Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
|
|
- Roland Lynch
- 6 years ago
- Views:
Transcription
1 Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
2 Why Are We Here? Expanded Enterprise Data access anywhere, anytime Traditional IT perimeters have disappeared New technologies = New complexities = New opportunities Cloud Computing A new frontier New insecurities Stringent regulatory compliance 8-Step Journey to a Secure and Compliant Cloud Determine technology requirements Determine security requirements Determine policy requirements 3
3 Cloud Insecurity Uptime Seamlessly scalable Shared resources Logical separation Location agnostic Co-located rivals 4 The cloud is a magnet for hackers!
4 The Cloud Paradigm You see: Hosted applications You don t see: Virtualization Elastic workload Chargeback / billing Audit and log monitoring Continuous compliance Data(base) tenancy High availability 5
5 Security Tops Cloud Concerns Q: Rate the challenges/issues of the cloud /on-demand model (Scale: 1 = Not at all concerned; 5 = Very concerned) Security Availability Performance On-demand payment model may cost more Lack of interoperability standards Bringing back in-house may be difficult Hard to integrate with in-house IT 87.5% 83.3% 82.9% 81.0% 80.2% 79.8% 76.8% Not enough ability to customize 76.0% (% responding 3, 4, or 5) Source: IDC exchange, New IDC IT Cloud Services Survey: Top Benefits and Challenges, ( December
6 What is the Biggest Barrier to Adoption of Cloud Services? 497 responses 7 Source: Tech Target: Cloud Computing Readership Survey, 2009
7 Cloud Architectures and Models ESSENTIAL CHARACTERISTICS Broad Network Access Rapid Elasticity Measured Service On-Demand Self-Service Resource Pooling ARCHITECTURES Softwareas-a-Service (SaaS) Platformas-a-Service (PaaS) Infrastructureas-a-Service (IaaS) DEPLOYMENT MODELS Public Private Hybrid Community 8
8 Bridging Security Requirements to the Cloud Traditional IT Dedicated compute, storage and network infrastructure Defined locations for data storage and backup Proprietary security controls and policies Compliance standards designed for traditional IT Cloud Computing Complex, shared deployment models Varying data location Security controls and policies defined by service provider Interpretation of compliance standards 9
9 An Eight-Step Journey to a Secure Cloud 1 Determine your application s suitability for the cloud Payment Processing Corporate Systems ERP CRM Company Web Site Test and Development e-commerce 10
10 An Eight-Step Journey to a Secure Cloud 2 Classify your data Financial Newsfeeds/Blogs Marketing Customer Records Government Healthcare/PHI EU Citizens 11
11 An Eight-Step Journey to a Secure Cloud 3 Classify your cloud type (Think about applications) Software-as-a-Service (SaaS) Infrastructure-as-a-Service (IaaS) Platform-as-a-Service (PaaS) 12
12 An Eight-Step Journey to a Secure Cloud 4 Select a delivery model (Think about data classification) Private: Public: Hybrid: Self-managed Outsourced Commodity Enterprise Private + Public Private + Exchange Private + Customer Cloud bursting Public Hybrid Private 13
13 Security An Eight-Step Journey to a Secure Cloud 5 Specify platform architecture Compute Storage and backup Network and routing System Device Drivers API/ System Call Cloud Automation Application Customer Application VPDC Cloud OS (ex. IaaS) Customer Application VPDC Virtualization vs. dedicated Compute Network Storage Data Center Ethernet Fabric 14
14 Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Security at the Different Layers Applications Layer Presentation Modality Presentation Platform End Users APIs Applications Management Layer Business Owners Data Metadata Content Integration and Middleware APIs Infrastructure Layer Core Connectivity and Delivery Abstraction IT Administrators Hardware Facilities 15 Source: Cloud Security Alliance specification, 2009
15 An Eight-Step Journey to a Secure Cloud 6 Specify security controls Firewall Intrusion detection/prevention Log management Application protection Database protection Identity and access management Vulnerability scanning 16
16 An Eight-Step Journey to a Secure Cloud 7 Determine policy requirements Policy Creation and Enforcement What are my service provider s policies? Can I specify my own? How do they handle critical events? Policy Bursting If I choose a cloud-bursting model, will my policies burst along with my VMs? Policy Migration If I contract for cloud-based DR, will my polices migrate with my VMs? 17
17 Compliance is a Journey It s Reporting, But It s Also About Managing Risk Drive to Compliance Assurance Manual Processes Spreadsheet driven compliance Manually collected audit logs Achieve Continuous Compliance Compliance Assurance Robust methods for compliance reporting Automated certification and log collection Continuous Compliance Full visibility to IT risks No infrastructure holes or silos Identity and security integration Compatibility with IT GRC management for big picture view 18
18 An Eight-Step Journey to a Secure Cloud 8 Determine service provider requirements Delivery-model integration Automation Scalability Monitoring SLAs Services Security controls Stability Terms Compliance 19
19 Journey to The Cloud Key Considerations Determine service provider requirements Determine policy requirements Specify security controls Specify platform architecture Select delivery model Determine type of cloud Classify data Understand your application s applicability to the cloud 20
20 Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Mapping the Model to the Metal Cloud Model Presentation Modality APIs Presentation Platform Security Control Model Applications Data Metadata Content Application Information Compliance Model Integration and Middleware Management PCI APIs SOX Core Connectivity and Delivery Network GLBA Abstraction Trust HIPPA Hardware Storage Facilities Physical 21 Source: Cloud Security Alliance specification, 2009
21
22 Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners Savvis, Inc. All rights reserved. Savvis is the registered trademark of Savvis Communications Corporation.
SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud
SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud Joachim Werner Senior Product Manager joe@suse.com Jeff Lindholm Sales Engineer Jlindholm@suse.com SUSE and Linux Workloads
More informationSUSE OpenStack Cloud. Enabling your SoftwareDefined Data Center. SUSE Expert Days. Nyers Gábor Trainer &
SUSE OpenStack Cloud Enabling your SoftwareDefined Data Center SUSE Expert Days Nyers Gábor Trainer & Consultant @Trebut gnyers@trebut.com The Journey to the SDDC Physical to Virtual to Cloud One application
More informationDocker Networking In OpenStack What you need to know now. Fawad Khaliq
Docker Networking In OpenStack What you need to know now Fawad Khaliq About Me OpenStack Community Member Developer in Neutron Maintainer of PLUMgrid Neutron Plugin (networking-plumgrid) How to contact
More informationManaging Linux Servers Comparing SUSE Manager and ZENworks Configuration Management
Managing Linux Servers Comparing SUSE Manager and ZENworks Configuration Management Product Support As of September 30,2012, Novell no longer offers general support and will only provide limited updates
More informationHow To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger
How To Make Databases on SUSE Linux Enterprise Server Highly Available Mike Friesenegger SUSE Sales Engineer mikef@suse.com Agenda Clarify the term "Availability" What is High Availability Minimize a Database
More informationProvisioning with SUSE Enterprise Storage. Nyers Gábor Trainer &
Provisioning with SUSE Enterprise Storage Nyers Gábor Trainer & Consultant @Trebut gnyers@trebut.com Managing storage growth and costs of the software-defined datacenter PRESENT Easily scale and manage
More informationUsing Crowbar to Deploy Your OpenStack Cloud. Adam Spiers Vincent Untz John H Terpstra
Using Crowbar to Deploy Your OpenStack Cloud Adam Spiers Vincent Untz John H Terpstra Clouds don t come with an auto-pilot 2 IT Problem: Scale Explosion Mainframe 1980 3 Client / Server 1990 Datacenter
More informationIntroduction to Software Defined Infrastructure SUSE Linux Enterprise 15
Introduction to Software Defined Infrastructure SUSE Linux Enterprise 15 Matthias G. Eckermann Director Product Management SUSE Linux Enterprise Helsinki, 2018-03-08 SUSE Software-defined Infrastructure
More informationSUSE Manager in Large Scale 17220
SUSE Manager in Large Scale 17220 Don Vosburg Alejandro Bonilla Sales Engineer dvosburg@suse.com Sales Engineer abonilla@suse.com Geeko comes to SHARE Agenda What is SUSE Manager? What can I do with it
More informationLinux and z Systems in the Datacenter Berthold Gunreben
Linux and z Systems in the Datacenter Berthold Gunreben Build Service Engineer SUSE Linux Available Architectures for SUSE Linux Enterprise Server X86, z Systems, Power Common Source Code for all architectures
More informationSUSE Linux Enterprise Kernel Back to the Future
SUSE Enterprise Kernel Back to the Future Olaf Kirch Director Server Engineering okir@suse.com Agenda SUSE Enterprise Service Packs What makes a SUSE Enterprise kernel an enterprise kernel? Bringing you
More informationUsing Linux Containers as a Virtualization Option
Using Linux Containers as a Virtualization Option Michal Svec Product Manager msvec@suse.com Mike Friesenegger Sales Engineer mfriesenegger@suse.com 2 Containers Linux Containers Virtualization OS Level
More informationCloud in a box. Fully automated installation of SUSE Openstack Cloud 5 on Dell VRTX. Lars Everbrand. Software Developer
Cloud in a box Fully automated installation of SUSE Openstack Cloud 5 on Dell VRTX Lars Everbrand Software Developer lars.everbrand@ericsson.com 2 From 3 To Introduction Disclaimer All views expressed
More informationExpert Days SUSE Enterprise Storage
Expert Days 2018 SUSE Enterprise Storage SUSE Enterprise Storage An intelligent software-defined storage solution, powered by Ceph technology, that enables IT to transform their enterprise storage infrastructure
More informationBest practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich
Best practices with SUSE Linux Enterprise Server Starter System and extentions Ihno Krumreich Project Manager for Linux on System z Ihno@SUSE.de SHARE Atlanta 2012 Session 10728 Reasoning Requirements
More informationNovell SLES 10/Xen. Roadmap Presentation. Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com.
