Presentation is loading. Please wait.

Presentation is loading. Please wait.

SECURING THE CLOUD IN A REGULATED WORLD www.onlinetech.comCopyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Indianapolis Data.

Similar presentations


Presentation on theme: "SECURING THE CLOUD IN A REGULATED WORLD www.onlinetech.comCopyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Indianapolis Data."— Presentation transcript:

1 SECURING THE CLOUD IN A REGULATED WORLD Online Tech. All rights reserved. CONFIDENTIAL Indianapolis Data Connectors Thursday, August 21, 2014

2 Online Tech. All rights reserved. CONFIDENTIAL WHO NEEDS CLOUD SECURITY?

3 Online Tech. All rights reserved. CONFIDENTIAL CLOUD TIPPING POINT SURPASSED

4 Online Tech. All rights reserved. CONFIDENTIAL DATA BREACHES 30% INCREASE IN THE NUMBER OF DATA BREACHES VS 2012 Identity Theft Research Center (http://www.idtheftcenter.org/)

5 Online Tech. All rights reserved. CONFIDENTIAL AVERAGE BREACH COST Ponemon Institute: 2013 Cost of Data Breach Study

6 Online Tech. All rights reserved. CONFIDENTIAL Continuous Compliance Defense-in-depth Security Enterprise-Class Data Protection SECURE CLOUD STRATEGIES

7 Online Tech. All rights reserved. CONFIDENTIAL CONTINUOUS COMPLIANCE Culture of continuous compliance Auditor partnership Super-Audit Transparency Goal: Easing compliance burden for ourselves and clients in regulated spaces

8 Online Tech. All rights reserved. CONFIDENTIAL POLL: WORST SECURITY THREAT? People Process Technology

9 Online Tech. All rights reserved. CONFIDENTIAL POLL: WORST SECURITY THREAT? People Process Technology ALL OF THE ABOVE

10 Online Tech. All rights reserved. CONFIDENTIAL HOLISTIC APPROACH TO SECURITY peopletechnology process

11 Online Tech. All rights reserved. CONFIDENTIAL HOLISTIC APPROACH TO SECURITY

12 Online Tech. All rights reserved. CONFIDENTIAL SECURITY: PEOPLE Train staff Train business associates

13 Online Tech. All rights reserved. CONFIDENTIAL SECURITY: PROCESS

14 Online Tech. All rights reserved. CONFIDENTIAL SECURITY: TECHNOLOGY

15 Online Tech. All rights reserved. CONFIDENTIAL HOLISTIC SECURITY

16 Online Tech. All rights reserved. CONFIDENTIAL SECURITY SAVINGS PER RECORD Ponemon Institute: 2013 Cost of Data Breach Study

17 Online Tech. All rights reserved. CONFIDENTIAL Establish & document your priorities – Isolation – Uptime – Performance – Scalability – Price THE RIGHT CLOUD FOR YOU #1. K NOW THYSELF

18 Online Tech. All rights reserved. CONFIDENTIAL Assess your tolerance for loss – What apps & data can you afford to lose? – How much $ does your business lose each hour or day your cloud is down? – Does your backup plan match your risk tolerance? Be honest! – Backing up your cloud onsite vs offsite – how soon can you begin recovery efforts? THE RIGHT CLOUD FOR YOU #2. W HAT ARE YOU WILLING TO LOSE ?

19 Online Tech. All rights reserved. CONFIDENTIAL – What critical business MUST be met? Performance? Encryption? Backup? Do they work together? Test those dependencies! THE RIGHT CLOUD FOR YOU #3. C AN YOUR CLOUD PLAY NICE ?

20 Online Tech. All rights reserved. CONFIDENTIAL SAMPLE CLOUD ARCHITECTURES M ULTI - TENANT C LOUD Use Cases Designed for % uptime Designed for live maintenance Disaster recovery Light to medium SaaS and E- Commerce Web servers Application servers –Including custom apps Light to medium density servers for SMB’s Light to medium density databases

21 Online Tech. All rights reserved. CONFIDENTIAL D EDICATED C LOUD SAMPLE CLOUD ARCHITECTURES Use Cases Mid performance solution optimized for isolation Isolation conscious businesses looking to adopt cloud Designed for 99.99% uptime Designed for near-live maintenance Application Servers Web servers File Servers Light to medium density servers for SMB’s Light to medium density databases

22 Online Tech. All rights reserved. CONFIDENTIAL V IRTUAL P RIVATE C LOUD SAMPLE CLOUD ARCHITECTURES Use Cases Ideal for Performance/elastic conscious businesses looking to cloud Designed for % uptime Designed for live maintenance Medium to high density SaaS and E-Commerce Web servers Application servers –Including custom apps Medium to high density servers for SMB’s Medium to high density databases

23 Online Tech. All rights reserved. CONFIDENTIAL V IRTUAL D ATA - CENTER - IN - A - BOX SAMPLE CLOUD ARCHITECTURES Use Cases High performance solution optimized for flexibility Designed for % uptime Designed for live maintenance Disaster recovery Web servers Application servers –Including custom apps High to extreme SaaS and E- Commerce High to extreme density servers for Enterprise High to extreme density databases –Including Oracle

24 Online Tech. All rights reserved. CONFIDENTIAL LASTLY

25 Online Tech. All rights reserved. CONFIDENTIAL Mike Klein CONTACT INFO:


Download ppt "SECURING THE CLOUD IN A REGULATED WORLD www.onlinetech.comCopyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Indianapolis Data."

Similar presentations


Ads by Google