Securing the Cloud Today: How do we get there?
|
|
- Edgar Davidson
- 5 years ago
- Views:
Transcription
1 Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009
2 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services, in which the user sees only the service, and has no need to know anything about the technology or implementation Attributes Standardized, consumable web-delivered services Service Catalog Ordering Flexible pricing Metering & Billing Elastic scaling Rapid provisioning Advanced virtualization VISIBILITY CONTROL AUTOMATION...service oriented and service managed 2 9/15/2009
3 Cloud Computing Delivery Models Flexible Delivery Models Public Service provider owned and managed Access by subscription Delivers select set of standardized business process, application and/or infrastructure services on a flexible price per use basis.. Standardization, capital preservation, flexibility and time to deploy Cloud Services Cloud Computing Model Hybrid Access to client, partner network, and third party resources Private Privately owned and managed. Access limited to client and its partner network. Drives efficiency, standardization and best practices while retaining greater customization and control. Customization, efficiency, availability, resiliency, security and privacy ORGANIZATION CULTURE GOVERNANCE...service sourcing and service value 3 9/15/2009
4 End-user Survey: Perceived Concerns Please rate each in terms of how significant they would be to your organization. Across the region and globally, security of cloud services is consistently rated as the top concern that CIOs have about cloud services. HK is little different to the rest of the surveyed countries and rates the issues of Security, Performance and Ability to integrate as the top three concerns Other concerns were consistent in rating 1.00 On-demand payment model will cost more Hard to integrate with in-house IT systems Ability to customize to our org's needs Security, worried about keeping our systems & information protected Regulatory requirements Availability Performance Not enough major suppliers yet Bringing back in-house may be difficult Source: IDC Market Evolution and Trends for Cloud Computing: Asia/Pacific End-User Study, 2009, N =114
5 What is Cloud Security Confidentiality, integrity, availability of business-critical IT assets, stored or processed on a cloud computing platform Cloud Computing Software as a Service Utility Computing Grid Computing There is nothing new under the sun but there are lots of old things we don't know. Ambrose Bierce, The Devil's Dictionary 5 9/15/2009
6 Cloud Security: Simple Example Today s Data Center Tomorrow s Public Cloud We Have Control It s located at X. It s stored in server s Y, Z. We have backups in place. Our admins control access. Our uptime is sufficient. The auditors are happy. Our security team is engaged. Who Has Control Where is it located Where is it stored Who backs it up Who has access How resilient is it How do auditors observe How does our security team engage 6 9/15/2009 6
7 Security Requirement for Different Cloud Computing Models Cloud Delivered Services Application as a service Platform as a service Infrastructure as a service Multi-tenancy at all levels Cloud Platform Business Support Services Offering Mgmt, Customer Mgmt, Ordering Mgmt, Billing Operational Support Services Infrastructure Provisioning Instance, Image, Resource / Asset Mgmt Common Operational Services Virtualized Resources Virtual Network, Server, Storage System Resources Network, Server, Storage Physical System and Environment Multi-tenant security infrastructure Image Security Virtualization Security Logical Data Center Security and Resilience Physical Data Center Security and Resilience
8 Gartner summarizes cloud security threats 1. Privileged user access (Federated Identity management/authentication /authorization) 2. Regulatory compliance 3. Data location 4. Data segregation 5. Recovery (backup) 6. Investigative support (auditing/logging) 7. Long-term viability (acquisitions)
