enterprise kernel? Bringing you

More information

Best practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich

Best practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich Best practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich Project Manager for Linux on System z Ihno@SUSE.de SHARE Atlanta 2012 Session 10728 Reasoning Requirements

More information

Expert Days SUSE Enterprise Storage

Expert Days SUSE Enterprise Storage Expert Days 2018 SUSE Enterprise Storage SUSE Enterprise Storage An intelligent software-defined storage solution, powered by Ceph technology, that enables IT to transform their enterprise storage infrastructure

More information

Linux and z Systems in the Datacenter Berthold Gunreben

Linux and z Systems in the Datacenter Berthold Gunreben Linux and z Systems in the Datacenter Berthold Gunreben Build Service Engineer SUSE Linux Available Architectures for SUSE Linux Enterprise Server X86, z Systems, Power Common Source Code for all architectures

More information

Welcome to SUSE Expert Days 2017 Service Delivery with DevOps

Welcome to SUSE Expert Days 2017 Service Delivery with DevOps Welcome to SUSE Expert Days 2017 Service Delivery with DevOps Changing Application Service Delivery with DevOps 2 Key Components for DevOps Success Good habits and people Development done now Automate

More information

Novell SLES 10/Xen. Roadmap Presentation. Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com.

Novell SLES 10/Xen. Roadmap Presentation. Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com. Novell SLES 10/Xen Roadmap Presentation Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com September 8, 2006 SUSE Linux Enterprise Server 10 SLES 10 w/xen 3.0.2 is now available

More information

Essentials. Johannes Meixner. about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR)

Essentials. Johannes Meixner. about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR) Essentials about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR) Johannes Meixner Why DR with ReaR matters Relax-and-Recover is currently used in particular

More information

SUSE Manager and Salt

SUSE Manager and Salt SUSE Manager and Salt The Three Cs of the IT Transformation Challenge Transform your approach to infrastructure to enable the business to capitalize on new innovations of data Cost Complexity Compliance

More information

SUSE Linux Enterprise High Availability Extension

SUSE Linux Enterprise High Availability Extension A Xen Cluster Success Story Using the SUSE Linux Enterprise High Availability Extension Mark Robinson Director, MrLinux mark@mrlinux.co.uk Case Study: R M Donaldson APC High Power Partner My first commercial

More information

Linux High Availability on IBM z Systems

Linux High Availability on IBM z Systems Linux High Availability on IBM z Systems An Overview Kristoffer Gronlund Berthold Gunreben High Availability Engineer SUSE Build Service Engineer SUSE Outline 2 Highly Available Hardware Introduction to

More information

Open Enterprise & Open Community

Open Enterprise & Open Community Open Enterprise & Open Community Working Together Richard Brown opensuse Chairman SUSE Linux GmbH Andrew Wafaa Principal Engineer, Open Source ARM Ltd Stephan Kulow opensuse Release Manager SUSE Linux

More information

Build with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study

Build with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study Build with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study Vladimir Botka Joachim Plack Anthony Tortola Product Manager vbotka@suse.com Senior Project

More information

Novell Infiniband and XEN

Novell Infiniband and XEN Novell Infiniband and XEN XEN-IB project status Patrick Mullaney November 22, 2006 Infiniband and XEN Background Client requirements: > Guest OS access to Infiniband fabric > Initial approach:» L3 based

More information

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Concepts, Models, and Terminology Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and

More information

Too Many Metas A high level look at building a metadata desktop. Joe Shaw

Too Many Metas A high level look at building a metadata desktop. Joe Shaw Too Many Metas A high level look at building a metadata desktop Joe Shaw joe@ximian.com Overview About me Dashboard Beagle desktop search Metadata solution -- what's the problem? A few statements (facts?)

