Presentation is loading. Please wait.

Presentation is loading. Please wait.

In the Cloud How to Address Security in the Cloud.

Similar presentations


Presentation on theme: "In the Cloud How to Address Security in the Cloud."— Presentation transcript:

1 In the Cloud How to Address Security in the Cloud

2 In the Cloud How to Address Security in the Cloud Panelists: Moderator – Steve Campbell, Contributing Editor HPC in the Cloud. Managing Partner Orion Marketing Yoram Baltinester, CEO, Balti Group Consulting David Chou, Technical Architect, Microsoft John Gormally, Client Relationship Manager, Citrix Matt Stamper, Vice President of Professional & Security Services, Castle Access Patrick Sweeney, Vice President, Product Management, SonicWALL Jonny Wilkinson, Director of Product Management, Websense In the Cloud

3 Security is Everywhere

4 In the Cloud Multiple Definitions of Cloud Computing 4 …but underlying characteristics remain the same “A model for enabling convenient on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” ©2010 National Institute of Standards and Technology “Consumer and business products, services and solutions delivered in real-time over the Internet..” “Outsourcing part of your IT infrastructure or workflow through a web (or web-like) interface.”

5 In the Cloud Why Cloud Adoption Gaining Momentum Intersect360 recent cloud study: Top drivers: lower $/compute cycle, reduced infrastructure costs Top barriers: Security, data movement, operational and managerial concerns, SLAs, security, exit costs, security, and security. www.intersect360.com

6 In the Cloud What’s Worrisome about the Cloud? Q. Rate the challenges/issues of Cloud model (scale: 1-5, 1=not at all concerned, 5=very concerned) % responded 3, 4, 5Source: IDC Enterprise Panel

7 In the Cloud Seven Deadly Sins Top Threats Abuse and Nefarious Use of Cloud Computing Insecure Application Programming Interfaces Malicious Insiders Shared Technology Issues Data Loss or Leverage Account or Service Hijacking Unknown Risk Profile

8 In the Cloud Information Security - Infrastructure Components of Information Security Application Level Host Level Network Level Information Security - Data Encryption, Data masking, Content protection Security Management and Monitoring Services Monitor – Health, Security event, Threat Management – VM Image, ACL, Vunerability, Patch, Configuration

9 In the Cloud Summary / Recommendations Cloud security risks are unbiased to hosting strategies Gain cost and business benefits of cloud infrastructure services without compromising security Key is managing risk in configuration, access control, network management and operational expertise Leverage security & application expertise of mature vendors – avoid configuring and maintenance cost Properly managed cloud infrastructure provides better security than many enterprises More efficient deployment of scarce expertise Look for layered defense based on security framework adapted to requirements of cloud architectures Head in the clouds, feet on the ground ‐ the business side of security in the cloud

10 In the Cloud

11 The Cloud From Theory to Practice… How to Address Security in the Cloud Moderator: Steve Campbell 09/23/10 In the Cloud Thank You


Download ppt "In the Cloud How to Address Security in the Cloud."

Similar presentations


Ads by Google