Testing Cloud Services: SaaS, PaaS and IaaS. Kees Blokland Jeroen Mengerink

Size: px
Start display at page:

Download "Testing Cloud Services: SaaS, PaaS and IaaS. Kees Blokland Jeroen Mengerink"

Transcription

1 Testing Cloud Services: SaaS, PaaS and IaaS Kees Blokland Jeroen Mengerink

2 Agenda Introduction Cloud computing Challenges Risks Solutions Test measures

3 Objectives Learn how to Cope with Cloud services Detect the (new) risks Mitigate these risks By using Your skills Heuristics The Book Discussions and exchange experiences

4 In the cloud?

5 What can be done in the cloud?

6 searching, recording, accounting, paying, writing, reviewing, tracking, calculating, developing, listening, analyzing, transmitting, learning, controlling, purchasing, testing, alarming, changing, updating, deleting, accessing, rejecting, correcting, studying, booking, receiving, tracing, protecting, deciding, managing, teaching, facilitating, identifying, copying, removing, demonstrating, checking, showing, selecting, subscribing, unsubscribing, sharing, mailing, communicating, reading, playing, working, meeting, gambling, shopping, storing, cross checking, retrieving, configuring, sketching, saving, accelerating, enhancing, creating, growing, checking in, checking out, finding out, reaching, denying, talking, designing, making, verifying, measuring

7 Develop and Test Surf Transfer Operate and Manage Store

8 Develop and Test redundancy limitations Surf Transfer costs for innovation 80% unused management overhead storage claim environmentally unfriendly Operate and Manage Store

9 Develop and Test SOA Surf Transfer internet technology virtualization standard software bandwidth Operate and Manage Store

10 searching, recording, accounting, paying, writing, reviewing, tracking, calculating, developing, listening, analyzing, Develop and Test transmitting, learning, controlling, Surf purchasing, testing, alarming, changing, Transfer updating, deleting, accessing, rejecting, correcting, studying, booking, receiving, tracing, protecting, deciding, managing, teaching, facilitating, identifying, copying, removing, demonstrating, checking, showing, selecting, subscribing, unsubscribing, sharing, mailing, communicating, reading, playing, working, meeting, gambling, shopping, storing, cross checking, retrieving, configuring, sketching, saving, accelerating, Operate and Manage enhancing, creating, growing, Store checking in, checking out, finding out, reaching, denying, talking, designing, making, verifying, measuring

11

12 Essential characteristics On-demand service Self service provisioning, pay-per-use No human interaction US: National Institute of Standards and Technology

13 Essential characteristics On-demand service Broad network access Standard mechanisms over networks Any client US: National Institute of Standards and Technology

14 Essential characteristics On-demand service Broad network access Resource pooling Multi-tenant Storage, processing, memory, virtual machines, Location independent US: National Institute of Standards and Technology

15 Essential characteristics On-demand service Broad network access Resource pooling Rapid elasticity Rapid scale in and out Any quantity at any time US: National Institute of Standards and Technology

16 Essential characteristics On-demand service Broad network access Resource pooling Rapid elasticity Measured service Controlled resource use Transparency, pay-per-use US: National Institute of Standards and Technology

17 Service models Nocloud Infrastructure as a Service Platform as a Service Software as a Service Internal Application Platform Virtualization Hardware Cloud

18 Deployment models Public Private Community Hybrid

19 Essential characteristics On-demand service Broad network access Resource pooling Rapid elasticity Measured service Deployment models private cloud community cloud public cloud hybrid cloud Service Models Software as a Service Platform as a Service Infrastructure as a Service US: National Institute of Standards and Technology

20 What is done in the cloud? <500 employees Public *aas >500 Private Hybride Community IaaS, PaaS, DaaS, SaaS Taas *aas Consumer Public SaaS Mail Storage Infrastructure CRM Finance Business processes Data Centre Data Management Business processes Surf and mail Apps Social media Dropbox Google services Spotify Picasa Games

21 Theoretical Basis What is in the book? 1. What is cloud computing? 2. The changing role of the test manager 3. What to test? 4. How to test? ISBN Page xx