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt

Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Instructor, Consultant and Author Sandervanvugt.nl About Sander van Vugt Trainer, consultant and author Doing much

More information

Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009

Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009 Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009 Dale Olds Novell Distinguished Engineer dolds@novell.com Overview 2 Problems with identity management today It's

More information

SDS Heterogeneous OS Access. Technical Strategist

SDS Heterogeneous OS Access. Technical Strategist SDS Heterogeneous OS Access Alejandro Bonilla Technical Strategist abonilla@suse.com Agenda Introduction to Ceph Architecture RADOS Block Device (RBD) iscsi overview Exposing Ceph RBDs via iscsi 2 LIO

More information

Cloud Computing Private Cloud

Cloud Computing Private Cloud Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus

More information

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Copyright 2011, Oracle and/or its affiliates. All rights reserved. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Exploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare Jo De Baer Technology Specialist Novell -

Exploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare Jo De Baer Technology Specialist Novell - Exploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare 2007 Jo De Baer Technology Specialist Novell - jdebaer@novell.com Agenda The High Availability Storage Infrastructure very

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

CLOUD SECURITY CRASH COURSE

CLOUD SECURITY CRASH COURSE CLOUD SECURITY CRASH COURSE ADDRESSING REAL WORLD CONCERNS Joel Friedman, CTSO ABOUT ME Name: Joel Friedman Title: Chief Technology & Security Officer of Datapipe Certifications: CISSP, CISA, CISM, CRISC,

More information

SUSE An introduction...

SUSE An introduction... Virtualization @ SUSE An introduction... Mike Latimer Sr. Engineering Manager SUSE mlatimer@suse.com Agenda Who is SUSE? Introduction to Virtualization Types of Hypervisors Xen KVM libvirt Virtualization

More information

Exploring History with Hawk

Exploring History with Hawk Exploring History with Hawk An Introduction to Cluster Forensics Kristoffer Grönlund High Availability Software Developer kgronlund@suse.com This tutorial High Availability in 5 minutes Introduction to

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Journey to the Cloud. Jeff Hoehing, Principal Consultant

Journey to the Cloud. Jeff Hoehing, Principal Consultant Journey to the Cloud Jeff Hoehing, Principal Consultant Agenda! Industry/Business Trends! Cloud and DR in the Cloud! Verizon Terremark Overview! Q&A The World in which we Operate has Changed Consumerization

More information

With K5 you can. Do incredible things with Fujitsu Cloud Service K5

With K5 you can. Do incredible things with Fujitsu Cloud Service K5 With K5 you can Do incredible things with Fujitsu Cloud Service K5 Making incredible possible Digital is changing everything. According to a Fujitsu survey, customers and employees think it s vital for

More information

CLOUD COMPUTING READINESS CHECKLIST

CLOUD COMPUTING READINESS CHECKLIST CLOUD COMPUTING READINESS DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO 1 CONTENTS INTRODUCTION

More information

SICOOB. The Second Largest Linux on IBM System z Implementation in the World. Thiago Sobral. Claudio Kitayama

SICOOB. The Second Largest Linux on IBM System z Implementation in the World. Thiago Sobral. Claudio Kitayama SICOOB The Second Largest Linux on IBM System z Implementation in the World Claudio Kitayama Thiago Sobral IT Infrastructure Analyst Sicoob claudio.kitayama@sicoob.com.br Sales Engineer tsobral@suse.com

More information

CLOUD COMPUTING ABSTRACT

CLOUD COMPUTING ABSTRACT Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,

More information

Secure Authentication

Secure Authentication Secure Authentication Two Factor Authentication LDAP Based SSH Keys Mark Gardner UMB Financial Corporation Noor Kreadly Federal Reserve Bank of Kansas City Prerequisites 2 Software Used edirectory 9.0

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Copyright 2011 EMC Corporation. All rights reserved.

Copyright 2011 EMC Corporation. All rights reserved. 1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145

More information

Cisco Unified Data Center Strategy

Cisco Unified Data Center Strategy Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies

More information

Copyright 2017 Oracle and/or its affiliates. All rights reserved.

