THE EMERGING CLOUD ECOSYSTEM:

Size: px
Start display at page:

Download "THE EMERGING CLOUD ECOSYSTEM:"

Transcription

1 Day 2, Thursday, 2012 Jan 19, hrs SESSION 4: Security in the Cloud THE EMERGING CLOUD ECOSYSTEM: cyber security plusli/rd Tony Rutkowski, Yaana Technologies 7 th ETSI Security Workshop, Jan 2011 ETSI All rights reserved

2 Outline Security as a Business opportunity: A winning driver to ensure technology success and increase confidence and trust amongst end users! Current tcloud developments Cyber security and LI/RD developments Business opportunities 2

3 The Basics: a new cloud based global communications infrastructure is emerging Global network architectures are profoundly, rapidly changing PSTNs/mobile networks are disappearing Internet is disappearing Powerful end user devices for virtual services are becoming ubiquitous End user behavior is nomadic Huge data centers optimized for virtual services combined with local access bandwidth are emerging worldwide as the new infrastructure These changes are real, compelling, and emerging rapidly Bringing about a holistic cloud ecosystem is occupying industry in almost every venue around the world 3

4 The Basics: a new cloud virtualized global communications architecture Virtualized devices Line or air interfaces Access, IdM & transport cloud virtualization services Intercloud services Other cloud virtualization services, especially for application support Access, IdM & transport General services Intercloud Access, IdM & transport General services Access, IdM & transport Intercloud General services Access, IdM & transport Intercloud General services Access, IdM & transport General services 4

5 Current Cloud developments Implementations Industry Collaboration and Reports 5

6 Implementers Top 50 in early 2011* 10gen Cloud Passage FluidInfo Nimbula Akamai Amazon Cloud.com Cloudera Fusion IO GoGrid Nutanix Power Assure Apigee CloudSwitch Google Rackspace Apple Couchbase Green Revolution Red Hat ARM CSC IBM RightScale Aryaka Dell Intel Salesforce.com Aspera DotCloud IO Turbine SeaMicro Boundary Embrane Joyent Sentilla Calxeda Enomaly Juniper SynapSense China Telecom Cisco Citrix Eucalyptus Systems Facebook Microsoft New Relic Nicira Verizon/Terremark VMware Zeus Technology * Source: Washington Technology/Gigacom (underline = top 8) 6

7 Most new applications/services especially for mobile smartphones are cloud based Amazon Apple, including Apple OS applications Baidu Facebook Google, including Android OS applications Microsoft, including Microsoft OS applications RIM, including BlackBerry App World Skype Yahoo 7

8 Major providers and vendors collaborating innewcloudtelecom new forums ATT BT China Telecommunications China Unicom Cisco Systems Datang France Télécom Orange Fujitsu Hitachi Huawei Technologies IBM KDDI KT Corporation Microsoft NEC Nokia Siemens Networks NTT Oracle RIM Samsung Electronics SAP Telecom Italia Telefon AB LM Ericsson Telekomunikacja Polska Verizon Vdf Vodafone & O2 ZTE * Sources: ITU-T Cloud Focus Group participant list, 2011; ETSI Cloud workshop 8

9 Industry Technical Collaboration Venues Almost everyone ATIS CSA CSCC DMTF ENISA ETSI GICTF IEEE IETF ISO ITU T NIST OASIS ODCA OGF OMG SNIA TMF Alliance for Telecommunications Industry Solutions Cable Labs Cloud Security Alliance Cloud Standards Customer Council Distributed Management Task Force European Network and Information Security Agency European Telecommunications Standards Institute Global Inter Cloud Technology Forum Institute of Electrical and Electronics Engineers Internet Engineering Task Force International Organization for Standardization International Telecommunication Union Telecommunications Standardization National Institute of Standards and Technology Organization for the Advancement of Structured Information Standards Open Data Center Alliance Open Grid Forum Object Management Group Storage Networking Industry Association The Open Group TeleManagement Forum Sources: ITU-T Focus Group on Cloud Computing, NIST Cloud Standards Wiki 9

10 ITU T Focus Group on Cloud Computing Global initiative during to produce first comprehensive conceptualization and integration of all technical information Ecosystem Requirements and reference architecture Infrastructure for network enabled clouds Security Standards activities Telecommunication benefits Resource Management Deliverables were just delivered 9 Jan 2012 Sets a stage for widespread industry activity and structured implementations worldwide 10