22 What do you see as the two main risks of involving the cloud?

23 Standards Cyber crime Continuity Privacy Legislation Multi platform Impact organisation 143

24 R i s k s Performance Standards Security Cyber crime Continuity Functionality Privacy Legislation Maintainability Multi platform Impact organisation Suppliers & Outsourcing

25 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

26 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

27 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 37

28 R i s k s Performance Security YOUR Operational Profile Functionality Other customers Maintainability Suppliers & Outsourcing YOUR Operational Profile PLUS

29 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

30 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 40

31 R i s k s Performance Security The idea: it s safe Functionality Everything over the web Manageability Suppliers & Outsourcing Home ground for hackers

32 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 40

33 R i s k s Performance Security No free choice of device. Functionality Bring Your Own Device Maintainability Suppliers & Outsourcing Endless possibilities.

34 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

35 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 42

36 R i s k s Performance Security Functionality Maintainability Internet connection other systems Off line does not work Information is lost Suppliers & Outsourcing

37 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

38 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

39 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 44

40 R i s k s Performance Security Mismatch service <> business process Functionality is changed Functionality Insufficient usability Maintainability Suppliers & Outsourcing

41 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

42 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 46

43 R i s k s Performance Security Taken care of. Functionality Backup and recovery Maintainability Suppliers & Outsourcing Who will support me?

44 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing Page 46

45 R i s k s Performance Security Planned and controlled Functionality Updates, patches, fixes, Manageability Suppliers & Outsourcing Do I have a choice?

46 R i s k s Performance Security Functionality Maintainability Legislation & regulations Suppliers & Outsourcing

47 R i s k s Performance Security Functionality Maintainability Legislation & regulations Suppliers & Outsourcing

48 R i s k s Performance Security In house. Functionality Where is my data? And is that OK? Maintainability Legislation & regulations Somewhere Suppliers & Outsourcing

49 R i s k s Performance Security Functionality Maintainability Legislation & regulations Suppliers & outsourcing

50 R i s k s Performance Security Functionality Maintainability Legislation & regulations Suppliers & outsourcing Page 49

51 R i s k s Performance Vendor lock in Security No agreements Supplier of the supplier of the supplier Functionality Maintainability Supplier is taken over Legislation & regulations Suppliers & outsourcing

52 R i s k s Performance Security Functionality Maintainability Suppliers & Outsourcing

53 Testing? Interview Check Monitor Proof of concept Review

54 Testing! Interview Check Monitor Proof of Testen Proef Interview concept Intake Proof of concept Review

55 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Testing Proof of Testen Proef Interview concept Intake Functional Testing Migration Testing Testing due to Testing in Production

56 Selection Implementation Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Production Migration Testing Testing due to Testing in Production

57 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Testing Functional Testing Migration Testing Testing due to Testing in Production

58 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

59 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

60 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

61 R i s k s Performance Security Functionality Maintainability Architecture Testing during Selection Performance Testing Security Testing Manageability Testing From individual risks to Testing Functional Testing Migration Testing individual test measures Testing due to Test Measures Suppliers & Outsourcing Testing in Production

62 Page 47

63 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

64 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Selection Criteria Completeness Controllable For service For supplier Spec s and terms References Testing Functional Testing Migration Testing Testing due to Testing in Production

65 How do you select the service?

66 Page 61-64

67 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Proof of Concept Dynamic testing More suppliers Time boxing Representative Testing Functional Testing Migration Testing Testing due to Testing in Production

68 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

69 Known measures tuned and tweaked New measures developed Use: Your skills Heuristics The Book Your peers Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Testing due to Test Measures Testing in Production

70 Suppose your payroll system moves into the Cloud. What would you do?

71 YOUR Operational Profile Load Testing Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing YOUR Operational Profile PLUS ACTUAL MOMENT Testing due to Testing in Production

72 Operational profile Page 73

73 Yes, you can! Stress Testing Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Definitely NOT! Testing due to Testing in Production

74 Load and stress. Elasticity Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Load and elasticity. Testing due to Testing in Production

