Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2
|
|
- Damian Norman
- 6 years ago
- Views:
Transcription
1 GRC3386BUS GDPR Readiness with IBM Cloud Secure Virtualization Raghu Yeluri, Intel Corporation Shantu Roy, IBM Bill Hackenberger, Hytrust #VMworld #GRC3386BUS
2 Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2
3 Security Continues to be #1 Barrier for Cloud Adoption #1 General security risks #2 Lack of staff resources or expertise 33% 28% Data Loss/Leakage 57% Data Privacy 49% CLOUD ADOPTION BARRIERS #3 Integration with existing IT environments 27% MAIN CONCERNS Confidentiality 47% #4 Data loss & leakage risks 26% Regulatory compliance 36% #5 Legal & regulatory compliance 24% Data from Cloud Research Partners Data Sovereignty/Control 30% 3
4 General Data Protection Regulation (GDPR) Overview
5 Is GDPR the next Y2K for data privacy and data protection?
6 Replaces the Data Protection legislation of the 90 s One single set of data protection rules across EU Will come into force throughout the EU on May 25, 2018 VMworld 2017 Gives individuals much more control over their personal data Content: Not for publication
7 One Law Top 10 GDPR Provisions Territorial Scope Increased Fines Breach Notification Opt-in Consent Joint Liability Right to Removal (RTBF) Data Transfer Common Enforcement Collective Redress
8 Key GDPR Definitions Data Controller The organization that defines the reason for the data collection, decides how the data is collected and processed and is ultimately responsible for its safekeeping Data Processor A person or body acting on behalf of the data controller to store or process the data Supervisory Authorities Public bodies set up by the governments of the EU countries to help advise data controllers and data subjects on the law and enforce the regulation Data Subject The individual whose data is being collected and can be identified from that data Personal Data (PII) Any information relating to an identified or identifiable natural person (data subject)
9 Types of Personal Information VMworld 2017 Name Address Date of Birth Online Identifier Personal Address Business Address Content: Not for publication Phone Number Ethnic Origin Health Religious Beliefs Sensitive Personal Data
10 No matter where you are in the world, if you do business within the EU, you need to comply with GDPR!
11 Substantial increase in fines for organizations that do not comply with GDPR Two-tier fine structure for different violations can vary from 2% to 4% of global revenue or 10M euro to 20M euro which ever is greater
12 The local supervisory authority must be informed within 72 hours of any data loss and users informed as soon as possible unless
13 data was encrypted or a form of pseudonymization was used, the data is automatically deemed secure and the organization is not required to notify the data subject or supervisory authority of the breach or distribution
14 Data belongs to the data subject NOT the data controller
15 The Right to be Forgotten
16 Organizations will be required to implement appropriate technical and organizational measures in relation to the nature, scope, context and purposes of their handling and processing of personal data GDPR = 11 Chapters, 81 Pages, 99 Articles, 100+ Recitals VMworld 2017 ~ 12 articles address technical measures Content: Not for publication
17 GDPR Articles - some specifics Article 5 Article 24 Article 24 Article 28 Article 32 Article 6 Article 17 Article 34 Article 44 Principles relating to personal data processing Responsibility of the controller Data protection by design and by default Processor Security of processing Lawfulness of processing The Right to Erasure (aka The Right to Be Forgotten ) Communication of a personal data breach to the data subject General Principle for Transfers Core Requirements* Encryption Audit and Compliance Data Sovereignty Records of processing activities Notification of a personal data breach to the supervisory authority General Principle for Transfers Article 30 Article 33 Article 44 17
18 Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 18