11 Identified Cloud Computing Services Short List of Cloud Services Extended List of Cloud Services Cloud Software as a Service (SaaS) Communications as a Service (CaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS) Application services (SaaS) Resource services (IaaS) Platform services (PaaS) Network services (NaaS) Communication services (CaaS) Network as a Service (NaaS) Private cloud Community cloud Public cloud Hybrid cloud Personal cloud Inter cloud Business Process as a Service (BPaaS) Application Platform as a Service(APaaS) Application Infrastructure as a Service (AIaaS) Everything as a Service (XaaS) Storage as a service Database as a service Information as a service Process as a service Security as a service Integration as a service Management/governance as a service Testing as a service 11

12 A cloud computing functionalreference architecture Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec

13 A cloud computing network infrastructure model 13 Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011

14 Resource management framework Standards intended to address: Awareness of logical and physical resources used How to dynamically reconfigure resources How to expose additional interfaces How to evaluate security controls 14 Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011

15 Cyber Security and LI/RD developments 15

16 Cloud cyber security 16 Threats for Cloud Security Threats for Cloud Service Users Threats for Cloud Service Providers Security Requirements for CloudSecurity Requirements for Cloud Service Users Requirements for Cloud Service Providers Study Subjects on Cloud Security Security Architecture/Model and Framework Security Management and Audit technology Business Continuity Planning (BCP) and Disaster Recovery Storage Security Data and Privacy protection Account/Identity Management Network Monitoring and Incident Response Network Security Management Interoperability and Portability Security Virtualization Security Obligatory Predicates (including LI/RD) Source: ITU-T Focus Group on Cloud Computing, Final Report, Dec 2011

17 Cloud computing service opportunities Short List of Cloud Services Extended List of Cloud Services Cloud Software as a Service (SaaS) Communications as a Service (CaaS) Cloud Platform as a Service (PaaS) Cloud Infrastructure as a Service (IaaS) Application services (SaaS) Resource services (IaaS) Platform services (PaaS) Network services (NaaS) Communication services (CaaS) Network as a Service (NaaS) 17 Deliberately omitted from ITU T list Private cloud Community cloud Public cloud Hybrid cloud Personal cloud Inter cloud Business Process as a Service (BPaaS) Application Platform as a Service(APaaS) Application Infrastructure as a Service (AIaaS) Everything as a Service (XaaS) Storage as a service Database as a service Information as a service Process as a service Security as a service Integration as a service Management/governance as a service Testing as a service Lawful Interception as a Service Retained Data as a service Law Enforcement Monitoring Facility as a service

18 Obligatory predicates: functionality identifiedfor for allcloudbasedservices services Potential security monitoring and acquisition interfaces Challenges will be LI implementations across multiple clouds RD security and scaling Inconsistencies among cloud infrastructure and service implementations Potential application of ETSI TCLI ewarrant, DR handover, and Dynamic Triggering specifications Necessitates widespread d use of DPI capabilities i 18

19 Business opportunities Retained Data as a Service 19

20 Retained Data as a Service (RDaaS) Retained Data obligatorypredicates are numerous Securities and financial transaction regulatory requirements ediscovery civil litigation evidence requirements USA rules being adopted by judiciaries worldwide Data Retention criminal investigation requirements EU Data Retention Directive Potential new cloud requirements under the Directive Data Preservation criminal investigation requirements Includes quick freeze capabilities Cybersecurity/infrastructure protection requirements Includes Continuous Security Monitoring event analysis capabilities Billing record requirements 20

21 RDaaS value propositions RDaaS capabilities are ideal Cloud service obligations Large scale non cloud services Almost unlimited scaling of storage and processing resources High security and protection of personally identifiable information Technique re use can occur across multiple implementations Lowered costs Faster and more complex discovery and analysis capabilities Specialized customer remote access apps Facilitated by new CybOX observables initiative 21

Cloud Computing. Theory and Practice. 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley

Cloud Computing. Theory and Practice. 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley Cloud Computing Theory and Practice 22 March 2012 Phil Mustaphi, Colin Ashford, Larkland Morley Cloud Computing NIST Definition 22 March 2012 Phil Mustaphi NIST Cloud Computing Definition NIST Special

More information

Standardization Activities for Cloud Computing

Standardization Activities for Cloud Computing Standardization Activities for Cloud Computing Hiroshi Sakai Abstract This article describes standardization activities for cloud computing. Since cloud computing involves a wide range of technical and

More information

Inter-Cloud Computing and Networking for Secure Social Infrastructure

Inter-Cloud Computing and Networking for Secure Social Infrastructure Inter-Cloud Computing and ing for Secure Social Infrastructure Atsuhiro GOTO Institute of Information Security (IISEC) Global Inter-Cloud Technology Forum (GICTF) 1 Who am I? Atsuhiro Goto is currently

More information

Copyright 2011 EMC Corporation. All rights reserved.

