Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Size: px
Start display at page:

Download "Why Migrate to the Cloud. ABSS Solutions, Inc. 2014"

Transcription

1 Why Migrate to the Cloud ABSS Solutions, Inc. 2014

2 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process

3 Information System Basics

4 System Components Information Systems Basics Information Systems are made up of multiple technologies or components that are connected to perform a function. These components generally include a user interface, software, a computer to execute the software, data storage and a communication technology to connect these systems. In a basic Personal Computer all of these technologies are in one device. More complex systems separate these systems in two or more physical units, with these units connected by a local and/or private network.

5 System Components Information Systems Basics A device for data entry and retrieval Terminal PC Printer Dedicated event driven devices Communications to computer 3. Processing (Computer) with software to process data Internal within the data entry device Over a local area network Over the Internet Over dedicated high-speed point-to-point services User Input / Output Devices 2 3 Internal within the data entry device Dedicated Servers Mainframe computers Communications with data storage devices Internal within the data entry devices Over a local area network Over the Internet Over dedicated high speed point-to-point services Data Storage Devices 1 Internal within the data entry device Mass storage within a server or mainframe computer Dedicated device provided by your organization or a third party Processing 4 5 Data Storage Device

6 System Components Information Systems Basics

7 Cloud Processing Basics

8 Using the Cloud Cloud Processing Basics Service providers, focusing on one or more aspects of System Components, have been able to provide a component at lower cost and at an equal or higher degree of reliability than customers may be able to provide for themselves. Lower cost is principally a result of economies of scale. Issues of 24/7 human operations, redundant facilities, facility security, alternate power supply, triple or quadruple Internet access can be more economically provided for hundreds of customers vs. a single customer. Some software components such as data base management or services, have become so ubiquitous that vendors focusing on that component have been able to deliver that specific component at a lower cost to multiple users than a single customer can deliver it to themselves. Cloud Migration is the process of moving some of the components of an information systems to a solution provided by an off-site vendor.

9 Using the Cloud Cloud Processing Basics Cloud Migration moves the physical location of the processors and software that manipulate information and/or the storage devices that hold the data to remote location(s). Users may select a single off-site location or multiple, simultaneous locations for processing and/or storage of data. Communications between applications and the remote locations is handled over the public Internet, over a private Internet, or dedicated leased lines.

10 Using the Cloud Cloud Processing Basics Migration to the Cloud does not change ownership of the data or the software programs that manipulate the data. Migration to the Cloud does not necessarily change the ownership of the computers that update the data or the storage devices that hold the data. Clients may choose to own both the computers and the storage devices, either, or neither.

11 Cloud Options

12 Traditional Client Internal Cloud Options Component Provided by Client Component Provided by Vendor User Interface, Typically a Web Browser or a Custom Application Internal Communications Processing Facility Processing Software & Computer Internal Communications Data Storage

13 Traditional Client Internal Distributed Processing Cloud Options Component Provided by Client Component Provided by Vendor User Interface, Typically a Web Browser or a Custom Application Local/Wide Area Network Communications Processing Facility Processing Software & Computer Internal Communications Data Storage

14 Co-Location or COLO Configuration Cloud Options Component Provided by Client Component Provided by Vendor User Interface, Typically a Web Browser or a Custom Application Local/Wide Area Network Communications Processing Facility Processing Software & Computer Internal Communications Data Storage

15 Software As A Service - SaaS Configuration Cloud Options Component Provided by Client Component Provided by Vendor User Interface, Typically a Web Browser or a Custom Application Local/Wide Area Network Communications Processing Facility Processing Software & Computer Internal Communications Data Storage

16 Off Premise Cloud Cloud Options Component Provided by Client Component Provided by Vendor User Interface, Typically a Web Browser or a Custom Application Local/Wide Area Network Communications Processing Facility Processing Software & Computer Internal Communications Data Storage

17 Cloud Deployment Models Cloud Options Public Cloud Model: For use by the general public, i.e., social media. Community Cloud Model: For use by a specific Community or Organization of people with a shared purpose and shared use. Hybrid Cloud Model: A composition of two or more Cloud Infrastructures (i.e., Public, Private Community). Private Cloud Model: For use by a single community of users or a Single Organization.

18 Why move to the Cloud C66

19 Slide 18 C66 initial caps ("Move") to match other section header slides dc, 12/23/2013

20 Facilities Why Move to the Cloud THE PROBLEM Facility considerations including physical space, HVAC considerations, backup power, fire suppression, and data storage can be expensive to provide and to maintain. Technologies for each of these facility components evolve over time and many IT budgets do not allow for the continuous upgrading of local facilities. THE CLOUD SOLUTION Cloud Facilities provide State of the Art facilities that consist of the physical space to host your hardware or vendor provided hardware. These facilities provide physical space for your equipment, advanced HVAC systems, power from multiple sites, back up power solutions, motor generator type power system, fire suppression solutions, and flood and other acts-of-nature solutions to insure continuous operations. These facility systems would be cost prohibitive to acquire and maintain for many companies and institutions.