19 IBM Cloud Secure Virtualization (ICSV) A VMware Portfolio Solution Customer Demographics Point of Sale Transactions App OS CloudControl App OS App OS VMware Cloud Foundation DataControl Customer Credentials Intellectual Property App OS IBM Cloud is first to market with a solution that captures the benefits of both HyTrust software and Intel Trusted Execution Technology to protect virtualized workloads down to the microchip level. Includes VMware Cloud Foundation licenses and infrastructure (NSX, VSAN, Vcenter, Vsphere). Intel Xeon Processor Bare Metal Servers + Intel TXT Enabled 19
20 ICSV Solution Benefits A Combined Security Offering from IBM, HyTrust and Intel A powerful solution together HyTrust Software Provides Policy and access controls for cloud security, reporting, and encryption software Policy-enforced controls and access management Confidence that workloads always run IBM Cloud on known Provides trusted hardware and Automated software VMware stacks solutions on trusted Bluemix bare metal infrastructure Keys under Tenant-control, and, Data decryption only when access, location policies are met. Intel Trusted Execution Technology Streamlined Provides visibility and reporting for Hardware-based corporate (chipset) and regulatory compliance security technology to protect workloads CloudControl Virtualization Layer Physical Layer Storage Layer Virtualization Admin Virtual Machine Intel TXT Application Application User DataControl Encrypted VMs and Data 20
21 Benefits of IBM Cloud for VMware Solutions IBM Differentiation Compatibility Speed & Flexibility Cloud Economics Full Compatibility with vcenter on and off premises Workload portability puts you in charge Continue with existing staff, tools and infrastructure Deploy in hours in multiple configuration sizes Expand and contract capacity as your needs change Deploy single site or multi-site configurations globally Predictable & simplified budgeting No long term contract overhead Pay for what you use with cloud OpEx model 21
22 Translating to Requirements How does the Data Controller: Maintain environment control and visibility to manage, monitor, and govern data access? Provide Security policies and implement granular security controls? Protect the Personal Data related to data Subject? Audit/Verify Security Controls implemented by the Data Processor? VMworld 2017 How does the Data Processor: 1. Verify the provisioning of the Infrastructure of sub-processor? 2. Protect workloads (inc. data) from deploying on compromised or unsanctioned infrastructure 3. Control where workloads and Applications running? Content: Not for publication 4. Enable Right to be Forgotten? 5. Support Data Sovereignty Requirements of the Data Controller? 22
23 Intel BENEFITS TRUST RESILIENCE VISIBILITY/ CONTROL SECURE THE PLATFORM PROTECT THE DATA WITHOUT COMPROMISING PERFORMANCE AT-REST IN-FLIGHT IN-USE Effective security is built on a foundation of trust 23
24 Intel Trusted Execution Technology Hardware Root of Trust 1. System powers on and Intel TXT verifies system BIOS/Firmware 2. Hypervisor measure does not match 3. Policy action enforced, known untrusted POSSIBLE EXPLOIT! SERVER WITH TPM MATCH! 2. Hypervisor measure matches 3. OS and applications are launched, known trusted Ensure a measured environment baseline with Intel Trusted Execution Technology (Intel TXT) System boot stack gets crypto-hashed before execution Hash values get safely stored in Trusted Platform Module (TPM) Match to known-good values determines system trust status 24
25 Intel Cloud Integrity Technology Intel Provides a Protected Launch & Hardware-enforced Geo location Trusted Platform and Workloads Launch Verification of the integrity of the launch of the platform and workloads (VMs, containers ) to provide trust and assurance Trusted Compute Pools Attestation provides information to inform which systems are trustworthy for hosting workloads Compliance VMworld 2017 Attestation allows verification of platform and workload trust for comparison against policy and use in audit this includes Geo-boundaries Chain of trust Capability Workload integrity Location and boundary control Platform integrity Intel TXT + TPM Data center Firmware BIOS Hypervisor Intel TXT Data center Firmware Content: Not for publication BIOS Hypervisor Intel TXT Intel Cloud Integrity Technology leverages Intel TXT 25
26 HyTrust Benefits HyTrust CloudControl with Intel TXT Protect server virtualization Control of private cloud Secure single-tenancy Continuous compliance HyTrust Simplifies Security at Scale HyTrust DataControl Workload encryption Key management Public/hybrid cloud IaaS migration HyTrust BoundaryControl with Intel TXT Workload & data geo-fencing Tenant-defined boundaries Data sovereignty Contextual tagging 26