Copyright 2011 EMC Corporation. All rights reserved. 1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145

More information

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Cloud Standards: Raising PRESENTATION the bar TITLE of completeness GOES HERE Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Opening Thoughts Cloud s no

More information

Moving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER.

Moving to the Cloud. Developing Apps in. the New World of Cloud Computing. Dinkar Sitaram. Geetha Manjunath. David R. Deily ELSEVIER. Moving to the Cloud Developing Apps in the New World of Cloud Computing Dinkar Sitaram Geetha Manjunath Technical Editor David R. Deily AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO

More information

Overview of International Standards for Cloud Computing

Overview of International Standards for Cloud Computing ITU Regional Forum on New Technologies for Development, Cairo-Egypt, 23-24 November 2016 Overview of International Standards for Cloud Computing Dr. Jamil Chawki, Orange SG 13 Vice Chairman & SG 13 WP2

More information

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Presentation Title Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Background A career of helping companies integrate new technologies into their existing infrastructure

More information

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information CLOUD COMPUTING The Old Ways Are New Again Jeff Rowland, Vice President, USAA IT/Security Audit Services Public Information Who We Are Our Mission The mission of the association is to facilitate the financial

More information

Cloud Computing Lecture 4

Cloud Computing Lecture 4 Cloud Computing Lecture 4 1/17/2012 What is Hypervisor in Cloud Computing and its types? The hypervisor is a virtual machine monitor (VMM) that manages resources for virtual machines. The name hypervisor

More information

Cloud Computing: An Overview

Cloud Computing: An Overview Cloud Computing: An Overview Ling Qian, Zhiguo Luo, Yujian Du, and Leitao Guo 53A, Xibianmennei Ave, Xuanwu District, Beijing 100053, China {qianling,luozhiguo,duyujian,guoleitao}@chinamobile.com Abstract.

More information

Cloud Standards Coordina.on

Cloud Standards Coordina.on Cloud Standards Coordina.on A collabora.ve snapshot on Cloud Standards E. Darmois CSC Workshop, 11 December 2013 ETSI 2013. All rights reserved The Context EC Cloud Strategy (09/2012) Faster adopdon of

More information

Part III: Evaluating the Business Value of the Hybrid Cloud

Part III: Evaluating the Business Value of the Hybrid Cloud Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25

More information

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017

EU Cloud Computing Policy. Luis C. Busquets Pérez 26 September 2017 EU Cloud Computing Policy Luis C. Busquets Pérez 26 September 2017 The digital revolution is built on data Most economic activity will depend on data within a decade Potential of the data-driven economy

More information

Topics of Discussion

Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture on NIST Cloud Computing Definition, Standards & Roadmap, Security & Privacy Guidelines Spring 2013 A Specialty Course for Purdue

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

رایانش ابري در بانکداري

رایانش ابري در بانکداري رایانش ابري در بانکداري فرامرز خالقی شرکت داده پردازي ایران 1 NIST :The provision of computational resources on demand via a computer network IT Resources and Services that are abstracted from the underlying

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

Universal Trusted Service Provider Identity to Reduce Vulnerabilities

Universal Trusted Service Provider Identity to Reduce Vulnerabilities 1.1 Session 3: Cyber-attacks: Are we ready for the battlefield of the 21st Century? 22 May 2008 Palais des Nations, Geneva Universal Trusted Service Provider Identity to Reduce Vulnerabilities Tony Rutkowski

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take

More information

Cisco Services: Towards Your Next Generation IT

Cisco Services: Towards Your Next Generation IT Cisco Services: Towards Your Next Generation IT Uwe Lambrette - EMEAR DC & Cloud Services Director Kadir Kaya EMEAR DC & Cloud Services Sales Manager Enterprise Cloud Today: Hybrid Cloud Adoption IT Departments