21 Staff Support Why Move to the Cloud THE PROBLEM Operations Staff Human 24/7 staff support is a continual expense. Weekend, late second and third-shift staff support is sometimes marginally needed but critical at other times. Additionally, operations staff is often needed when the unexpected has occurred. Staff may not be needed for months but can are critically needed immediately in the next five minutes. THE CLOUD SOLUTION Cloud facilities provide continuous human monitoring of your Cloud Environment 24/7/365 at no additional cost to you. Weekends, holidays, snow days users are never more than a phone call or away from having a human observe an activity on your systems and make adjustments as required. When component failures occur, Cloud service providers provide all required expertise and backup hardware to ensure SLAs continue to be met.

22 Physical Security Why Move to the Cloud THE PROBLEM Physical Security is as increasing priority. Human and Passive Security Systems are expensive to acquire and to maintain. These systems may never be needed or, in an instant may become a life or death issue. Maintaining training for staff, the cost of liability issues of armed security personnel, continuous state-of-the-art penetration control and testing is an expensive process and requires expertise and monitoring of what types of attacks are occurring in the world. THE CLOUD SOLUTION State of the art facility management includes sophisticated physical security systems that meet or exceed very high federal standards. Physical access is strictly controlled and monitored 24/7. Depending on requirements, some facilities may include armed security personnel depending on the requirements. Access to your computers and storage devices is physically separated from other users in most cases and security personnel monitor this environment.

23 Physical Access Why Move to the Cloud THE PROBLEM Physical Access to your equipment is a problem that was documented in late People with bad intentions, have devised a ways to access secured information from your systems by physically connecting a device to your computers and servers THE CLOUD SOLUTION Controlled access to your computers and other devices. Your systems can only be physically accessed by the specific individuals that you allow, which can include the Cloud facility operations staff.

24 Data Security Why Move to the Cloud THE PROBLEM Data Security, Cyber Attack Penetration is a on-going battle against individuals and other entities that would do harm to your enterprise or to the Country. The resources to be current on attack technologies and the resources to implement and test counter measures are expensive to acquire and maintain. THE CLOUD SOLUTION Cloud Service providers include staff whose entire function is to prevent Cyber attacks of on your data and systems. These professionals install and monitor the highest levels of security systems to prevent an attack. They monitor a number of resources that document what new attacks have recently occurred within the last few MINUTES and implement counter measures. The facilities that we represent are routinely tested by Federal agencies to ensure that their facility has all countermeasures in place. The staff to provide this type of support could be prohibitively expensive to most clients.

25 Internet Access Flexibility Why Move to the Cloud THE PROBLEM Internet Access Typical user environments have one or two internet service providers and these providers terminate at your computer facility. THE CLOUD SOLUTION The Cloud Facility providers that we use maintain six or more Internet Service providers that include technologies that allows for the automatic switching from one provider to another should any provider go down. In addition, the Cloud facilities that we use are just one hop away from one of the nine national Internet Cloud hubs in America. This closeness to the national grid improves response time for its users.

26 Cost Control Why Move to the Cloud THE PROBLEM Cost Management IT Managers today are required to anticipate what their processing, software, and data storage needs will be months and often years in advance, depending budgets and procurement cycles. When systems become obsolete processors and storage devices are no longer needed or are often relegated to a long term, low likelihood need to retrieve data status. These transitions are often overlooked and useless data spins continually on high priority devices being maintained and backed up as part of a disaster recovery plan. THE CLOUD SOLUTION Cloud Migration provides for PAY AS YOU USE PRICING. Users pay for what you use today with no need to consider what you will need tomorrow, how long it will take to acquire, and how much it will depreciate before it is needed. If you need additional processing power or storage, it is available to the user almost instantly. Users have the ability to scale their needs by time of the day, day of the week, special weeks in a year, seasons, and special events, such as elections. When a user no longer needs storage and/or processing power, it can be reduced from your budget just as quickly. Systems monitor usage of data sets and processing power needs and can automatically archive data to very low cost solutions that are still retrievable in a few days and/or reduce processing power online.