75 How would you test elasticity?

76 load test up load test down boundary values 99 load path test boundary values extend? yes no up tc 1: use=99, pay 100 tc 2: use=100, pay 100 tc 3: use=101, pay charged 100 charged down tc1: use=101, pay 200 tc2: use=100, pay 100 tc3: use=99, pay 100

77 load test up load test down load boundary values (Automatic) scaling up or down 99 does not perform as required At scaling moments functional problems emerge boundary values path test extend? yes no up tc 1: use=99, pay 100 tc 2: use=100, pay 100 tc 3: use=101, pay 200 Insight in use based costs is not sufficient 200 charged 100 charged down tc1: use=101, pay 200 tc2: use=100, pay 100 tc3: use=99, pay 100

78 Security at: Network Supplier User Encryption Authentication and authorisation IDaaS Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Test logs and audit trails Security Audits Experts Security patch routines Migration Testing Testing due to Testing in Production

79 Completeness and correctness of specifications and manuals Supplier User Availability of test environments Interface specifications Supported platforms Business process specs User manuals Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Testing due to Testing in Production

80 How do you setup your environment including the external service?

81 Manageablity of test environments Everything in the cloud

82 Manageablity of test environments Link all current environments to the service

83 Manageablity of test environments Link Production to the real service Link other environments to a MOCK SERVICE (or another instance of the service)

84 Completeness and correctness of specifications and manuals Supplier User Availability of test environments Management of: Defects Changes Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Testing due to Test Measures Testing in Production

85 Defect Management Supplier resolves it Test Change work process Test Incident Client resolves it Change configuration Custom solution Test Test Incident not resolved Service not selected Terminate use of service Migrate and test Workaround work instruction Test

86 Completeness and correctness of specifications and manuals Supplier User Availability of test environments Management of: Defects Changes Maintainability of the software Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Testing due to Test Measures Testing in Production

87 Role of system architecture Monitoring and Logging Guarantees and SLA s Test fail-over mechanism Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Test online/offline Migration Testing Testing due to Testing in Production

88 B is disrupted no change disruption in B ended no change Fail-over testing A: active B: inactive A is disrupted B takes over service A: disrupted B: active A: disrupted B: disrupted A is disrupted no change disruption in A ended no change A: active B: disrupted B is disrupted A takes over service A: inactive B: active

89 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Online Offline Testing Functional Testing Migration Testing Use case testing. Global testing. Testing due to Testing in Production

90 Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Testing Functional Testing Migration Testing Testing caused by Testing in Production

91 How does functional testing change with services?

92 Functional test objectives Does the service fit the business processes and vv? Is the service quality sufficient (number of bugs)? Is the service sufficiently user friendly? Is the service configuration done correctly? Does supplier customization function properly? Does customer customization function properly? Do interfaces work properly? Are platforms properly supported? Does everything work after changes (is there no regression)?

93 Multiplatform testing. Any device any platform Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Multiplatform testing. Testing caused by Testing in Production

94 3997 distinct Android devices

95 Windows XP Internet Explorer 6 Windows Vista Windows 7 Windows 2003 Server Internet Explorer 7 Internet Explorer 8 Firefox 3.5 Firefox 3.6 Windows 8 Browsers Firefox 4 Windows CE Linux Unix Mac OS Lion Mac OS Snow Leopard ios Operating systems Multi-platform testing Computer Safari 4 Safari 5 Chrome11 Opera11 PC SUN Macintosh Android iphone... Windows Mobile Samsung Devices Mobile phones NOKIA Tablet ASUS... Blackberry MOTOROLA

96 Windows XP Internet Explorer 6 Windows Vista Windows 7 Windows 2003 Server Internet Explorer 7 Internet Explorer 8 Firefox 3.5 Firefox 3.6 Windows 8 Browsers Firefox 4 Windows CE Linux Unix Mac OS Lion Mac OS Snow Leopard ios Operating systems Multi-platform testing Computer Safari 4 Safari 5 Chrome11 Opera11 PC SUN Macintosh Android iphone... Windows Mobile Samsung Devices Mobile phones NOKIA Tablet ASUS... Blackberry MOTOROLA