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

Digital Transformation: Powered by Cloud. William Fellows Co-founder, VP Research

Digital Transformation: Powered by Cloud. William Fellows Co-founder, VP Research Digital Transformation: Powered by Cloud William Fellows Co-founder, VP Research 2 Agenda How are enterprises being disrupted? Technology is an accelerant What s in it for me? Securing your future 3 Agenda

More information

SMARTPHONE MARKETS AND TECHNOLOGIES

SMARTPHONE MARKETS AND TECHNOLOGIES SMARTPHONE MARKETS AND TECHNOLOGIES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary...1 1 Mobile handsets and smartphones...3 1.1 Overview of handset segments...3

More information

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA Securing the cloud ISACA Korea Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA What is cloud computing? Source: Wikipedia 2 What is cloud computing A model for enabling:- convenient on-demand network

More information

Computing as a Service

Computing as a Service Cloud Computing? Dipl. Ing. Abdelnasser Abdelhadi Islamic University Gaza Department of Computer Engineering April 2010 Computing as a Service Business Processes Collaboration Industry Applications Software

More information

Telecom Cloud Market Research Report- Global Forecast 2022

Telecom Cloud Market Research Report- Global Forecast 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/2027 Telecom Cloud Market Research Report- Global Forecast 2022 Report / Search Code: MRFR/ICT/1495-HCRR Publish Date:

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud

2013 Cloud Computing Outlook: Private Cloud Expected to Grow at Twice the Rate of Public Cloud Private Cloud Expected to Grow at Twice the Rate of Public Cloud In This Paper Security, privacy concerns about the cloud remain SaaS is the most popular cloud service model in use today Microsoft, Google

More information

Cloud Builders. Billy Cox. Director Cloud Strategy Software and Services Group

Cloud Builders. Billy Cox. Director Cloud Strategy Software and Services Group Cloud Builders Billy Cox Director Cloud Strategy Software and Services Group From Vision to Action IT & Service Providers Products & Technologies Intel Cloud Builders Define and Prioritize IT Requirements

More information

Inter-cloud computing: Use cases and requirements lessons learned 3.11

Inter-cloud computing: Use cases and requirements lessons learned 3.11 Inter-cloud computing: Use cases and requirements lessons learned 3.11 Oct 12, 2011 Global Inter-Cloud Technology Forum (GICTF) Institute of Information Security (IISEC) Atsuhiro Goto goto@iisec.ac.jp

More information

MOBILE LOCATION-BASED SERVICES

MOBILE LOCATION-BASED SERVICES MOBILE LOCATION-BASED SERVICES INDEX Index Table of Contents Table of Contents... i List of Figures... vi Executive summary...1 1 Introduction to location-based services...3 1.1 Definition of mobile location-based

More information

Open Networking Summit 2013

Open Networking Summit 2013 Open Networking Summit 2013 1 Welcome to Tutorial on SDN Market Opportunities 2 Senior Director of Market Development, Ciena Responsible for SDN Marketing at Ciena Involved in SDN for a few years Chair

More information

Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing. Junfeng ZHAO

Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing. Junfeng ZHAO Introduction of ISO/IEC JTC1 SC 38 & its standard work on cloud computing Junfeng ZHAO 2011.3.23 Agenda Introduction of ISO/IEC JTC1 /SC 38 Introduction of ISO/IEC JTC1 /SC 38 SG1 Introduction of On-going

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

Internet of Things Security standards

Internet of Things Security standards Internet of Things Security standards Vangelis Gazis (vangelis.gazis@huawei.com) Chief Architect Security Internet of Things (IoT) Security Solution Planning & Architecture Design (SPD) Security standards

More information

Cloud in Europe Markets, Players, Trends

Cloud in Europe Markets, Players, Trends Cloud in Europe Markets, Players, Trends Cloud Independence Day Paris, 7 July 2016 Karsten Leclerque PAC a CXP Group Company Cloud: from IT transformation to digital disruption Internet of Things Connected

More information

Evolution of Inter-Cloud Computing to Handle Big Data. Tomonori Aoyama. Chair of GICTF Keio University

Evolution of Inter-Cloud Computing to Handle Big Data. Tomonori Aoyama. Chair of GICTF Keio University 5 th China Cloud Computing Conference 2013 Evolution of Inter-Cloud Computing to Handle Big Data June 7, 2013 Tomonori Aoyama Chair of GICTF Keio University What is Inter-cloud? Inter-cloud computing allows

