Red Hat Cloud security: Frameworks & enforcement. Kurt Seifried Security Response team April 16, 2014 v1.0
|
|
- Lynette Strickland
- 5 years ago
- Views:
Transcription
1 Red Hat Cloud security: Frameworks & enforcement Kurt Seifried Security Response team April 16, 2014 v1.0
2 Agenda A quick history of the future Cloud IT and Security it's all about operations Cloud security standards and technologies Emerging / Future technologies Q&A 3/17/13 2
3 What is the cloud? IaaS (Infrastructure as a Service) PaaS (Platform as a Service) SaaS (Software as a Service) MaaS (Metal as a service) SecaaS (Security as a Service) CaaS (Communications as a Service Let's apply regex:.*aas Voila: XaaS (Anything as a Service) 3/17/13 3
4 Open Hybrid Cloud You want a cloud that includes IaaS, PaaS, SaaS, MaaS, SecaaS, CaaS, etc. That works on both private resources (in house/on premises/off site) and public resources That prevents vendor lock in That increases agility/capabilities (e.g. RHEL+Windows+whatever else you need) Aka Open Hybrid Cloud 3/17/13 4
5 Handling the past This means the cloud will have to handle your existing systems and services without any major changes or else you get to rewrite/rebuild everything (which you don't want to do) 3/17/13 5
6 Handling the future Self service both bring your own and buffet/menu style (e.g. build your own system and run or select from a catalog) Rapid deployment of heterogeneous systems (Linux + Windows + your old COBOL box) New methods and modes of operations we haven't even thought of yet 3/17/13 6
7 Supporting Hybrid IT You have mature IT (like your payroll system) You have bleeding edge IT (like your social media app or your Big Data project) You want your cloud to support both modes of operations 3/17/13 7
8 Building on sand You can build reliable services on top of unreliable systems (within reason), RAID, replication, multi-pathing, transactions, etc. You cannot build secure systems on top of insecure systems 3/17/13 8
9 The cloud is all about operations Technology is an enabler, nobody actually wants to run operating system X or software package Y, they want to run it to get stuff done Virtualization has allowed us to decouple from hardware, with Cloud we are able to decouple from operational constraints 3/17/13 9
10 Sliced, diced and julienned In theory with cloud you can have a single pool of systems that is shared amongst all, using multitenant systems, networks, storage and services This requires very strong controls to separate things, especially with shared workloads and services (you can cheat and dedicate servers, but this reduces flexibility and efficiency) 3/17/13 10
11 Strong controls Virtualization almost a decade of KVM SELinux over a decade now IPTables - over a decade now Many, many other technologies Real world validation - OpenShift Online only requires attackers have an address to register and login via SSH, we see a lot of attacks and as a consequence have robust SELinux policies that also allow people to still do what they need to do 3/17/13 11
12 Dialing security up and down One size does not fit all Highly regulated and unregulated Contractual requirements Multiple legal jurisdictions Systems in use for years at a time and systems used for 5 minutes at a time by QA 3/17/13 12
13 Secure deployment and updates You need to deploy secure systems You then need to keep them up to date And properly configured And you need to be able to deploy insecure systems/configurations as needed (dev/testing) 3/17/13 13
14 Orchestration and management You need Orchestration that can handle all sorts of weird situations and systems This is especially true for self service clouds, some people need freedom, others need strong controls You also want to prevent things like an intern firing up a clone of the employee database and grabbing all the personal data You need to support multiple operation models 3/17/13 14
15 Cloud security standards and technologies There are several existing standards that are cloud specific, and many that are not You will have to support these standards, you will be judged by these standards Providers want to minimize the number of standards they have to deal with, so convincing them to deal with your own standard NOPE. 3/17/13 15
16 FedRAMP The US gov has learned a lot of painful lessons and applied them to FedRAMP It's a collection of open standards, acronym soup It addresses the many providers to many consumers issue It includes continuous testing and certification It is flexible and supported by many tools and vendors today 3/17/13 16
17 Red Hat support of FedRAMP The main thing here is SCAP and OpenSCAP Red Hat has content for RHEL, Fedora Can be applied during kickstart! Automated remediation tools like Aqueduct Red Hat also publishes OVAL data, CVE, CPE, CWE, CVRF and others Red Hat has numerous people in the federal government and security space, we are heavily involved in this 3/17/13 17
18 Cloud Security Alliance Heavily aimed at operational security Includes mappings to other security standards Currently self attestation and third party testing through BSI Working on additional standards and updates Working on 3 rd party assessment and continuous assessment 3/17/13 18
19 Red Hat support of CSA OpenSCAP can be used for the technical side of security, but many of the things CSA looks for are operational decisions (e.g. employee training) We submitted a CAIQ entry for OpenShift Online 1 year ago (April 15, 2014) We are a corporate member of the CSA and keep a close eye on things 3/17/13 19