27 Loss of Site Alternatives Why Move to the Cloud THE PROBLEM Loss of Site Since 911, the possibility of complete loss of site is a very real possibility as a result of acts of terrorism, natural disaster or foul play by employees. THE CLOUD SOLUTION A Cloud separated solution reduces the impact of loss-of-site because the primary processing site is physically separated from a users location and is often unknown to attackers. Attackers with knowledge of the off-site location, would have to overcome physical and communications barriers that are state-of-the-art and are continually monitored and tested by the Federal Government to insure that they are maintained at the highest standards. Beyond the security features, the very nature of the Cloud environment is redundancy and standardization. Processors and data storage devices (hardware components) are standardized and duplicated so that the loss of the hardware components that you use can easily be replaced by identical components in the same Cloud environment or at a backup environment. Cloud service providers that meet Federal guidelines, require that redundant Cloud facilities be at least 500 miles from one another. The result is your data is stored in multiple location at the primary Cloud facility AND at another location at least 500 miles from the primary Cloud location. In the event hardware components are loss, they can be replaced by redundant devices at the primary site, primary devices at the backup site or redundant devices at the backup site.

28 ASI Cloud Service Providers

29 Amazon Web Services (AWS) ASI Cloud Service Providers AWS is owned by AMAZON.COM of Seattle, Washington. AMAZON is a $175 billion dollar company with sales of $77 billion in The AWS subsidiary was formed in 2006 and provides Cloud services to Federal, State and Local Governments and commercial enterprises. o AWS operates multiple sites located worldwide to provide real time data redundancy from the most significant facility failures o Five EC2 (Amazon Elastic Compute Cloud Locations. Amazon EC2 is a web service that provides resizable capacity in the cloud. o Fourteen Edge locations, allowing users to distribute content around the world to reduce latency transfer time at very high data transfer speeds. AWS can provide Cloud Services that currently meets all Federal requirements for security, disaster recovery and has a federalc79 agency ATO.

30 Slide 28 C79 bullet spacing dc, 12/23/2013

31 AWS Meets or Exceeds Federal Standards ASI Cloud Service Providers AWS Maintains an extensive staff to assist in the migration of applications AWS Technical includes full time staff devoted to physical security, access security, backup and redundant facilities and support systems and experts in all aspects of internet processing. Data Security - NIST SP , Rev. 3 compliant controls and SSP Operational Control - You own your data and mission critical apps, exercising control your way Data Integrity - Data is managed IAW Agency standards Regulatory Compliance - FEDRAMP & FISMA compliant data centers Petabyte Storage Capability (1,000 trillion bytes of data)

32 ASI Cloud Offerings ASI Cloud Service Providers Hosting Solutions & Offerings of Multiple Platforms Big Data Storage Archival, Retrieval & Virtual Machines Product Consumption Pricing Utility Based Fee Model FISMA & FedRamp Compliant Infrastructure Environment NIST Compliant SETECS Cloud Security SaaS Full IT Support Services Network Administration Professional Services Migration, Implementation, Integration, Architectural, System Analysis of Current System Design; Inventory Assessment Program Management & Project Management Services Disaster Recovery & Continuity of Operations Federal Vehicle for cloud services GSA Schedule 70 C111

33 Slide 30 C111 Change "Architectural," to ", and Architectural" dc, 12/23/2013

34 VAZATA Cloud COLO Services ASI Cloud Service Providers Infrastructure as a Service Secure computing outsourced, offered by vstructure IaaS Platform dedicated ports and dedicated VLAN(s) Choices of multi-tenant or public cloud environment Secure storage of Mission Critical Applications Big Data storage and archival; retrieval of data Back up, Continuity of Operations, Disaster Recovery all available Continuous monitoring; Includes host hardening, 3rd party monitoring utilizing domain audit approaches, security testing, vulnerability scanning & penetration testing Vazata s virtual environment is built strictly around NIST definitions and standards for cloud computing. Data at rest and in motion on Vazata's infrastructure is IAW ISO security standards Vazata s IaaS addresses data integrity, confidentiality, and availability FIPS & SSAE 16 Type II Compliance SAS 70 - compliant with standards and requirements 2 Data Center Locations; Plano, Texas and Northern Virginia

35 ABSS Solutions, Inc. Our Process Project Vision, Scope, and Complexity Review Inventory of Current Infrastructure Environment Assessment & Analysis of current System Architecture that we are migrating from Initiating Processes & Review of Requirements Develop the Project Management Plan Implementation Plan & Testing Phase Migration to the new Infrastructure Platform Multiple layers of security testing Go live phase! Stages may vary depending upon the migration service offering (i.e., storage or hosting or migrating etc..)

36 ASI Process Our Process Testing of a small Migrated Application(s) Implementation of Business Processes Completion of Migration & Installation Testing of System (SLA, Users & Security) Full Transitional Support & Project Completion 24/7 Help Desk & On Line Support Begins Continuous Monitoring Running Go Live Final Phase if Web Hosting or SaaS

37 Requirements and Standards The Federal Standard Set by: o o o o o o FedRamp NIST General Services Administration JAB FIPS 201 FISMA Generally Accepted Commercial Standards Set by: o o o o HIPAA ISSO Cloud Computing Association PCI Your Standards o You set specific SLA s o You apply for certifications that are appropriate

38 Definitions ROI Return on Investment IAW In Accordance With OS Operating System SaaS Software as a Service IaaS Infrastructure as a Service PaaS Platform as a Service Colo Colocation NIST National Institute of Standards & Technology FISMA Federal Information Systems Management Act STaaS Storage as a Service JAB Joint Advisory Board SLA Service level agreement. This is an agreement or contract between user and the third party cloud providers on medium support requirements up time, disaster recovery time, transaction processing time, etc.