27 HyTrust BoundaryControl Define and create a logical boundary by geography, regulatory standard, department, etc. Assign tags to key assets Finance Finance PCI PCI PCI PCI PII* German Define policies and automate security control enforcement for your defined boundary Do not decrypt workload unless it is running on Host B PCI PCI PCI PCI PCI Automatically encrypt workloads within the boundary Automatically provision, configure, and enforce security controls for all things inside your defined logical boundaries Intel TXT provides Hardware Root-of-Trust Workload Host/Server Network Storage 27
28 IBM Benefits IBM Cloud Automates the Infrastructure VMware Cloud Foundation on IBM Cloud natively integrates vsphere, NSX and vsan full stack virtualization along with the lifecycle management of SDDC manager. This deployment is automated offering fast and repeatable installation. IBM Cloud offers the benefits of global scale with over 50 interconnected data centers worldwide. VMworld 2017 Management Apps Apps Apps Apps Apps Network Virtualization Content: Not for publication Compute Virtualization Storage Virtualization Physical Infrastructure 28
29 Solution Benefits Server Platform Integrity VM1 Only allow virtual workloads to run on untampered hardware and software VM1 Privileged User Controls Security and Compliance Automation Public Cloud Reduce admin risk with advanced role based access controls and secondary approval workflows VM1 VM1 VM1 Data Decryption by Location Only allow virtual server data to be decrypted in authorized locations Deployment Control by Location Ensure only certain virtual servers run on hardware in authorized locations Continuous monitoring and reporting of controls to support regulatory and industry compliance 29
30 Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 31
31 Take Action Identify Customers with intensive data security & compliance needs (GDPR, PCI, HIPAA) Schedule a discovery meeting to assess customers needs IBM Technical solutions team - Intel & HyTrust can assist Set up Technical Workshop to engage Security & Compliance Teams IBM Technical solutions team - Intel & HyTrust can assist pilot planning Execute a pilot or proof of concept for interested customers Process and promotion for POC is on the wiki Check out more information on the wiki 2017 HyTrust, Inc. 32
32 Ordering Codes Cloud BU L V - IBM Bluemix Secure Virtualization (Cloud BU) (for Cloud Foundation) L F IBM Bluemix Implementation Services (Cloud BU CPS) GTS BU L X - IBM Bluemix Secure Virtualization (GTS BU) (for Cloud Foundation) L A IBM Bluemix Implementation Services (GTS mirror code) *Latest ordering codes can be found on VMware wiki 2017 HyTrust, Inc. 33
33
34
The Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationDe kracht van IBM cloud: hoe je bestaande workloads verhuist naar de cloud
De kracht van IBM cloud: hoe je bestaande workloads verhuist naar de cloud Martin van der Meer Cloud Services Leader IBM Benelux 14 June 2017 Copyright 2017 IBM All rights reserved. 1 Cloud is maturing
More informationIncreasing Security and Compliance in the Cloud
Reference Architecture Data Center Cloud and Software-Defined Infrastructure Increasing Security and Compliance in the Cloud Utilizing solutions from HyTrust, VMware, and Intel to enable a trusted virtualized
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationDELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing
DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationIBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati
LHC2432BU IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud #VMworld IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR
More informationIBM Cloud for VMware Solutions
Introduction 2 IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager VMware on IBM Cloud Mehran Hadipour Director Business Development - Zerto Internal Use Only Do not distribute 3
More informationManaging Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow
Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant
More informationGetting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions
Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across
More informationIBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th
LHC3384BUS Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 Content: Not for publication #VMworld #LHC3384BUS IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017
More informationEnhanced Privacy ID (EPID), 156
Index A Accountability, 148 ActiveDirectory, 153 Amazon AWS EC2, 168 Anonymity, 148 Asset tagging, 96 Attestation definition, 65 dynamic remote attestation techniques, 66 IMA, 67 Intel Trust Attestation
More informationGeneral Data Protection Regulation (GDPR) The impact of doing business in Asia
SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationAccelerate GDPR compliance with the Microsoft Cloud
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationOur agenda. The basics
GDPR - AVG - RGPD. Our agenda The basics Key actions Responsibilities The basics Key actions Responsibilities Who cares? Why? From directive to regulation 24 Oct 1995: a Directive 95/46/EC is adopted partially
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC2673BU Clearing Cloud Confusion Nick King and Neal Elinski #VMworld #LHC2673BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationCONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS
SOLUTION OVERVIEW CONFIDENTLY INTEGRATE VMWARE WITH INTELLIGENT OPERATIONS VMware Cloud TM on AWS brings VMware s enterprise class Software-Defined Data Center (SDDC) software to the AWS Cloud, with optimized
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationSOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling
More informationCompliance of Panda Products with General Data Protection Regulation (GDPR) Panda Security
Panda Security Compliance of Panda Products with General Data Protection Regulation (GDPR) 1 Contents 1.1. SCOPE OF THIS DOCUMENT... 3 1.2. GENERAL DATA PROTECTION REGULATION: OBJECTIVES... 3 1.3. STORED
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationIT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE
TRANSFORM SECURITY DATA PROTECTION SOLUTION OVERVIEW IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE Introduction This Solution Overview is intended for IT personnel interested in the VMware perspective
More informationThe GDPR Are you ready?
The GDPR Are you ready? kpmg.ie The GDPR - Overview The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) will come into force from 25th May 2018, replacing the existing data protection
More informationCloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.
George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security
More informationThe Impact of Hyper- converged Infrastructure on the IT Landscape
The Impact of Hyperconverged Infrastructure on the IT Landscape Where else do you consume like this? 3 Focus on innovation, not IT integration BUILD Consumes valuables time and resources Go faster Invest
More informationDo you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?
European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability
More informationBUILDING A PRIVATE CLOUD. By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini
BUILDING A PRIVATE CLOUD By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini HOW PLATFORM COMPUTING'S PLATFORM ISF AND INTEL'S TRUSTED EXECUTION TECHNOLOGY CAN HELP 24 loud computing is a paradigm
More informationGeneral Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant
General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationBHBIA New Data Protection Rules. Pharma Company Perspective. Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD
BHBIA New Data Protection Rules Pharma Company Perspective Guy Murray Director, Market Research & Analytics, GC&BI MR Operations and Compliance, MSD Pharma Company Perspective Data Controllers Responsibilities
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationEU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS
EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS MEET THE EXPERTS DAVID O LEARY Director, Forsythe Security Solutions THOMAS ECK Director, Forsythe Security Solutions ALEX HANWAY Product
More informationData Protection Policy
Data Protection Policy Data Protection Policy Version 3.00 May 2018 For more information, please contact: Technical Team T: 01903 228100 / 01903 550242 E: info@24x.com Page 1 The Data Protection Law...