20 ISO/IEC ISO is creating a set of cloud specific security standards under 27017, initial drafts look pretty good ISO has stated that they are expected to be released in late /17/13 20
21 Red Hat support for ISO/IEC Since the cloud specific standards are not final yet I can't really say that we support them per se But we do have OpenSCAP for the technical side And we are keeping a close eye on them 3/17/13 21
22 Other non cloud security standards All the usual suspects (PCI DSS, blah blah blah) Enough workload has moved to the cloud, these non cloud standards have been made to work in the cloud You can mostly get away with compensating controls, using cloud services that are certified, and using dedicated resources 3/17/13 22
23 A quick note on failure cases of security standards Failure to include ongoing testing/certificate Actively malicious vendors and testing/certification vendors that allow bad things DigiNotar Massive data breaches at various companies A possible outcome is that cloud providers try to discredit each other and thus keep each other honest? 3/17/13 23
24 Emerging / Future technologies But wait, there's more! 3/17/13 24
25 Stateless and stateful systems a.k.a. Mutable and immutable systems Separate systems and services by state or mutability, stateless/immutable systems are much easier to auto scale up and down Stateless/immutable systems can be locked down heavily, think read only web front ends using file serving/database back ends Stateless/immutable systems shouldn't change, so any compromise should be obvious 3/17/13 25
26 Short lived systems Think xinetd for Vms/containers, one request, one system gets started, services it, and is shut down Requires technology still in development Extremely dense systems using ARM system on a chip and transactional memory are not to far away however... 3/17/13 26
27 Software Defined Perimeter (SDP) Brings the perimeter in from the network and system directly to the application critical with multi-tenant systems Also an intelligent control plane, so you spin up a new web front end and add access rules/certificates/whatever to the database back end and other resources it needs Automated security is the only sane way to handle auto scaling systems 3/17/13 27
28 Conclusion The cloud is happening, your accountants will see the utilization numbers and make you do it, also OPEX vs CAPEX, also pay as you go with bursting is kind of awesome IT is changing more than ever, and staying the same more than ever (COBOL and FORTRAN), we need to support both, preferably with one system Self serve is awesome and it can be done securely, doing it insecurely will be very bad 3/17/13 28
29 Question and answers
30 Up to date slides, notes, 5-10 page write up and additional materials are available at:
31 URLS 3/17/13 31
Cloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationINTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE
INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationWhy Choose MS Azure?
Why Choose MS Azure? Bio Dave Williams Cloud Architect AWS and Azure Expertise Agenda How to choose a public cloud service provider Microsoft Azure Strengths: Identity & Azure Active Directory Infrastructure
More informationPatching and Updating your VM SUSE Manager. Donald Vosburg, Sales Engineer, SUSE
Patching and Updating your VM SUSE Manager Donald Vosburg, Sales Engineer, SUSE dvosburg@suse.com Why should I care? I just clone my base VM image, and after that it is not my problem... Understand the
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationCloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson
Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider
More informationCloud Computing Risks & Reality. Sandra Liepkalns, CRISC
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
More informationAtos Canopy Orchestrated Hybrid Cloud. Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC
Atos Canopy Orchestrated Hybrid Cloud Mark Nouris - Atos Head of Cloud Michael Kollar Head of Cloud engineering & TIC Cloud Animation Video 02-03-2017 Addressing Customer Challenges in all verticals With
More informationVMware Hybrid Cloud Solution
VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach
More informationS Automating security compliance for physical, virtual, cloud, and container environments
S103174 - Automating security compliance for physical, virtual, cloud, and container environments Using Red Hat CloudForms, Red Hat Satellite, Red Hat Insights and Ansible Tower by Red Hat Lucy Huh Kerner
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationBuilding a government cloud Concepts and Solutions
Building a government cloud Concepts and Solutions Dr. Gabor Szentivanyi, ULX Open Source Consulting & Distribution Background Over 18 years of experience in enterprise grade open source Based in Budapest,
More informationCloud platforms T Mobile Systems Programming
Cloud platforms T-110.5130 Mobile Systems Programming Agenda 1. Motivation 2. Different types of cloud platforms 3. Popular cloud services 4. Open-source cloud 5. Cloud on this course 6. Some useful tools
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More information3. What do you mean by virtualization? What is the role of virtualization in cloud computing?
