Cloud Security & Compliance Kenneth Le ISM 158 Spring 2010 Pankaj Mehra.

Slides:



Advertisements
Similar presentations
A Flexible Cloud-Computing Platform Focus on solving business problems
Advertisements

Innovating Since 1998 Direct EDJE, we make A World of Difference Direct Response Order Management Software A Proven Solution Since.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Martin Bacon – Managing Director.
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the.
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
EarthLink Business IT Services. EarthLink Business IT Services Comprehensive IT and network services portfolio −Data center, virtualization, security,
Backup as a Service and Disaster Recovery as a Service Providing backup and disaster recovery for virtual servers.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Security Controls – What Works
Terremark Channel Partner Training Tuesday, September 14, :00 pm – 4:00 pm 12:00 – 12:15pmWelcome & Terremark OverviewJean O’Neill 12:15 – 12:45pmColocationBen.
Frontier Continuity Services Protecting Your Data with Our Cloud.
EarthLink Business IT Services. EarthLink Business IT Services Snapshot Comprehensive IT services portfolio −Data center, virtualization, IT security,
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 9. Preventing and Responding to Computer Fraud IT Security Ranked #2 Preventing and Responding.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Buying factors – HP.
 Cloud Computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.  Your software applications.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
5 Opportunities to Deliver Business Value with VMware vCloud ® Air ™
IT Security and Innovation. IT Security Regulatory compliance and ISO27001 –Public Service Network Code of Connection (PSN CoCo) –Payment Card Industry.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
Magellan: Experiences from a Science Cloud Lavanya Ramakrishnan.
Cloud Security & Compliance Presented by: Matt Stamper, CISA VP of Professional & Security Services
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Kenneth Le ISM158 Spring 2010 Pankaj Mehra.  Remote access to full desktop environments from anywhere, anytime  Flexible hardware combinations  Centralized.
Cloud Interoperability & Standards. Scalability and Fault Tolerance Fault tolerance is the property that enables a system to continue operating properly.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Kona Security Solutions - Overview
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
George Yauneridge. Overview  Basic Security  Selecting a Provider  Cloud Computing Security Threats  Cloud Computing Security Practices  Conclusion.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
Web Werks Data Center achieves PCI DSS Certification.
Microsoft Dynamics NAV Dynamics NAV 2016 one Azure SQL Dmitry Chadayev Microsoft.
DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.
Corporate Concerns on Cloud Services Environment กษิภัท ธนิตธนาคุณ คอลัมนิสต์ “IT Auditing” นิตยสาร ELEADER กรรมการผู้จัดการ บริษัท เคที ไอที โซลูชั่น.
: Target Audience: Small Business: Size: 1-50 employees Roles: Business Decision Makers Business Owner Non-IT Office Manager, IT Manager Outsourced IT.
Semester :- fourth– sem (4th) Branch :- Computer’s Roll-no :-
Understanding The Cloud
Avenues International Inc.
Azure Infrastructure for SAP®
Breakthrough Cloud Hosting
Cloud Firewall.
Office 365 Security Assessment Workshop
Business Continuity Robert Hedblom | sumNERV John Joyner | ClearPointe
Data Center Firewall.
Vulnerability Scanning at Notre Dame
CompTIA Security+ Study Guide (SY0-401)
PBA.
Governance, Risk & Compliance Using ISO 27001, ISO & ISO 22301
Data Center Colocation Services.
Microsoft Azure PaaS Helps Deliver a Scalable and Secure cIAM Platform to Global Customers “As a cloud-based cIAM platform, it is critical we deliver a.
Contact Center Security Strategies
Data Center Colocation Services.
Cloud Consulting Services and Solutions
Working With Cloud - 3.
Computer Science and Engineering
Migrating Your Data to the Cloud? Location Matters
Procurement & Contract Management Solution on Azure Helps to Boost Business Performance “Microsoft Azure gives us the cloud infrastructure to quickly and.
Presentation transcript:

Cloud Security & Compliance Kenneth Le ISM 158 Spring 2010 Pankaj Mehra

Scenario LOGiQ 3 ‘s Needs:  IT infrastructure (IaaS)  Implementation within 4 months  Scalable solution for unpredictable workloads  Special concerns:  Tight security and compliance to handle sensitive data BlueLock Solution:  No upfront costs or lengthy contract agreements  Vmware-based cloud hosting solution  Security solution  SAS 70 type II certified  99.99% uptime guarantee  Geo-graphically diverse data centers for failover and disaster recovery

Security Concerns  Data location  Data protection  Application security  Availability  Identity management  Geo-graphically diverse data centers  Application firewall  99.99% uptime guarantee  Security event manager  Monitor event logs  Traffic manager Security Solutions

Regulations Compliance  PCI DSS  SAS 70 Type II  ISO 27001

References  Horwitt, Elisabeth. "Cloud Security: Try These Techniques Now - Computerworld." Computerworld - IT News, Features, Blogs, Tech Reviews, Career Advice. Web. 13 May _Try_these_techniques_now?taxonomyId=158&pageNumber=1  Wood, Lamont. "Cloud Computing and Compliance: Be Careful up There - Computerworld." Computerworld - IT News, Features, Blogs, Tech Reviews, Career Advice. Web. 13 May ting_and_compliance_Be_careful_up_there_?taxonomyId=154&pa geNumber=1  Brodkin, Jon. "Gartner: Seven Cloud-computing Security Risks | Security Central - InfoWorld." Business Technology, IT News, Product Reviews and Enterprise IT Strategies - InfoWorld. Web. 13 May cloud-computing-security-risks-853?page=0,0  Silva, Peter. "Securing the Cloud." Securing the Cloud Web. 12 May