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationData Center and Cloud Automation
Data Center and Cloud Automation Tanja Hess Systems Engineer September, 2014 AGENDA Challenges and Opportunities Manual vs. Automated IT Operations What problem are we trying to solve and how do we solve
More informationG DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know
G DATA Whitepaper The new EU General Data Protection Regulation - What businesses need to know G DATA Software AG September 2017 Introduction Guaranteeing the privacy of personal data requires more than
More informationDATA PROCESSING TERMS
DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica
More informationEmergency Compliance DG Special Case DAMA INDIANA
1 Emergency Compliance DG Special Case DAMA INDIANA Agenda 2 Overview of full-blown data governance (DG) program Emergency compliance with a specific regulation We'll use GDPR as an example What is GDPR
More informationA Practitioner s Guide to Migrating Workloads to VMware Cloud on AWS
A Practitioner s Guide to Migrating Workloads to VMware Cloud on AWS Adam Osterholt, VMware, Inc. Paul Gifford, VMware, Inc. #vmworld HYP1496BU #HYP1496BU Disclaimer This presentation may contain product
More informationAdtech and GDPR What to consider when choosing your partner
Adtech and GDPR What to consider when choosing your partner 1 Agenda What to avoid and What to do Where is Adform on GDPR Posibilities for advertisers 2 This is about GDPR, not the unknown eprivacy update
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationVxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS
VxRail: Level Up with New Capabilities and Powers GLOBAL SPONSORS VMware customers trust their infrastructure to vsan #1 Leading SDS Vendor >10,000 >100 83% vsan Customers Countries Deployed Critical Apps
More informationMartijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain
Merritt Maxim Principal Analyst Forrester Martijn Loderus Director & Global Practice Partner for Advisory Consulting Janrain Merritt and Martijn will share insights on Digital Transformation & Drivers
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
PBO1221BE Beginners Guide to the Software-Defined Data Center Kyle Gleed, Group Manager, Technical Marketing Ben Sier, Staff Architect, Technical Marketing #VMworld #PBO1221BE Disclaimer This presentation
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationAWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services
AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More information2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE
Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its
More informationVMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018
VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation
More informationThe GDPR and NIS Directive: Risk-based security measures and incident notification requirements
The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant
More informationSingle-Tenant vs. Multi-Tenant Enterprise Software
Single-Tenant vs. Multi-Tenant Enterprise Software Choosing between single-tenancy and multi-tenancy comes down to an organization's business objectives and requirements. Which trade-offs are you willing
More informationGDPR COMPLIANCE REPORT
2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.
More informationNetApp Private Storage for Cloud: Solving the issues of cloud data privacy and data sovereignty
SOLVING BUSINESS ISSUES NetApp Private Storage for Cloud: Solving the issues of cloud data privacy and data sovereignty How the combination of NetApp and Equinix ensures your data remains safe, secure
More informationPROTECT WORKLOADS IN THE HYBRID CLOUD
PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across
More informationA Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud
A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More informationINTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE
INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing
More information2013 Cisco and/or its affiliates. All rights reserved. 1
2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System
More informationARE YOU READY FOR GDPR?
SQL Security Whitepaper ARE YOU READY FOR GDPR? BY BOB FULLAM AND STEPHEN STOUT Demonstrate Compliance with IDERA SQL Security Suite OVERVIEW The European Union s General Data Protection Regulation (GDPR)
More informationHow icims Supports. Your Readiness for the European Union General Data Protection Regulation
How icims Supports Your Readiness for the European Union General Data Protection Regulation The GDPR is the EU s next generation of data protection law. Aiming to strengthen the security and protection
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
SAI2803BU The Road to Micro- Segmentation with VMware NSX #VMworld #SAI2803BU Disclaimer This presentation may contain product features that are currently under development. This overview of new technology
More informationPrivate Cloud Public Cloud Edge. Consistent Infrastructure & Consistent Operations
Hybrid Cloud Native Public Cloud Private Cloud Public Cloud Edge Consistent Infrastructure & Consistent Operations VMs and Containers Management and Automation Cloud Ops DevOps Existing Apps Cost Management
More informationEU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?
EU GDPR and Email The EU General Data Protection Regulation (GDPR) is the new legal framework governing the use of the personal data of European Union (EU) citizens across all EU markets. It replaces existing
More informationMotorola Mobility Binding Corporate Rules (BCRs)
Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,
More informationHARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY
HARNESSING THE HYBRID CLOUD TO DRIVE GREATER BUSINESS AGILITY WHY DIGITAL TRANSFORMATION IS DRIVING ADOPTION OF MULTI-CLOUD STRATEGIES In the era of digital business, enterprises are increasingly using
More informationCisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th
Cisco Spark and GDPR Thomas Flambeaux Collaboration Consulting Solution Engineer, Security and Compliance Cisco Connect 2018 Copenhagen April 12th 2015 Cisco and/or its affiliates. All rights reserved.