Novell SLES 10/Xen Roadmap Presentation Clyde R. Griffin Manager, Xen Virtualization Novell, Inc. cgriffin at novell.com September 8, 2006 SUSE Linux Enterprise Server 10 SLES 10 w/xen 3.0.2 is now available
More informationSUSE Manager and Salt
SUSE Manager and Salt The Three Cs of the IT Transformation Challenge Transform your approach to infrastructure to enable the business to capitalize on new innovations of data Cost Complexity Compliance
More informationWelcome to SUSE Expert Days 2017 Service Delivery with DevOps
Welcome to SUSE Expert Days 2017 Service Delivery with DevOps Changing Application Service Delivery with DevOps 2 Key Components for DevOps Success Good habits and people Development done now Automate
More informationCloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationEssentials. Johannes Meixner. about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR)
Essentials about Disaster Recovery (abbreviated DR) with Relax-and-Recover (abbreviated ReaR) Johannes Meixner Why DR with ReaR matters Relax-and-Recover is currently used in particular
More informationDefine Your Future with SUSE
Define Your Future with SUSE SUSE Linux Enterprise and more Bo Jin Sales Engineer bo.jin@suse.com SUSE auf einen Blick 25+ +8% Jahre Erfahrung in der Open-SourceEntwicklung SUSE-Wachstum vgl. mit anderen
More informationOpen Enterprise & Open Community
Open Enterprise & Open Community Working Together Richard Brown opensuse Chairman SUSE Linux GmbH Andrew Wafaa Principal Engineer, Open Source ARM Ltd Stephan Kulow opensuse Release Manager SUSE Linux
More informationSaltStack and SUSE Systems and Configuration Management that Scales and is Easy to Extend
SaltStack and SUSE Systems and Configuration Management that Scales and is Easy to Extend Joachim Werner Senior Product Manager SUSE Linux GmbH Bogdan Maryniuk Software Engineer SUSE Linux GmbH joe@suse.com
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationLinux High Availability on IBM z Systems
Linux High Availability on IBM z Systems An Overview Kristoffer Gronlund Berthold Gunreben High Availability Engineer SUSE Build Service Engineer SUSE Outline 2 Highly Available Hardware Introduction to
More informationSUSE Linux Enterprise High Availability Extension
A Xen Cluster Success Story Using the SUSE Linux Enterprise High Availability Extension Mark Robinson Director, MrLinux mark@mrlinux.co.uk Case Study: R M Donaldson APC High Power Partner My first commercial
More informationNovell Infiniband and XEN
Novell Infiniband and XEN XEN-IB project status Patrick Mullaney November 22, 2006 Infiniband and XEN Background Client requirements: > Guest OS access to Infiniband fabric > Initial approach:» L3 based
More informationBuild with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study
Build with SUSE Studio, Deploy with SUSE Linux Enterprise Point of Service and Manage with SUSE Manager Case Study Vladimir Botka Joachim Plack Anthony Tortola Product Manager vbotka@suse.com Senior Project
More informationBOV89296 SUSE Best Practices Sharing Expertise, Experience and Knowledge. Christoph Wickert Technical Writer SUSE /
BOV89296 SUSE Best Practices Sharing Expertise, Experience and Knowledge Christoph Wickert Technical Writer SUSE / cwickert@suse.com AGENDA The SUSE Documentation Team SUSE Best Practices Open Source Tools
More informationA guide for IT professionals. implementing the hybrid cloud
A guide for IT professionals implementing the hybrid cloud A guide for IT professionals implementing the hybrid cloud Cloud technology is maturing and advancing rapidly. And for schools today, hybrid cloud
More information2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE
Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationThe Business of Security in the Cloud
The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing
More informationThe Challenge of Cloud Security
The Challenge of Cloud Security Dr. Ray Klump Chair, Mathematics & Computer Science Director, MS in Information Security Lewis University Poll Question #1: What type of cloud service are you
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationToo Many Metas A high level look at building a metadata desktop. Joe Shaw
Too Many Metas A high level look at building a metadata desktop Joe Shaw joe@ximian.com Overview About me Dashboard Beagle desktop search Metadata solution -- what's the problem? A few statements (facts?)