97 Multiplatform testing. Any device any platform Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Multiplatform testing. Testing caused by Testing in Production

98 Scenarios Transfer into the cloud, applications remain the same data moved to another location Transfer to SaaS data migrated to new service Transfer from one to another SaaS similar Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Transfer out of the cloud. similar Testing due to Testing in Production

99 Data conversion Testing conversion rules Testing conversion on input data Testing if any data is lost Testing ongoing transactions Rounding (totals incorrect) Field lengths (truncation) Totals (information lost) Date and time conversions what is ? Audit trail, check sums E2E business scenario s Extraction Conversion Import Existing systems Conversion software Service

100 Incidental testing. Sarbanes Oxley Legislation + Regulations = Test basis Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Compliancy testing. Testing due to Testing in Production

101 Checking for legislation and regulations List where data that is stored in the cloud Find the requirements that are applicable to this data Legal support needed for high risk Check supplier terms with customer s requirements Example. A supplier of a storage service claims to be the owner of the intellectual capital of all data stored at their facilities. It is highly unlikely that this is compatible with the interests of the organization that is the actual owner of the data. Perform (external) audit for high risk Test manager provides advice, management decides

102 Example: Dropbox Compliance with Laws and Law Enforcement Requests; Protection of Dropbox's Rights. We may disclose to parties outside Dropbox files stored in your Dropbox and information about you that we collect when we have a good faith belief that disclosure is reasonably necessary to (a) comply with a law, regulation or compulsory legal request; (b) protect the safety of any person from death or serious bodily injury; (c) prevent fraud or abuse of Dropbox or its users; or (d) to protect Dropbox s property rights. If we provide your Dropbox files to a law enforcement agency as set forth above, we will remove Dropbox s encryption from the files before providing them to law enforcement. However, Dropbox will not be able to decrypt any files that you encrypted prior to storing them on Dropbox.

103 Is testing in production necessary?

104 R i s k s Performance Security Functionality Maintainability Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Migration Testing Test Measures Suppliers & Outsourcing Testing due to Testing in Production

105 Continuous Change Testing during Selection Performance Testing Security Testing Manageability Testing Testing Functional Testing Test Measures Migration Testing Continuous End-to-End Testing Testing due to Testing in Production

106 Standards Cyber crime Check Continuity Interview Privacy Legislation Monitor Proof of concept Multi platform Impact organisation Intake

107 R i s k s Performance Security Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Testing Functionality starts early: in selection Testing Scope of testing is widened Maintainability Functional Testing Testing continues in production Migration Testing Suppliers & Outsourcing Testing due to Testing in Production

108 R i s k s Performance Security Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Functionality Manageability Questions? Testing Functional Testing Migration Testing martin.pol@polteq.com jeroen.mengerink@polteq.com Testing due to Suppliers & Outsourcing Testing in Production

109 R i s k s Performance Security Testing during Selection Performance Testing Security Testing Manageability Testing Test Measures Functionality Manageability Thank you! Testing Functional Testing Migration Testing kees.blokland@polteq.com jeroen.mengerink@polteq.com Testing due to Suppliers & Outsourcing Testing in Production

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Granted: The Cloud comes with security and continuity...

Granted: The Cloud comes with security and continuity... Granted: The Cloud comes with security and continuity... or, does it? Bogac Ozgen, MSc GyroFalco Ltd. http://www.gyrofalco.com Questions & Answers Do we still need security and continuity? YES Should I

More information

MANAGING THE COMPLEXITY.

MANAGING THE COMPLEXITY. AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems

More information

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to

CLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.

More information

Data Security: Public Contracts and the Cloud

Data Security: Public Contracts and the Cloud Data Security: Public Contracts and the Cloud July 27, 2012 ABA Public Contract Law Section, State and Local Division Ieuan Mahony Holland & Knight ieuan.mahony@hklaw.com Roadmap Why is security a concern?

More information

Cloud Computing, SaaS and Outsourcing

Cloud Computing, SaaS and Outsourcing Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller A guide to CLOUD COMPUTING 2014 Cloud computing Businesses that make use of cloud computing are legally liable, and must ensure that personal data is processed in accordance with the relevant legislation

More information

Cloud First Policy General Directorate of Governance and Operations Version April 2017

Cloud First Policy General Directorate of Governance and Operations Version April 2017 General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...