9 Security and Cloud Computing IBM Security Framework Business-oriented framework used across all IBM brands that allows to structure and discuss a client s security concerns Governance, Risk Management, Compliance 3rd-party audit (SAS 70(2), ISO27001, PCI) Client access to tenant-specific log and audit data Effective incident reporting for tenants. Application and Process Application security requirements for cloud are phrased in terms of image Compliance with secure development best practice Physical Monitoring and control of physical access People and Identity Privileged user monitoring, including logging activities, physical monitoring and background checking Federated identity / onboarding: Coordinating authentication and authorization with enterprise or third party systems Data and Information Data Segregation Client control over geographical location of data Network, Server, Endpoint Isolation between tenant domains Trusted virtual domains: Built-in intrusion detection and prevention 9 9/15/2009
10 There is No One-size-fits-all Security for Cloud Computing Different Workloads have Different Risk Profiles High Need for Security Assurance Low Training, testing with nonsensitive data Public Analysis & simulation with public data Mission-critical workloads, personal information Hybrid Low-risk Mid-risk High-risk Business Risk Private High value / high risk workloads need Quality of protection adapted to risk Direct visibility and control Significant level of assurance Today s clouds are primarily here: Lower risk workloads One-size-fits-all approach to data protection No significant assurance Price is key 10 9/15/2009
11 Thank You
Cloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationCloud offerings from IBM
Cloud offerings from IBM www.ibm.com/cloud Bjørn Roksvold roksvold@no.ibm.com Content LotusLive Development & test on the IBM Cloud CloudBurst Tivoli Live Managed backup services Cloud Security We eat
More informationIBM smarter Business Resilience in the Cloud
IBM smarter Business Resilience in the Cloud Richard Cocchiara IBM Distinquished Engineer & CTO for BCRS Member of IBM Academy of Technology 1-845-759-2043 or rmcocch@us.ibm.com 21 March 2010 1 2010 IBM
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationSecuring Your Cloud Introduction Presentation
Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today
More informationALERT LOGIC LOG MANAGER & LOG REVIEW
SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationWHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?
Why Data Domain Series WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why you should take the time to read this paper Provide data isolation by tenant (Secure logical data isolation for each tenant
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reaching breaking point App
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationWHITE PAPER. Title. Managed Services for SAS Technology
WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationWHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD
WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD 2 A CONVERSATION WITH DAVID GOULDEN Hybrid clouds are rapidly coming of age as the platforms for managing the extended computing environments of innovative
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationIBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan
IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationWELCOME ISO/IEC 27001:2017 Information Briefing
WELCOME ISO/IEC 27001:2017 Information Briefing Denis Ryan C.I.S.S.P NSAI Lead Auditor Running Order 1. Market survey 2. Why ISO 27001 3. Requirements of ISO 27001 4. Annex A 5. Registration process 6.
More informationBuilding Trust in the Era of Cloud Computing
Building Trust in the Era of Cloud Computing ICMC 2017 Conference May 17, 2017 v1.0 David Gerendas Group Product Manager TRUST A FIRM belief in the! Reliability! Truth! Ability of someone or something.
More informationPowering Transformation With Cisco
Shape Your Business For the Future: Powering Transformation With Cisco Enabling Data Center Evolution Towards Cloud Computing Yudi Wiradarma TSO Lead, PT NetApp Indonesia Agenda The Challenge Cloud infrastructure
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationChoosing the Right Cloud. ebook
Choosing the Right Cloud ebook Contents Choosing the Right Cloud...3 The Cloud Explained: Public Cloud...4 The Cloud Explained: Private Cloud...5 Assessing Workload Characteristics...6 Right Application.
More informationVirtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services
Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as
More informationIT your way - Hybrid IT FAQs
Hybrid IT IT your way - Hybrid IT FAQs Create a strategy that integrates in-house and outsourced IT services to meet ever-changing business requirements. Combine on-premise and off premise solutions Mix
More informationEMC Strategy Overview: Journey To The Private Cloud
EMC Strategy Overview: Journey To The Private Cloud Chuck Hollis VP Global Marketing CTO The Private Cloud... What is it? Why now? The Private Cloud: Why now? IT infrastructure Complex Inefficient Inflexible
More informationOktober 2018 Dell Tech. Forum München
Oktober 2018 Dell Tech. Forum München Virtustream Digital Transformation & SAP Jan Büsen Client Solutions Executive, Virtustream The Business Agenda: Digital IT = Competitive Advantage Business Driven
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationCloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationCLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016
CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016 1 ENTERPRISE IT STRATEGY DEFINED BY VARIOUS STAKEHOLDERS CIO CFO CISO Business User Become provider of choice Need easy
More informationFuture Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013
Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationTransform to Your Cloud
Transform to Your Cloud Presented by VMware 2012 VMware Inc. All rights reserved Agenda Corporate Overview Cloud Infrastructure & Management Cloud Application Platform End User Computing The Journey to
More informationCloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization
Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities
More informationWhat matters in Cyber Security
What matters in Cyber Security A CTO perspective Dr. Robert W. Griffin Chief Security Architect #RSAemeaSummit 1 What CEOs say Cyber Risk matters! Cyber rated #3 risk in survey of 588 C- and Board-level
More informationCloud Strategies for Addressing IT Challenges
Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise
More informationRSA Solution Brief. The RSA Solution for Cloud Security and Compliance
The RSA Solution for Cloud Security and Compliance The RSA Solution for Cloud Security and Compliance enables enduser organizations and service providers to orchestrate and visualize the security of their
More informationhcloud Deployment Models
hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationCopyright 2012 EMC Corporation. All rights reserved. Obrigado
Copyright 20132012 EMC Corporation. EMC Corporation. All rights reserved. All rights reserved. 1 EMC FORUM 2013 2 Obrigado 3 SOFTWARE DEFINED DATA CENTER WORLD IS CHANGING RAPID CHANGE APP / INFRA INCREASED
More informationBusiness today runs on technology. Modernize Your Datacenter. Challenges facing IT. Modernize Your Datacenter 10/17/ % Enterprise IT
Business today runs on technology 71% of surveyed internet, technology and social experts predict: In 2016, 82% of server workloads will be running in virtual environments. Total IT services spend: 45%
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationChallenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9
HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationWHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: US: HK:
WHITE PAPER HYBRID CLOUD: FLEXIBLE, SCALABLE, AND COST-EFFICIENT UK: +44 800 634 3414 US: +1 877 773 3306 HK: +852 3521 0215 CONTENTS 03 Executive Summary 07 Counting the Cost of Utilizing Big Data 04
More informationA Pragmatic Path to Compliance. Jaffa Law
A Pragmatic Path to Compliance Jaffa Law jaffalaw@hk1.ibm.com Introduction & Agenda What are the typical regulatory & corporate governance requirements? What do they imply in terms of adjusting the organization's
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationitsmf Annual Conference 2012
itsmf Annual Conference 2012 Applying ITIL to Cloud Computing Mr. HP Suen Director itsmf International Executive Board Agenda Definition of Cloud Computing On-demand self service Pool of resources Pre-production
More informationIT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.
IT Redefined Hans Timmerman CTO EMC Nederland 1 INDUSTRIES FACE STRUCTURAL CHANGE 2 More CEOs See IT As Driver Of Digital Business Innovation And Growth IT has the highest business priority in more than
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationTRANSFORMING TO IT-AS-A- SERVICE
TRANSFORMING TO IT-AS-A- SERVICE Leveraging IT To Accelerate Business Agility Paul O Doherty Cloud Solution Manager ONX Enterprise Solutions 1 Enterprise IT Provides Control & Reliability Enterprise IT
More informationNetwork Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010
Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud
More informationCisco Enterprise Cloud Suite Overview Cisco and/or its affiliates. All rights reserved.
Cisco Enterprise Cloud Suite Overview 2015 Cisco and/or its affiliates. All rights reserved. 1 CECS Components End User Service Catalog SERVICE PORTAL Orchestration and Management UCS Director Application
More informationPLATFORM AS A SERVICE (PAAS):
THEBUNKER.NET FACTSHEET PLATFORM AS A SERVICE (PAAS): Develop, run and manage applications without the associated cost and complexity of maintaining the underlying infrastructure SUMMARY Platform as a
More informationThat Set the Foundation for the Private Cloud
for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors
More informationOn Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor
On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
More informationCisco Cloud Application Centric Infrastructure
Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationCloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm
Presentation Title Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Background A career of helping companies integrate new technologies into their existing infrastructure
More informationThe Latest EMC s announcements
The Latest EMC s announcements Copyright 2014 EMC Corporation. All rights reserved. 1 TODAY S BUSINESS CHALLENGES Cut Operational Costs & Legacy More Than Ever React Faster To Find New Growth Balance Risk
More informationThe IBM Platform Computing HPC Cloud Service. Solution Overview
The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance
More informationLEAD YOUR CLOUD TRANSFORMATION. Copyright 2013 EMC Corporation. All rights reserved.