MODEL QUESTION 1. Describe about cloud based services. What are the challenges in cloud computing? 2. How grid computing differs from cloud computing? Justify what the elasticity and multitenancy properties
More informationJune 8th, 2017 Washington D.C. Security Compliance for modern infrastructures with OpenSCAP
June 8th, 2017 Washington D.C. Security Compliance for modern infrastructures with OpenSCAP Martin Preisler Software Engineer at Red Hat, Inc. mpreisle@redhat.com SECURITY COMPLIANCE configuration hardening
More informationAnalytics in the Cloud Mandate or Option?
Analytics in the Cloud Mandate or Option? Rick Lower Sr. Director of Analytics Alliances Teradata 1 The SAS & Teradata Partnership Overview Partnership began in 2007 to improving analytic performance Teradata
More informationHybrid Infrastructure Hosting Clouds + Dedicated + Colocated GoGrid / ServePath September 09
Hybrid Infrastructure Hosting Clouds + Dedicated + Colocated 2009 GoGrid / ServePath - 1 - September 09 Contents What is Cloud Computing? Benefits Cloud & Hybrid Hosting What can Clouds do for ME? When
More informationWHITEPAPER. Embracing Containers & Microservices for future-proof application modernization
WHITEPAPER Embracing Containers & Microservices for future-proof application modernization The need for application modernization: Legacy applications are typically based on a monolithic design, which
More informationECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University
ECE590-03 Enterprise Storage Architecture Fall 2017.~* CLOUD *~. Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (module 13), published by
More informationCSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance
CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance ABOUT THE BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT CLOUD
More informationDemystifying the Cloud With a Look at Hybrid Hosting and OpenStack
Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90
More informationExam C Foundations of IBM Cloud Reference Architecture V5
Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationMove Up to an OpenStack Private Cloud and Lose the Vendor Lock-in
Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Peace, commerce and honest friendship with all nations; entangling alliances with none. -Thomas Jefferson Introduction In business and
More informationEverything you need to know about cloud. For companies with people in them
Everything you need to know about cloud For companies with people in them You used to know where you stood with the word cloud. It meant those fluffy things floating above you, bringing shade and rain,
More informationClouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018
Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT
More informationCloud Security Myths Paul Mazzucco, Chief Security Officer
Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached
More informationPractical OpenSCAP Security Standard Compliance and Reporting. Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer
Practical OpenSCAP Security Standard Compliance and Reporting Robin Price II Senior Solutions Architect Martin Preisler Senior Software Engineer INTRODUCTION AGENDA Review some slides Follow along demostration
More informationDriving Cloud Governance and Avoiding Cloud Chaos
Driving Cloud Governance and Avoiding Cloud Chaos Key Take Aways What is Cloud Chaos? Why Do You Need Cloud Governance? Intro: Timothy P. McAliley timothy.mcaliley@microsoft.com Microsoft Premier Field
More informationDeveloping, Deploying and Managing Applications on the Cloud
Developing, Deploying and Managing Applications on the Cloud Jayabalan S CTO & Co-Founder September 10, 2011 Agenda 1 2 3 4 5 6 7 8 9 10 Introduction Computing Evolution IT Challenges and Importance of
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationCopyright 2012 EMC Corporation. All rights reserved. Obrigado
Copyright 20132012 EMC Corporation. EMC Corporation. All rights reserved. All rights reserved. 1 EMC FORUM 2013 2 Obrigado 3 SOFTWARE DEFINED DATA CENTER WORLD IS CHANGING RAPID CHANGE APP / INFRA INCREASED
More informationJim Reavis CEO and Founder Cloud Security Alliance December 2017
CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,
More informationFISMA COMPLIANCE FOR CONTAINERIZED APPS
FISMA COMPLIANCE FOR CONTAINERIZED APPS Using Atomic Scan and OpenSCAP with containers Jason Callaway Red Hat Principal Solutions Architect jcallawa@redhat.com @jasoncallaway jasoncallaway.com AGENDA Slides
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationBenefits of Cloud Computing
Cloud Computing Deployment Models Public Cloud Systems and services easily accessed by the general public. Less secure. Private Cloud Systems and Services accessed within an organisation. Increased security
More informationWHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction
WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More informationArchitekturen für die Cloud
Architekturen für die Cloud Eberhard Wolff Architecture & Technology Manager adesso AG 08.06.11 What is Cloud? National Institute for Standards and Technology (NIST) Definition On-demand self-service >
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationCONSIDERATIONS FOR YOUR NEXT CLOUD PROJECT CLOUDFORMS & OPENSTACK DO S AND DON TS
CONSIDERATIONS FOR YOUR NEXT CLOUD PROJECT CLOUDFORMS & OPENSTACK DO S AND DON TS FREDERIK BIJLSMA Cloud Business Unit Manager, EMEA 6th December 2013 VIRTUALIZATION TO CLOUD CONTINUUM Server Virtualization