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationBusiness Technology Briefing: Fear of Flying, And How You Can Overcome It
Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May
More informationCloud Computing Private Cloud
Cloud Computing Private Cloud Amplifying Business Value thru IT Ivo Sladoljev, Territory Manager, Adriatic Region December, 2010. 2010 VMware Inc. All rights reserved Agenda Company Facts VMware Focus
More informationSoftware Defined. All The Way with OpenStack. T. R. Bosworth Senior Product Manager SUSE OpenStack Cloud
Software Defined All The Way with OpenStack T. R. Bosworth Senior Product Manager SUSE OpenStack Cloud Mark Darnell Senior Product Manager SUSE OpenStack Cloud Why Bother with Software Defined Infrastructure?
More informationExploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare Jo De Baer Technology Specialist Novell -
Exploring the High Availability Storage Infrastructure. Tutorial 323 Brainshare 2007 Jo De Baer Technology Specialist Novell - jdebaer@novell.com Agenda The High Availability Storage Infrastructure very
More informationMigrating Applications to the Cloud
Migrating Applications to the Cloud Mr. John Hale Chief, DISA Cloud Services May, 2018 1 Disclaimer The information provided in this briefing is for general information purposes only. It does not constitute
More informationINTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE
INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE INTRODUCTION AGENDA 01. Overview of Cloud Services 02. Cloud Computing Compliance Framework 03. Cloud Adoption and Enhancing
More informationManaging SaaS risks for cloud customers
Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost
More informationProtect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt
Protect your server with SELinux on SUSE Linux Enterprise Server 11 SP Sander van Vugt Instructor, Consultant and Author Sandervanvugt.nl About Sander van Vugt Trainer, consultant and author Doing much
More informationCLOUD COMPUTING READINESS CHECKLIST
CLOUD COMPUTING READINESS DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO DAVE WILLIS STEPHEN GOLDSMITH SUBJECT MATTER EXPERTS, CLOUD COMPUTING DENOVO 1 CONTENTS INTRODUCTION
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationExploring History with Hawk
Exploring History with Hawk An Introduction to Cluster Forensics Kristoffer Grönlund High Availability Software Developer kgronlund@suse.com This tutorial High Availability in 5 minutes Introduction to
More informationCopyright 2011, Oracle and/or its affiliates. All rights reserved.
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationSecuring the Cloud Today: How do we get there?
Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationCLOUD SECURITY CRASH COURSE
CLOUD SECURITY CRASH COURSE ADDRESSING REAL WORLD CONCERNS Joel Friedman, CTSO ABOUT ME Name: Joel Friedman Title: Chief Technology & Security Officer of Datapipe Certifications: CISSP, CISA, CISM, CRISC,
More informationDeveloping, Deploying and Managing Applications on the Cloud
Developing, Deploying and Managing Applications on the Cloud Jayabalan S CTO & Co-Founder September 10, 2011 Agenda 1 2 3 4 5 6 7 8 9 10 Introduction Computing Evolution IT Challenges and Importance of
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationhcloud Deployment Models
hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes
More informationJourney to the Cloud. Jeff Hoehing, Principal Consultant
Journey to the Cloud Jeff Hoehing, Principal Consultant Agenda! Industry/Business Trends! Cloud and DR in the Cloud! Verizon Terremark Overview! Q&A The World in which we Operate has Changed Consumerization
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationCopyright 2011 EMC Corporation. All rights reserved.