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

Gerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved

Gerald McQuaid, Chairman ETSI TC LI. ETSI All rights reserved ETSITC TC LI STANDARDS OVERVIEW Gerald McQuaid, Chairman ETSI TC LI ETSI 2014. All rights reserved 9 th ETSI Security Workshop, 15 16 January 2014 Lawful Interception (LI) & Data Retention (DR) Delivery

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Cloud & Virtualization Technologies

Cloud & Virtualization Technologies Cloud & Virtualization Technologies December 2018 John Blackwood, CIS Faculty Where to begin? Technology at the heart of every company Most companies will need some type of cloudbased solution The Cloud

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

CTO MEETING GENEVA COMMUNIQUÉ

CTO MEETING GENEVA COMMUNIQUÉ CTO MEETING GENEVA COMMUNIQUÉ 25 October 2011 Geneva, Switzerland Twenty ICT industry leaders and the senior management of the ITU Telecommunication Standardization Sector (ITU-T) met for the third annual

More information

BT Innovate. Service Oriented Networks. John Wittgreffe, ICT Chief Researcher

BT Innovate. Service Oriented Networks. John Wittgreffe, ICT Chief Researcher BT Innovate Oriented Networks John Wittgreffe, ICT Chief Researcher 1 Agenda Oriented Networks Overview, John Wittgreffe BT SON Application Development Environments, Sean Moore, Avaya SON Security Gateways,

More information

The SDN Revolution: Transforming Next Generation Carrier Networks

The SDN Revolution: Transforming Next Generation Carrier Networks The SDN Revolution: Transforming Next Generation Carrier Networks Rick Bauer, Managing Director Open Networking Foundation Rick.bauer@opennetworking.org Overview An Introduction to Software Defined Networking

More information

Granted: The Cloud comes with security and continuity...

Granted: The Cloud comes with security and continuity... Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

SIP Based IP PBX: Market Shares, Strategies, and Forecasts, 2017 to 2023

SIP Based IP PBX: Market Shares, Strategies, and Forecasts, 2017 to 2023 SIP Based IP PBX: Market Shares, Strategies, and Forecasts, 2017 to 2023 SIP Based IP PBX: Executive Summary Table of Contents The study is designed to give a comprehensive overview of the SIP Based IP

More information

October 25-27, 2017 Hilton Prague, Prague, Czech Republic Sponsorship Prospectus

October 25-27, 2017 Hilton Prague, Prague, Czech Republic Sponsorship Prospectus October 25-27, 2017 Hilton Prague, Prague, Czech Republic 2017 Sponsorship Prospectus KVM Forum is an annual event that presents a rare opportunity for developers and users to meet, discuss the state of

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

COMPLIANCE IN THE CLOUD

COMPLIANCE IN THE CLOUD COMPLIANCE IN THE CLOUD 3:45-4:30PM Scott Edwards, President, Summit 7 Dave Harris Society for International Affairs COMPLIANCE IN THE CLOUD Scott Edwards scott.edwards@summit7systems.com 256-541-9638

More information

THE GLOBAL ENTERPRISE MOBILITY MARKET

THE GLOBAL ENTERPRISE MOBILITY MARKET THE GLOBAL ENTERPRISE MOBILITY MARKET IFT119A September 2015 Natraj Pandal Project Analyst ISBN: 1-62296-161-7 BCC Research 49 Walnut Park, Building 2 Wellesley, MA 02481 USA 866-285-7215 (toll-free within

More information

Topics II SaaS 2.0 OaSe*: OpenCms as a Service Cloud Sites SaaS 3.0 Google Apps (Gmail, Google Docs) Cloud Assessment Services Cloudify: Cloud Applica

Topics II SaaS 2.0 OaSe*: OpenCms as a Service Cloud Sites SaaS 3.0 Google Apps (Gmail, Google Docs) Cloud Assessment Services Cloudify: Cloud Applica Topics I CaMuS Cloud aware Content Management Framework OpenCAMP Open Cloud Application Management Platform AppScale Cloud Foundry OpenShift Open Cloud Operating Systems Apache CloudStack Eucalyptus OpenNebula

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

7 th ETSI Security Workshop

7 th ETSI Security Workshop 7 th ETSI Security Workshop EVENT AGENDA 18 19 January 2012 Sophia Antipolis http://www.etsi.org/securityworkshop DAY 1 AGENDA 18 th January 2012 SESSION 1: INTRODUCTION and KEYNOTE Session Chair: Charles

