Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222.

Similar presentations


Presentation on theme: "Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222."— Presentation transcript:

1 Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222

2

3 Compute Inactivity Period Compute On and Off On & off workloads (e.g. batch job) Over provisioned capacity is wasted Time to market can be cumbersome Unpredictable Bursting Unexpected/unplanned peak in demand Sudden spike impacts performance Can’t over provision for extreme cases Growing Fast Successful services needs to grow/scale Keeping up w/ growth is big IT challenge Cannot provision hardware fast enough Predictable Bursting Services with micro seasonality trends Peaks due to periodic increased demand IT complexity and wasted capacity

4

5

6

7

8 ANSWERS Solutions for the Big Issues

9

10

11 SWT Windows Azure Access Control Service Host an STS in cloud for you Handles relationships with business and social Ips WS-Federation, WS- Trust, Open ID, OAuth

12 Relayed One-Way Unicast and Multicast Relayed WCF NET.TCP with Direct Connect Option Relayed WCF HTTP with support for REST and SOAP 1.1/1.2 Endpoint protection with Access Control TCP/SSL HTTP(S)

13

14 Hybrid App Demo

15 Questions? @rockyh – rockyh@microsoft.comrockyh@microsoft.com Answers…

16 AZRnnn All of the Azure Sessions Hands-on Labs Any of the Azure and Private Cloud HOLs Demos at the Azure Stand in the Expo Hall Find Me Later At the Speaker Area / Azure Stand

17 Start here http://www.windowsazure.com Sign Up Now http://windowsazure.com/trial-offer

18

19 * “Review by a judge” encompasses either an initial review when issuing the court order, warrant, etc. or subsequent review when the court order, warrant, etc. is challenged by the service provider or customer. ** Under a recently revised criminal procedure law, Japanese law enforcement officials may obtain copies of data located on a remote server if a computer in Japan is able to create, change, or delete data on the server, even if the server is located outside of Japan. Although computers of Cloud providers may be able to change or delete customer data, the Japanese Ministry of Justice currently takes the position that computers of Cloud providers are not subject to the law. It is not certain, however, whether Japanese courts would read this same limitation into the law. A Hogan Lovells White Paper A Global Reality: Governmental Access to Data in the Cloud A comparative analysis of ten international jurisdictions Governmental access to data stored in the Cloud – including cross-border access – exists in every jurisdiction by Winston Maxwell, Paris, France Christopher Wolf, Washington, DC  23 May 2012 Updated 18 July 2012 Some erroneously believe the best way to limit governmental access to data is to use Cloud service providers present only in “safe” jurisdictions – places where data are thought to be free from troublesome governmental access. The existence of Mutual Legal Assistance Treaties greatly diminishes any argument that data stored in one jurisdiction is immune from access by governmental authorities in another jurisdiction. Australia A Cloud service provider can voluntarily disclose personal information to the Australian government if it reasonably believes that the use or disclosure is reasonably necessary to, among other similar reasons, prevent, detect, investigate, prosecute, or punish violations of law or serious breaches of standards of conduct, including corruption, abuse of power, dereliction of duty, or “any other seriously reprehensible behaviour.”


Download ppt "Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222."

Similar presentations


Ads by Google