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationContainer Deployment and Security Best Practices
Container Deployment and Security Best Practices How organizations are leveraging OpenShift, Quay, and Twistlock to deploy, manage, and secure a cloud native environment. John Morello CTO Twistlock Dirk
More informationAZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments
AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES To Secure Azure and Hybrid Cloud Environments Introduction Cloud is at the core of every successful digital transformation initiative. With cloud comes new
More informationCLOUD SECURITY CRASH COURSE
CLOUD SECURITY CRASH COURSE ADDRESSING REAL WORLD CONCERNS Joel Friedman, CTSO ABOUT ME Name: Joel Friedman Title: Chief Technology & Security Officer of Datapipe Certifications: CISSP, CISA, CISM, CRISC,
More informationRed Hat OpenShift Roadmap Q4 CY16 and H1 CY17 Releases. Lutz Lange Solution
Red Hat OpenShift Roadmap Q4 CY16 and H1 CY17 Releases Lutz Lange Solution Architect @AtomicContainer OpenShift Roadmap OpenShift Container Platform 3.2 Kubernetes 1.2 & Docker 1.9
More informationCloud Computing the VMware Perspective. Bogomil Balkansky Product Marketing
Cloud Computing the VMware Perspective Bogomil Balkansky Product Marketing Cloud Computing - the Key Questions What is it? Why do you need it? How do you build (or leverage) one (or many)? How do you operate
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationBuilding your Private Cloud with Red Hat OpenStack & Red Hat CEPH Storage from POC to Production deployment in 2 weeks
Building your Private Cloud with Red Hat OpenStack & Red Hat CEPH Storage from POC to Production deployment in 2 weeks Daniel Vaknin Cloud & Infrastructure Solutions Specialist TeraSky Date: November 16
More informationChoosing the Right Cloud. ebook
Choosing the Right Cloud ebook Contents Choosing the Right Cloud...3 The Cloud Explained: Public Cloud...4 The Cloud Explained: Private Cloud...5 Assessing Workload Characteristics...6 Right Application.
More informationOpen Hybrid Cloud & Red Hat Products Announcements
Open Hybrid Cloud & Red Hat Products Announcements FREDERIK BIJLSMA Cloud BU EMEA Red Hat 14th December 2012 PERVASIVE NEW EXPECTATIONS AGILITY. EFFICIENCY. COST SAVINGS. PUBLIC CLOUDS 2 ENTERPRISE IT
More informationPractical Guide to Cloud Computing Version 2. Read whitepaper at
Practical Guide to Cloud Computing Version 2 Read whitepaper at www.cloud-council.org/resource-hub Sept, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! 2011/2012 Deliverables
More informationMigration to Cloud Computing: Roadmap for Success
Migration to Cloud Computing: Roadmap for Success Mohammed Elazab, Professor Emeritus Higher Technological Institute, Tenth of Ramadan, Egypt President, Human and Technology Development Foundation Chairman,
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationProgramowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając
Programowanie w chmurze na platformie Java EE Wykład 1 - dr inż. Piotr Zając Cloud computing definition Cloud computing is a model for enabling ubiquitous, convenient, ondemand network access to a shared
More informationDeploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP)
Deploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP) May 16, 2016 Speakers Ron Moser, Managing Director, Moserhaus Consulting, LLC and Sr. Consultant,
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationTechnicalities of Living in the JD Edwards Cloud Cloud Options and Strategies
Technicalities of Living in the JD Edwards Cloud Cloud Options and Strategies Clayton Seeley Product Manager JD Edwards Development Copyright 2015, Oracle and/or its affiliates. All rights reserved. Safe
More informationCLOUD COMPUTING ABSTRACT
Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationCisco Unified Data Center Strategy
Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationPublic, Private, or Hybrid Cloud
White Paper Public, Private, or Hybrid Cloud www.rapidscale.net 1 Public, Private, or Hybrid Cloud When it comes to business, cloud computing is on everyone s mind. This next generation of computing technology
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More informationNEXT GENERATION CLOUD SECURITY
SESSION ID: CMI-F02 NEXT GENERATION CLOUD SECURITY Myles Hosford Head of FSI Security & Compliance Asia Amazon Web Services Agenda Introduction to Cloud Security Benefits of Cloud Security Cloud APIs &
More informationOPENSTACK Building Block for Cloud. Ng Hwee Ming Principal Technologist (Telco) APAC Office of Technology
OPENSTACK Building Block for Cloud Ng Hwee Ming Principal Technologist (Telco) APAC Office of Technology ABOUT RED HAT FROM COMMUNITY TO PRODUCT STABILIZ E INTEGRAT E PARTICIPATE INTEGRAT E STABILIZ E
More informationRED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect
RED HAT CLOUD STRATEGY (OPEN HYBRID CLOUD) Ahmed El-Rayess Solutions Architect AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to Cloud Infrastructure CLOUD TYPES AND DEPLOYMENT
More informationDistributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski Rutgers University Fall 2013 December 12, 2014 2013 Paul Krzyzanowski 1 Motivation for the Cloud Self-service configuration
More informationCloud & AWS Essentials Agenda. Introduction What is the cloud? DevOps approach Basic AWS overview. VPC EC2 and EBS S3 RDS.