More information

Contents. Contents (ix) Chapter 1 EVOLUTION OF CLOUD COMPUTING. Chapter 2 INTRODUCTION TO CLOUD COMPUTING. (ix)

Contents. Contents (ix) Chapter 1 EVOLUTION OF CLOUD COMPUTING. Chapter 2 INTRODUCTION TO CLOUD COMPUTING. (ix) (ix) Preface... (v) Acknowledgment... (vii) Abbreviations... (xvii) Chapter 1 EVOLUTION OF CLOUD COMPUTING 1.1 Chapter Overview... 1 1.2 Distributed System... 1 1.2.1 Examples of Distributed Systems...

More information

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES

More information

Effects of. regulatory asymmetries. in the Internet Value chain. Portada Proyectable. Titulo arial regular 22 pt.

Effects of. regulatory asymmetries. in the Internet Value chain. Portada Proyectable. Titulo arial regular 22 pt. Effects of Portada Proyectable. Titulo arial regular 22 pt. regulatory asymmetries Arial 16 pt para generar los subtítulos de máximo 3 líneas. in the Internet Value chain Telefónica S.A 27.03.2012 01 Introduction

More information

DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel

DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel DMTF Technologies and Alliances Update Hemal Shah, DMTF Senior VP of Technology & TC Chair Broadcom Limited John Leung, DMTF VP of Alliances Intel Corporation July 26, 2017 Executive Summary WHO WHAT WHY

More information

Discussion on MS contribution to the WP2018

Discussion on MS contribution to the WP2018 Discussion on MS contribution to the WP2018, 30 January 2018 European Union Agency for Network and Information Security Possibilities for MS contribution to the WP2018 Expert Groups ENISA coordinates several

More information

Towards 5G NR Commercialization

Towards 5G NR Commercialization Towards 5G NR Commercialization Accelerating 5G NR for Enhanced Mobile Broadband May 25 2017 5G NR will deliver new levels of capability and efficiency For enhanced mobile broadband and beyond Multi-Gigabit

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL?

STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy 19 April 2018 STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? Presented by

More information

State of US Mobile Payments (NFC)

State of US Mobile Payments (NFC) State of US Mobile Payments (NFC) (NFC State of the Industry Panel) Chandra Srivastava Business Leader, Visa SCA Mobile & NFC Council 2013 Payments Summit February 6, 2013 Draft - For Discussion Only 1

More information

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared

More information

Securing Data in the Cloud: Point of View

Securing Data in the Cloud: Point of View Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements

More information

Modernising the public sector through the cloud

Modernising the public sector through the cloud Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2

More information

A Holistic View of Telco Clouds

A Holistic View of Telco Clouds A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

Green IT Strategies and Practices for a Sustainable Europe

Green IT Strategies and Practices for a Sustainable Europe CeBIT Green IT 2010 Green IT Strategies and Practices for a Sustainable Europe Dr. Colette Maloney Head of Unit ICT for Sustainable Growth European Commission Information Society and Media Directorate-General

More information

Cloud Computing Briefing Presentation. DANU

Cloud Computing Briefing Presentation. DANU Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities

More information

Cloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.

Cloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing. Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com

More information

ETSI LI Standards Overview

ETSI LI Standards Overview http://eustandards.in/ ETSI LI Standards Overview Alex Leadbeater - Chairman 3GPP SA3LI What is LI/DR/DD Lawful Interception (LI) is the real-time capture of a Target s use of communications (including

More information

Introduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps

Introduction to Global Inter-Cloud Technology Forum (GICTF) and its Roadmaps Introduction to Global Inter-Cloud Technology Forum () and its Roadmaps Dec. 10, 2009 Hiroshi Sakai, secretariat (NTT Information Sharing Platform Laboratories) 1 : A technology forum for the Inter-cloud

More information

Unified Communication Comparison Guide

Unified Communication Comparison Guide Unified Communication Comparison Guide Introduction Unified Communications (UC) is a useful solution for busy people to collaborate more effectively both within and outside their organizations. This guide

More information

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa CLOUD FORENSICS : AN OVERVIEW Kumiko Ogawa What is Cloud Forensics Forensic Science - Application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system.