More information

Practical Guide to Cloud Computing Version 2. Read whitepaper at

Practical Guide to Cloud Computing Version 2. Read whitepaper at Practical Guide to Cloud Computing Version 2 Read whitepaper at www.cloud-council.org/resource-hub Sept, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! 2011/2012 Deliverables

More information

CLOUD COMPUTING-ISSUES AND CHALLENGES

CLOUD COMPUTING-ISSUES AND CHALLENGES CLOUD COMPUTING-ISSUES AND CHALLENGES Asstt. Prof.Vandana S.D.S.P.Memorial College for Women, Rayya (India) ABSTRACT Cloud computing is a multifaceted technological paradigm that is outgrowth of decades

More information

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając

Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared

More information

Cloud Computing Overview. The Business and Technology Impact. October 2013

Cloud Computing Overview. The Business and Technology Impact. October 2013 Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility

More information

Cloud Computing introduction

Cloud Computing introduction Cloud and Datacenter Networking Università degli Studi di Napoli Federico II Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione DIETI Laurea Magistrale in Ingegneria Informatica

More information

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its

More information

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Presentation Title Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Background A career of helping companies integrate new technologies into their existing infrastructure

More information

Cloud Computing Briefing Presentation. DANU

Cloud Computing Briefing Presentation. DANU Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities

More information

Benefits of Cloud Computing

Benefits of Cloud Computing Cloud Computing Deployment Models Public Cloud Systems and services easily accessed by the general public. Less secure. Private Cloud Systems and Services accessed within an organisation. Increased security

More information

Migration to Cloud Computing: Roadmap for Success

Migration to Cloud Computing: Roadmap for Success Migration to Cloud Computing: Roadmap for Success Mohammed Elazab, Professor Emeritus Higher Technological Institute, Tenth of Ramadan, Egypt President, Human and Technology Development Foundation Chairman,

More information

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013

More information

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing

More information

DIGITAL SENSE MICROSOFT LICENSING GUIDE

DIGITAL SENSE MICROSOFT LICENSING GUIDE This document is purely a guide for the reader s convenience and the reader is not entitled to rely on its descriptions and it does not constitute legal advice. 2 BYOL BYOD CAL DaaS DS IaaS LM OS OSE RDS

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Privacy hacking & Data Theft

Privacy hacking & Data Theft Privacy hacking & Data Theft Cloud Computing risks & the Patricia A RoweSeale CIA, CISA, CISSP, CRISC, CRMA The IIA (Barbados Chapter) Internal Audit Portfolio Director CIBC FirstCaribbean Objectives Cloud

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Cloud Security. Presented by Richard Brown

Cloud Security. Presented by Richard Brown Cloud Security Presented by Richard Brown Abstract As a Service model is delivering: Better and constant innovation Ability to adopt new technologies faster Lowering cost (especially up front capital costs)

More information

Why Nomadesk is the right product! for your reseller!!

Why Nomadesk is the right product! for your reseller!! Why Nomadesk is the right product! for your reseller!! What is Nomadesk? secure file sharing and synchronization designed for business professionals Zero thought, in-the-flow file sharing, synchronization

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Exploring The Essentials. Cloud Computing: Emerging Trends, Disruptions and Business Outcomes for Financial Services (Melbourne)

Exploring The Essentials. Cloud Computing: Emerging Trends, Disruptions and Business Outcomes for Financial Services (Melbourne) Exploring The Essentials Cloud Computing: Emerging Trends, Disruptions and Business Outcomes for Financial Services (Melbourne) Introduction Cloud definition: Cloud services are multi-tenant IT services

More information

1-2-3 Webinar: Demystifying the Cloud

1-2-3 Webinar: Demystifying the Cloud 1-2-3 Webinar: Demystifying the Cloud Presented by: Kristi Robison, Paintrock Consulting Services Kristi.Robison@outlook.com Sponsored by Wyoming Entrepreneur Small Business Development Center in conjunction