Agenda Introduction What is the cloud? DevOps approach Basic AWS overview VPC EC2 and EBS S3 RDS Hands-on exercise 1 What is the cloud? Cloud computing it is a model for enabling ubiquitous, on-demand
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationRED HAT CLOUDFORMS. Chris Saunders Cloud Solutions
RED HAT CLOUDFORMS Chris Saunders Cloud Solutions Architect chrisb@redhat.com @canadianchris BUSINESS HAS CHANGED IN RESPONSE, IT OPERATIONS NEEDS TO CHANGE LINE OF BUSINESS Challenged to deliver services
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationExpert Days SUSE Manager
Expert Days 2018 SUSE Manager SUSE Manager Best-in-class open source infrastructure management solution designed to help your enterprise DevOps and IT Operations teams to: Optimize operations while reducing
More informationHybrid IT Managed Services
Hybrid IT Managed Services Working together on your digital journey Welcome to the new world of Hybrid IT Managed Services. Digital technology is rapidly changing and improving our world. As your organisation
More informationCloud platforms. T Mobile Systems Programming
Cloud platforms T-110.5130 Mobile Systems Programming Agenda 1. Motivation 2. Different types of cloud platforms 3. Popular cloud services 4. Open-source cloud 5. Cloud on this course 6. Mobile Edge Computing
More informationTransform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date
Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationCloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.
George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security
More informationWHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD
WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD 2 A CONVERSATION WITH DAVID GOULDEN Hybrid clouds are rapidly coming of age as the platforms for managing the extended computing environments of innovative
More informationLearn. Connect. Explore.
Learn. Connect. Explore. No More Storage Nightmares An Open Solution for Container Persistent Storage Learn. Connect. Explore. CONTAINERS vs VIRTUALIZATION Containers Abstracts OS Kernel Mostly Linux One
More informationAutomating Security and Compliance for Hybrid Environments
Automating Security and Compliance for Hybrid Environments Lucy Kerner Security Global Technical Evangelist and Strategist, Red Hat lkerner@redhat.com @LucyCloudBling COMMON SECURITY CHALLENGES Inconsistent
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationAn introductory look. cloud computing in education
An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With
More informationAutomating the Software-Defined Data Center with vcloud Automation Center
Automating the Software-Defined Data Center with vcloud Automation Center Alex Tanner EM Specialist SE July 2014 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business The
More informationIBM Bluemix compute capabilities IBM Corporation
IBM Bluemix compute capabilities After you complete this section, you should understand: IBM Bluemix infrastructure compute options Bare metal servers Virtual servers IBM Bluemix Container Service IBM
More informationData Protection in the AWS Cloud: Implementing GDPR and Overview of C5
Data Protection in the AWS Cloud: Implementing GDPR and Overview of C5 Gerald Boyne, Christian Hesse Security Assurance Germany 25.11.2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights
More informationCloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization
Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities
More informationJBOSS MIDDLEWARE TO THE CLOUD. MICHAEL EPLEY Sr JBoss Solutions Architect, IC Specialist 2014 June
JBOSS MIDDLEWARE TO THE CLOUD MICHAEL EPLEY Sr JBoss Solutions Architect, IC Specialist 2014 June DEMANDS ON IT TODAY MORE MORE MORE IMMEDIATE PERVASIVE AWARE INNOVATE FASTER, IN A SMARTER WAY ACCELERATE
More information