More informationVxRack FLEX Technical Deep Dive: Building Hyper-converged Solutions at Rackscale. Kiewiet Kritzinger DELL EMC CPSD Snr varchitect
VxRack FLEX Technical Deep Dive: Building Hyper-converged Solutions at Rackscale Kiewiet Kritzinger DELL EMC CPSD Snr varchitect Introduction to hyper-converged Focus on innovation, not IT integration
More informationIntroduction to AWS GoldBase
Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationAgenda Integrated Multi-Cloud Management (imcm) TOPIC Context and Solution Overview Common Challenges and Opportunities 4-5 Key Elements and Features
MMC2623BU The Integrated Multi- Cloud Management Solution (imcm) Doug Bourgeois, Managing Director Sean Vandruff, Sr. Technology Fellow #VMworld #MMC2623BU Agenda Integrated Multi-Cloud Management (imcm)
More informationChoosing the Right Cloud. ebook
Choosing the Right Cloud ebook Contents Choosing the Right Cloud...3 The Cloud Explained: Public Cloud...4 The Cloud Explained: Private Cloud...5 Assessing Workload Characteristics...6 Right Application.
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationTable of Contents HOL SLN
Table of Contents Lab Overview - - Modernizing Your Data Center with VMware Cloud Foundation... 3 Lab Guidance... 4 Module 1 - Deploying VMware Cloud Foundation (15 Minutes)... 7 Introduction... 8 Hands-on
More informationGeneral Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant
General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationCloud Under Control. HyTrust Two-Man Rule Solution Brief
HyTrust Two-Man Rule Solution Brief Summary Summary The exposure of extremely confidential national security information by an N.S.A. systems administrator highlighted the catastrophic consequences of
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationCisco CloudCenter Use Case Summary
Cisco CloudCenter Use Case Summary Overview IT organizations often use multiple clouds to match the best application and infrastructure services with their business needs. It makes sense to have the freedom
More informationThe Etihad Journey to a Secure Cloud
SESSION ID: CCS-T07 The Etihad Journey to a Secure Cloud Georges de Moura Head of Group Information Security, Risk & Compliance Etihad Aviation Group History: Before The Cloud Devolved IT Decision-Making
More informationA High-Performing Cloud Begins with a Strong Foundation. A solution guide for IBM Cloud bare metal servers
A High-Performing Cloud Begins with a Strong Foundation A solution guide for IBM Cloud bare metal servers 02 IBM Cloud Bare Metal Servers Bare metal and the bottom line Today s workloads are dynamic and
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
LHC1753BU Case Study: How VMware NSX Is Empowering a Service Provider to Help Customers Achieve and Maintain Industry Compliance VMworld 2017 Content: Not for publication #VMworld #LHC1753BU Disclaimer
More informationVM-SERIES FOR VMWARE VM VM
SERIES FOR WARE Virtualization technology from ware is fueling a significant change in today s modern data centers, resulting in architectures that are commonly a mix of private, public or hybrid cloud
More informationHybrid IT with VMware on IBM Cloud and SoftLayer
Speakers Name Hybrid IT with VMware on IBM Cloud and SoftLayer IBM - Claudio Costanzo VMWARE - Andrea Teobaldi Client Technical Specialist Sr. Systems Engineer 2 Agenda IBM SoftLayer what is it? IBM SoftLayer
More informationVMware Cloud on AWS. A Closer Look. Frank Denneman Senior Staff Architect Cloud Platform BU
VMware Cloud on AWS A Closer Look Frank Denneman Senior Staff Architect Cloud Platform BU Speed is the New Currency Cloud Computing We are in the 3 rd fundamental structural transition in the history of
More informationCOMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September Table of Contents. 1. Scope, Purpose and Application to Employees 2
COMPUTAMATRIX LIMITED T/A MATRICA Data Protection Policy September 2018 Table of Contents 1. Scope, Purpose and Application to Employees 2 2. Reference Documents 2 3. Definitions 3 4. Data Protection Principles
More informationOktober 2018 Dell Tech. Forum München
Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven
More informationDisruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise
Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions
More informationSecuring Your Most Sensitive Data
Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way
More information