More information

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Business Technology Briefing: Fear of Flying, And How You Can Overcome It Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May

More information

STREAM Integrated Risk Manager Multi-user Deployment Options

STREAM Integrated Risk Manager Multi-user Deployment Options Multi-user Deployment Options Contents Multi-User Edition: can be accessed using a Web Browser can be accessed from an iphone or ipad (free app in App Store), and a range of other platforms and mobile

More information

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications

More information

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015

Cloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015 Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually

More information

Cloud Computing and Its Impact on Software Licensing

Cloud Computing and Its Impact on Software Licensing Cloud Computing and Its Impact on Software Licensing By Gretchen Kwashnik & Jim Cecil January 25, 2012 What is Cloud Computing? Cloud computing is a model for enabling: on-demand network access to a shared

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Cloud Security: Constant Innovation

Cloud Security: Constant Innovation Cloud Security: Constant Innovation without constant capital expenditure Presented by Richard Brown Wednesday 19 July 2017 CIO Summit Gold Coast, Australia How do we combat evolving threats? Traditional

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC Forensic Technology and the Cloud DuncanPowell RESTRUCTURING TURNAROUND FORENSIC 12 October 2017 DucanPowell Forensic Team Peter Lanthois Partner Office: (08) 8223 8107 Mobile: 0407 258 959 Email: planthois@duncanpowell.com.au

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

ECSA Assessment Report

ECSA Assessment Report ECSA Assessment Report Company Test Cloud Company Name of the cloudservice textcloud.com Website of the cloudservice 11.textcloud.com Project number #10652 Projectname Dummyproject Print date 2015-12-01

More information

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed

Cloud Infrastructure and Operations Chapter 2B/8 Page Main concept from which Cloud Computing developed Cloud Infrastructure and Operations Chapter 2B/8 Page 1 Chapter 2: Cloud Layer Setup and Maintenance Topics covered: 2.1 Basic Cloud Computing Concept 2.2 Benefits of Cloud Computing 2.3 Main concept from

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

CHEM-E Process Automation and Information Systems: Applications

CHEM-E Process Automation and Information Systems: Applications CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison

More information

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB CONTENTS Click on the section that you are interested in. 1 About the Mcafee endpoint protection Essential for SMB 2 2 Mcafee Endpoint Protection Essential for SMB applications 2 Eligibility 2 3 Charges

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

IT Enterprise Services. Capita Private Cloud. Cloud potential unleashed

IT Enterprise Services. Capita Private Cloud. Cloud potential unleashed IT Enterprise Services Capita Private Cloud Cloud potential unleashed Cloud computing at its best Cloud is fast becoming an integral part of every IT strategy. It reduces cost and complexity, whilst bringing

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016 Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud? DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

CLOUD COMPUTING READINESS CHECKLIST

CLOUD COMPUTING READINESS CHECKLIST CLOUD COMPUTING READINESS DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO 1 CONTENTS INTRODUCTION

More information

Cloud Computing Introduction & Offerings from IBM

Cloud Computing Introduction & Offerings from IBM Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007

7 Keys to Comparing Google Apps Premier Edition with Microsoft Exchange Server 2003/2007 7 Keys to Comparing with Microsoft Exchange Server 2003/2007 Partner Guide Introduction is Google s Software as a Service (SaaS) solution for business messaging, collaboration, and security. It includes

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

ECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University

ECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University ECE590-03 Enterprise Storage Architecture Fall 2017.~* CLOUD *~. Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (module 13), published by

More information

INFS 214: Introduction to Computing

INFS 214: Introduction to Computing INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing

More information

Version of 22 OCBC Bank. All Rights Reserved

Version of 22 OCBC Bank. All Rights Reserved Velocity@ocbc Clear Cache Guide Click here for Windows guide Click here for Mac OS guide Version 2.0 1 of 22 Step 1: Check your browser version 1. Type www.whatismybrowser.com at the address bar and press