LEAD YOUR CLOUD TRANSFORMATION 1 The Business Drivers Increase Revenue INCREASE AGILITY Lower Operational Costs Reduce Risk 2 CLOUD TRANSFORMS IT Lower Operational Costs 3 Cloud Transforms IT Days/Months
More informationIntroduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview
IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential
More informationSecurity & Compliance in the AWS Cloud. Amazon Web Services
Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any
More informationAnalytics in the Cloud Mandate or Option?
Analytics in the Cloud Mandate or Option? Rick Lower Sr. Director of Analytics Alliances Teradata 1 The SAS & Teradata Partnership Overview Partnership began in 2007 to improving analytic performance Teradata
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding
More informationEnterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours.
Enterprise Private Cloud Fully managed private cloud as a service in your data centre or ours. Introduction With the proliferation of applications over a multitude of platforms, demand for high-availability
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationSafeNet HSM solutions for secure virtual amd physical environments. Marko Bobinac SafeNet PreSales Engineer
SafeNet HSM solutions for secure virtual amd physical environments Marko Bobinac SafeNet PreSales Engineer Root of trust for your physical and virtual environment 2 But HW doesn t work in a Virtual World?
More informationBest Practices for Managing Data Centres
Best Practices for Managing Data Centres David Cuthbertson Square Mile Systems david.cuthbertson@squaremilesystems.com www.squaremilesystems.com Tel 0870 950 4651 Mob 07717 883177 Best Practices? Guidelines?
More informationAnything-as-a-Service. Mike Pilbeam Director of Presales UKI
Anything-as-a-Service Mike Pilbeam Director of Presales UKI 1 The Business Drivers RESPOND FASTER TO DRIVE NEW REVENUE REFOCUS RESOURCES TOWARD BUSINESS VALUE INCREASE AGILITY INCREASE VISIBILITY & CONTROL
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationBUSINESS CONTINUITY MANAGEMENT
BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory
More informationPractical Guide to Cloud Computing Version 2. Read whitepaper at
Practical Guide to Cloud Computing Version 2 Read whitepaper at www.cloud-council.org/resource-hub Sept, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards! 2011/2012 Deliverables
More informationBUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite
BUILDING A PATH TO MODERN DATACENTER OPERATIONS Virtualize faster with Red Hat Virtualization Suite TABLE OF CONTENTS Modernize your IT with virtualization....page 2 Red Hat Virtualization Suite overview....page
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationCloud Computing Overview. The Business and Technology Impact. October 2013
Cloud Computing Overview The Business and Technology Impact October 2013 Cloud Computing offers new types of IT services and models On-demand self-service Rapid elasticity Pay per use Increase Agility
More informationWatson Developer Cloud Security Overview
Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for
More informationTaking your next integration or BPM project to the cloud WebSphere Integration User Group, 12 July 2012 IBM Hursley
Mark Tomlinson CTO, Cloud Computing, IBM UK & Ireland Taking your next integration or BPM project to the cloud WebSphere Integration User Group, 12 July 2012 IBM Hursley Today s organizations strive to
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationSecurity & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web
Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
MGT1761BU Swisscom Modernizes Its Cloud for Enterprises with VMware Our Cloud Journey 2013 - Present Stephan Massalt, VP Cloud Swisscom Cloud Lab Ltd. Paul Kennedy, Chief Functional Architect vrealize
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationAWS Security. Stephen E. Schmidt, Directeur de la Sécurité
AWS Security Stephen E. Schmidt, Directeur de la Sécurité 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express
More informationTechValidate Survey Report: SaaS Application Trends and Challenges
TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.
More informationThe Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies
The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies Daniel Yeung Technical Manager, Hong Kong & Taiwan AUG 2017 2017 Citrix Why Worry? Security needs to be top-of-mind
More information