Copyright 2017 Oracle and/or its affiliates. All rights reserved. Copyright 2017 Oracle and/or its affiliates. All rights reserved. On Cloud 9 with Speed and Stability A Journey to Cloud Transformation Ken E. Molter, Director IT, Ryder Bill Wimsatt, Sr. Manager, Enterprise

More information

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

Saving Real Storage with xip2fs and DCSS. Ihno Krumreich Project Manager for SLES on System z

Saving Real Storage with xip2fs and DCSS. Ihno Krumreich Project Manager for SLES on System z Saving Real Storage with xip2fs and DCSS Ihno Krumreich Project Manager for SLES on System z ihno@suse.de Agenda Overview DCSS What is DCSS? xip2fs What is xip2fs? DCSS How to create? Maintenance Problems

More information

A Carrier-Grade Cloud Phone System

A Carrier-Grade Cloud Phone System A Carrier-Grade Cloud Phone System Based on SUSE Linux Enterprise Server & High Availability Extension Brett Buckingham Managing Director, silhouette R&D Broadview Networks bbuckingham@broadviewnet.com

More information

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

IT Attestation in the Cloud Era

IT Attestation in the Cloud Era IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Oracle Exadata Statement of Direction NOVEMBER 2017

Oracle Exadata Statement of Direction NOVEMBER 2017 Oracle Exadata Statement of Direction NOVEMBER 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Vblock Architecture Accelerating Deployment of the Private Cloud

Vblock Architecture Accelerating Deployment of the Private Cloud Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

The intelligence of hyper-converged infrastructure. Your Right Mix Solution

The intelligence of hyper-converged infrastructure. Your Right Mix Solution The intelligence of hyper-converged infrastructure Your Right Mix Solution Applications fuel the idea economy SLA s, SLA s, SLA s Regulations Latency Performance Integration Disaster tolerance Reliability

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Samba HA Cluster on SLES 9

Samba HA Cluster on SLES 9 Samba HA Cluster on SLES 9 High Availability with Samba 3 on Linux Rolf Schmidt Support Engineer Novell, Inc. Rolf.Schmidt@novell.com May 29, 2006 Agenda Introduction Samba Setup Definitions High Availability

More information

Gladiator Hosted Network Solutions Raising the Bar on Risk and Compliance: Hosted Network Services and your Cloud Service Provider.

Gladiator Hosted Network Solutions Raising the Bar on Risk and Compliance: Hosted Network Services and your Cloud Service Provider. Gladiator Hosted Network Solutions Raising the Bar on Risk and Compliance: Hosted Network Services and your Cloud Service Provider. Presenter(s): Ray Kline - Gladiator Sales Engineering Jenny Roland-Vlach

More information

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

Security Policies and Procedures Principles and Practices

Security Policies and Procedures Principles and Practices Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! Compliance, standards, and best practices! Encryption and

More information

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations

Presentation Outline. Introduction Information Gathering Sample of Results Requirements Case Study Challenges Recommendations Sixth SG13 Regional Workshop for Africa on Standardization of future networks: What opportunities for Africa? (Abidjan, Côte d Ivoire, 26-27 March 2018) Supplement No. 146 to Y Series of Recommendations

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Cloud Migration Strategies

Cloud Migration Strategies Enterprise Strategy Group Getting to the bigger truth. Research Insights Paper Cloud Migration Strategies Mapping the Journey to Successful Cloud Adoption By Dan Conde, ESG Analyst; and Leah Matuson, Research

More information

VMware vcloud Service Definition for a Public Cloud. Version 1.6

VMware vcloud Service Definition for a Public Cloud. Version 1.6 Service Definition for a Public Cloud Version 1.6 Technical WHITE PAPER 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.