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

HCL GRC IT AUDIT & ASSURANCE SERVICES

HCL GRC IT AUDIT & ASSURANCE SERVICES HCL GRC IT AUDIT & ASSURANCE SERVICES Overview The immense progress made in information and communications technology offers enterprises outstanding benefits. However this also results in making the risk

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization

More information

Security Principles for Stratos. Part no. 667/UE/31701/004

Security Principles for Stratos. Part no. 667/UE/31701/004 Mobility and Logistics, Traffic Solutions Security Principles for Stratos Part no. THIS DOCUMENT IS ELECTRONICALLY APPROVED AND HELD IN THE SIEMENS DOCUMENT CONTROL TOOL. All PAPER COPIES ARE DEEMED UNCONTROLLED

More information

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past Backup and Recovery Backup and Recovery Backup from Redstor and Recovery from Redstor Making downtime a thing of the past Making downtime a thing of the past Reject risk Preventing data loss is a challenge

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

Building Trust in the Era of Cloud Computing

Building Trust in the Era of Cloud Computing Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.

More information

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox. Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and

More information

Cloud Computing Legal Issues Practising Law institute 2015 San Francisco New York Chicago

Cloud Computing Legal Issues Practising Law institute 2015 San Francisco New York Chicago Cloud Computing Legal Issues Practising Law institute 2015 San Francisco New York Chicago Peter J. Kinsella 303/291-2328 Agenda Introduction and overview of cloud computing technologies Frequently raised

More information

Javier Villegas. Azure SQL Server Managed Instance

Javier Villegas. Azure SQL Server Managed Instance Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server

More information

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

What is the website's privacy policy?

What is the website's privacy policy? What is the website's privacy policy? BEST FRIEND LIMITED t/a The Fleece Hotel CUSTOMER PRIVACY POLICY Best Friend Limited (BF) Limited is a company registered in England and Wales (collectively referred

More information

Archive Legislation: archiving in the United Kingdom. The key laws that affect your business

Archive Legislation:  archiving in the United Kingdom. The key laws that affect your business Archive Legislation: Email archiving in the United Kingdom The key laws that affect your business Contents Laws regulating archiving, who they apply to and the penalties 3 Who is affected? 3 All private

More information

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com Cloud Computing Faculty of Information Systems Duc.NHM nhmduc.wordpress.com Evaluating Cloud Security: An Information Security Framework Chapter 6 Cloud Computing Duc.NHM 2 1 Evaluating Cloud Security

More information

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series

Protecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer

More information

Faculté Polytechnique

Faculté Polytechnique Faculté Polytechnique INFORMATIQUE PARALLÈLE ET DISTRIBUÉE CHAPTER 7 : CLOUD COMPUTING Sidi Ahmed Mahmoudi sidi.mahmoudi@umons.ac.be 13 December 2017 PLAN Introduction I. History of Cloud Computing and

More information

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)

More information

Definitions Know What I Mean?

Definitions Know What I Mean? Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their

More information

Practical Guide to Platform as a Service.

Practical Guide to Platform as a Service. Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas December 3, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards!

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

Omni-Channel Market Trends UK and Global January 2015

Omni-Channel Market Trends UK and Global January 2015 Monthly analysis of Omni-Channel market trends for UK and Global DESKTOP BROWSER Chrome dominates the worldwide and UK Browser market. Testing effort must concentrate on the top four browsers; Chrome,

More information

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

Extend your datacenter with the power of Citrix Open Cloud

Extend your datacenter with the power of Citrix Open Cloud Extend your datacenter with the power of Citrix Open Cloud Peter Leimgruber Sr. SE Datacenter & Networking, CE Mikael Lindholm Sr. SE XenServer & Cloud, EMEA Sales Dev Agenda Cloud Expectations and reality

More information

What kind of information do you collect, when and how?

What kind of information do you collect, when and how? Associated Telecom Solutions Privacy Policy Action- Tec Services Ltd T/A Associated Telecom Solutions collects business data in order to provide our services to our business customers. During the relationship

More information

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Chapter 6 Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 1.3 Explain network design elements and components. Virtualization Cloud computing: Platform as

More information

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Cloud Security Myths Paul Mazzucco, Chief Security Officer Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached

More information