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

SeON GAP analysis. Dr. Parag Pruthi - Chair. Dr. Ashutosh Dutta Vice Chair. Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved.

SeON GAP analysis. Dr. Parag Pruthi - Chair. Dr. Ashutosh Dutta Vice Chair. Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved. SeON GAP analysis Dr. Parag Pruthi - Chair NIKSUN Dr. Ashutosh Dutta Vice Chair NIKSUN Date: December 14, 2010 Copyright 2010 GISFI. All Rights Reserved. Outline ATIS SON Work-plan Gap Analysis with ATIS

More information

OpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners

OpenStack Seminar Disruption, Consolidation and Growth. Woodside Capital Partners OpenStack Seminar Disruption, Consolidation and Growth Woodside Capital Partners December 2, 2014 AGENDA I. Evolution of Enterprise IT II. III. IV. Cloud Market Opportunity Cloud Market Landscape OpenStack

More information

SMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS

SMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS SMART MANUFACTURING: TECHNOLOGIES AND GLOBAL MARKETS IFT126A June 2016 Nathalie Granato Project Analyst ISBN: 1-62296-321-0 BCC Research 49 Walnut Park, Building 2 Wellesley, MA 02481 USA 866-285-7215

More information

ETSI SR V2.0.0 ( )

ETSI SR V2.0.0 ( ) SR 003 392 V2.0.0 (2015-11) SPECIAL REPORT Cloud Computing Standards Maturity Assessment A new snapshot of Cloud Computing Standards Analysis, conclusions and recommendations from Cloud Standards Coordination

More information

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt

Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA. The African Internet Governance Forum - AfIGF Dec 2017, Egypt Dr. Emadeldin Helmy Cyber Risk & Resilience Bus. Continuity Exec. Director, NTRA The African Internet Governance Forum - AfIGF2017 5 Dec 2017, Egypt Agenda Why? Threats Traditional security? What to secure?

More information

Where is the EU in cloud security certification?: Main findings

Where is the EU in cloud security certification?: Main findings WE CAN DO SO MUCH TOGETHER Where is the EU in cloud security certification?: Main findings Certification schemes for cloud computing SMART 2016 / 0029 Leire Orue-Echevarria TECNALIA December 11 th, 2017

More information

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel

Richard Curran :Security Officer EMEA. Mario Romao : Senior Manager Policy, Intel Richard Curran :Security Officer EMEA Mario Romao : Senior Manager Policy, Intel Digital Convergence Across All Industries Traditional Economy Digital Convergence Blending of Traditional and Digital Business

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Forecast: sizing the software-defined networking market

Forecast: sizing the software-defined networking market Forecast: sizing the software-defined networking market By Lee Doyle February 7, 2013 Cloud TABLE OF CONTENTS Introduction: sizing the SDN market 3 Defining the SDN taxonomy 4 SDN vendors and products

More information

Cloud ecosystem and the role of cloud interconnect

Cloud ecosystem and the role of cloud interconnect Cloud ecosystem and the role of interconnect Data center interconnect for the era Strategic White Paper Data center interconnect (DCI) solutions are used to link and transport traffic between. Although

More information

ENISA Cooperation in the EU / NIS Directive

ENISA Cooperation in the EU / NIS Directive ENISA Cooperation in the EU / NIS Directive Paulo Empadinhas Head of Administration & Stakeholders Relations IT STAR Milan, Italy 28 th October 2016 European Union Agency for Network and Information Security

More information

CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS

CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS CHAPTER 2 CLOUD DEPLOYMENT AND SERVICE DELIVERY MODELS CLOUD SERVICE MODELS The Cloud Service Models can be categorized into three main categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service

More information

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Cloud Computing: A European Perspective Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA Overview Cloud Universe Definitions Cloud Risks in Europe Governance, Risk and Compliance

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

Wireless Communications Initiative

Wireless Communications Initiative Wireless Communications Initiative Launched in 2010 Advocate in the Local Jurisdictions Provide a strong regional voice speaking to the competitive and economic implications of a robust wireless infrastructure.

More information

RESOLUTION 130 (Rev. Antalya, 2006)

RESOLUTION 130 (Rev. Antalya, 2006) Res. 130 430 RESOLUTION 130 (Rev. Antalya, 2006) Strengthening the role of ITU in building confidence and security in the use of information and communication technologies The Plenipotentiary Conference

More information

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.

More information