1 2 How risky is the Cloud? 3 Is Cloud worth it? YES! 4 Cloud adds the concept of Supply Chain 5 Cloud Computing Definition National Institute of Standards and Technology (NIST Special Publication 800-145
More informationEMC Strategy Overview: Journey To The Private Cloud
EMC Strategy Overview: Journey To The Private Cloud Chuck Hollis VP Global Marketing CTO The Private Cloud... What is it? Why now? The Private Cloud: Why now? IT infrastructure Complex Inefficient Inflexible
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationTRANSFORMING TO IT-AS-A- SERVICE
TRANSFORMING TO IT-AS-A- SERVICE Leveraging IT To Accelerate Business Agility Paul O Doherty Cloud Solution Manager ONX Enterprise Solutions 1 Enterprise IT Provides Control & Reliability Enterprise IT
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationFundamental Concepts and Models
Fundamental Concepts and Models 1 Contents 1. Roles and Boundaries 2. Cloud Delivery Models 3. Cloud Deployment Models 2 1. Roles and Boundaries Could provider The organization that provides the cloud
More informationGaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009
Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009 Dale Olds Novell Distinguished Engineer dolds@novell.com Overview 2 Problems with identity management today It's
More informationFuture Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013
Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013
More informationPUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS
PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS Jane R. Circle Manager, Red Hat Global Cloud Provider Program and Cloud Access Program June 28, 2016 WHAT WE'LL DISCUSS TODAY Hybrid clouds and multi-cloud
More informationWith K5 you can. Do incredible things with Fujitsu Cloud Service K5
With K5 you can Do incredible things with Fujitsu Cloud Service K5 Making incredible possible Digital is changing everything. According to a Fujitsu survey, customers and employees think it s vital for
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationSoftware Defined Storage for the Evolving Data Center
Software Defined Storage for the Evolving Data Center Petter Sveum Information Availability Solution Lead EMEA Technology Practice ATTENTION Forward-looking Statements: Any forward-looking indication of
More informationBuilding Trust in the Era of Cloud Computing
Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.
More informationECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University
ECE590-03 Enterprise Storage Architecture Fall 2017.~* CLOUD *~. Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (module 13), published by
More informationAuditing the Cloud. Paul Engle CISA, CIA
Auditing the Cloud Paul Engle CISA, CIA About the Speaker Paul Engle CISA, CIA o Fifteen years performing internal audit, IT internal audit, and consulting projects o Internal audit clients include ADP,
More informationEnabling Hybrid Cloud Transformation
Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary
More informationSaving Real Storage with xip2fs and DCSS. Ihno Krumreich Project Manager for SLES on System z
Saving Real Storage with xip2fs and DCSS Ihno Krumreich Project Manager for SLES on System z ihno@suse.de Agenda Overview DCSS What is DCSS? xip2fs What is xip2fs? DCSS How to create? Maintenance Problems
More informationNetwork Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010
Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud
More informationIT Attestation in the Cloud Era
IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction
More informationHow to avoid storms in the cloud. The Australian experience and global trends
How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations
More informationSecure Authentication
Secure Authentication Two Factor Authentication LDAP Based SSH Keys Mark Gardner UMB Financial Corporation Noor Kreadly Federal Reserve Bank of Kansas City Prerequisites 2 Software Used edirectory 9.0
More informationTHE DATA CENTER AS A COMPUTER
THE DATA CENTER AS A COMPUTER Cloud Computing November- 2013 FIB-UPC Master MEI CLOUD COMPUTING It s here to stay CONTENT 1. How do we get here? 2. What is Cloud Computing? 3. Definitons and types 4. Case
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationCLOUD COMPUTING ABSTRACT
Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationCLOUD COMPUTING-ISSUES AND CHALLENGES
CLOUD COMPUTING-ISSUES AND CHALLENGES Asstt. Prof.Vandana S.D.S.P.Memorial College for Women, Rayya (India) ABSTRACT Cloud computing is a multifaceted technological paradigm that is outgrowth of decades
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationSDS Heterogeneous OS Access. Technical Strategist
SDS Heterogeneous OS Access Alejandro Bonilla Technical Strategist abonilla@suse.com Agenda Introduction to Ceph Architecture RADOS Block Device (RBD) iscsi overview Exposing Ceph RBDs via iscsi 2 LIO
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationCisco Unified Data Center Strategy
Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationPart III: Evaluating the Business Value of the Hybrid Cloud
Contents at a Glance Introduction... 1 Part I: Understanding Concepts and Construction... 7 Chapter 1: Discovering the Fundamentals of Your Computing Environment...9 Chapter 2: The Hybrid Cloud Continuum...25
More information10 Considerations for a Cloud Procurement. March 2017
10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More information