More information

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government

Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Metro Ethernet for Government Enhanced Connectivity Drives the Business Transformation of Government Why You Should Choose Cox Metro Ethernet To meet the critical demands of better supporting local emergency

More information

Government Data Center Modernization

Government Data Center Modernization Government Data Center Modernization Service Standards Focus Group Discussion 13 March 2017 Table of Contents Welcome and Introduction What are standards and their need Key challenges Standard functional

More information

Dell EMC Hyper-Converged Infrastructure

Dell EMC Hyper-Converged Infrastructure Dell EMC Hyper-Converged Infrastructure New normal for the modern data center GLOBAL SPONSORS Traditional infrastructure and processes are unsustainable Expensive tech refreshes, risky data migrations

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services 9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s

More information

Topics of Discussion

Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture on NIST Cloud Computing Definition, Standards & Roadmap, Security & Privacy Guidelines Spring 2013 A Specialty Course for Purdue

More information

Cloud Computing. Theory and Practice. 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley

Cloud Computing. Theory and Practice. 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley Cloud Computing Theory and Practice 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley Cloud Computing NIST Definition 22 March 2012 Phil Mustaphi NIST Cloud Computing Definition NIST Special

More information

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility

More information

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC

Atos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Atos Canopy Orchestrated Hybrid Cloud Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Cloud Animation Video 02-03-2017 Addressing Customer Challenges in all verticals With

More information

Delivering Complex Enterprise Applications via Hybrid Clouds

Delivering Complex Enterprise Applications via Hybrid Clouds Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

Migration to Cloud Computing: Roadmap for Success

Migration to Cloud Computing: Roadmap for Success Migration to Cloud Computing: Roadmap for Success Mohammed Elazab, Professor Emeritus Higher Technological Institute, Tenth of Ramadan, Egypt President, Human and Technology Development Foundation Chairman,

More information

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS

CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS CASE STUDY: USING THE HYBRID CLOUD TO INCREASE CORPORATE VALUE AND ADAPT TO COMPETITIVE WORLD TRENDS Geoff Duncan, Senior Solutions Architect, Digital Fortress Brandon Tanner, Senior Manager, Rentsys Recovery

More information

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo. CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational

More information

The Value of Force.com as a GRC Platform

The Value of Force.com as a GRC Platform The Value of Force.com as a GRC Platform Andy Evans - Xactium Limited March 2009 Executive Summary The importance of governance, risk and compliance (GRC) activities to organizations has become increasingly

More information

PLATFORM AS A SERVICE (PAAS):

PLATFORM AS A SERVICE (PAAS): THEBUNKER.NET FACTSHEET PLATFORM AS A SERVICE (PAAS): Develop, run and manage applications without the associated cost and complexity of maintaining the underlying infrastructure SUMMARY Platform as a

More information

Your Trusted Partner in Europe European Business Reliance Centre

Your Trusted Partner in Europe European Business Reliance Centre Your Trusted Partner in Europe European Business Reliance Centre Fit4Exchange 23 Septembre 2015 ebrc.com 24/09/2015 Public 1 EBRC -European Business Reliance Centre Our vision: To be the Centre of Excellence

More information

Overview of TIBCO Cloud Integration

Overview of TIBCO Cloud Integration Overview of TIBCO Cloud Integration Leon Stigter, Senior Product Manager & Developer Advocate DISCLAIMER During the course of this presentation, TIBCO or its representatives may make forward-looking statements

More information

Cloud computing the use of contracts as a means of governing networked computer services.

Cloud computing the use of contracts as a means of governing networked computer services. Cloud computing the use of contracts as a means of governing networked computer services. Kevin McGillivray PhD Research Fellow, UiO kevin.mcgillivray@jus.uio.no Agenda Introduction to cloud computing

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

Benefits of Extending your Datacenters with Amazon Web Services

Benefits of Extending your Datacenters with Amazon Web Services Benefits of Extending your Datacenters with Amazon Web Services Xavier Prélat Business Development Manager @aws_actus How did Amazon.. get into cloud computing? What is AWS? Amazon Web Services offers

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0

SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0 SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0 TABLE OF CONTENTS 1 INTRODUCTION...3 2 BENEFITS...4 3 FUNCTIONAL DESCRIPTION...5 4 MESSAGE CLASSIFICATION...6 5 ARCHITECTURE...7

More information

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson Migrating Enterprise Applications to the Cloud Session 672 Leighton L. Nelson Leighton L. Nelson Instructional Technology Principal Oracle ACE & Oracle Certified Expert Oracle Database Administrator Author/blogger

More information