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable

More information

The Elephant in the Room: What s the Buzz Around Cloud Computing?

The Elephant in the Room: What s the Buzz Around Cloud Computing? The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton

More information

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Cloud models and compliance requirements which is right for you?

Cloud models and compliance requirements which is right for you? Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,

More information

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?

More information

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer Plan. Prepare. Protect. About Us Formed by a Group of DC Metro

More information

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses.

Clarity in the Cloud. Defining cloud services and the strategic impact on businesses. Clarity in the Cloud Defining cloud services and the strategic impact on businesses. Table of Contents Executive Summary... 3 Cloud Services... 4 Clarity within the Cloud... 4 Public Cloud Solution...

More information

Public Versus Private Cloud Services

Public Versus Private Cloud Services Public Versus Private Cloud Services Table of Contents vs. What constitutes a Public Cloud versus a Private Cloud solution? When considering moving to a public Cloud infrastructure, what questions should

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com Introduction to Cloud Computing Srinath Beldona srinath_beldona@yahoo.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?

More information

Compliance and the Cloud: What You Can and What You Can t Outsource

Compliance and the Cloud: What You Can and What You Can t Outsource Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Kate Donofrio Security Assessor Fortrex Technologies Instructor Biography Background On Fortrex What s In A Cloud? Pick

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

Cloud Technology: Do you Compute? Presented by Pete Eichorn, Director of Technology, Texas.gov

Cloud Technology: Do you Compute? Presented by Pete Eichorn, Director of Technology, Texas.gov Cloud Technology: Do you Compute? Presented by Pete Eichorn, Director of Technology, Texas.gov Award-winning, official website for Texas Self-funded, public/ private partnership Subsidiary of NIC, the

More information

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Welcome to the AWS Cloud Steve Halliwell General Manager, State, Local & Education What is Amazon Web Services? Deployment & Administration Application Services Compute Storage Database

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

DATA CENTERS. VAZATA Headquarters: 6900 Dallas Parkway, Suite 800 Plano, TX 75024 VAZATA.COM

DATA CENTERS. VAZATA Headquarters: 6900 Dallas Parkway, Suite 800 Plano, TX 75024 VAZATA.COM DATA CENTERS VAZATA Headquarters: 6900 Dallas Parkway, Suite 800 Plano, TX 75024 VAZATA.COM DAL II MARSH LANE CARROLLTON TX OVERVIEW VAZATA s Dallas Data Center II (Dal II) is located at 2440 Marsh Lane

More information

John Essner, CISO Office of Information Technology State of New Jersey

John Essner, CISO Office of Information Technology State of New Jersey John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management

More information

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012 A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Tips For Buying Cloud Infrastructure

Tips For Buying Cloud Infrastructure 27 Tips For Buying Cloud Infrastructure A Comprehensive list of questions to ask yourself when reviewing potential cloud providers By Christopher Wilson @chrisleewilson Table of Contents Intro: Evaluating

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

Remote Voting Conference

Remote Voting Conference Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,

More information

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company

Virtualization Technologies in SCADA/EMS/DMS/OMS. Vendor perspective Norman Sabelli Ventyx, an ABB company 1 Virtualization Technologies in SCADA/EMS/DMS/OMS Vendor perspective Norman Sabelli Ventyx, an ABB company 2 Overview Why use Virtualization? Currently used technologies Adoption Considerations Cloud

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

Making Sense of Cloud Computing in the Public Sector. By EVA OlSAKER

Making Sense of Cloud Computing in the Public Sector. By EVA OlSAKER Making Sense of Cloud Computing in the Public Sector By EVA OlSAKER Every other article or news clip about government Platform as a Service. PaaS allows customers to use hardware, operating systems, storage,

More information

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On

More information

WHITE PAPER. How to choose and implement your cloud strategy

WHITE PAPER. How to choose and implement your cloud strategy WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Cloud Computing Paradigm Shift. Jan Šedivý

Cloud Computing Paradigm Shift. Jan Šedivý Cloud Computing Paradigm Shift Jan Šedivý Business expectations Improving business processes Reducing enterprise costs Increasing the use of information/analytics Improving enterprise workforce effectiveness

More information

Using ArcGIS for Server in the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

Cloud Computing Security Issues

Cloud Computing Security Issues Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,

More information

Evaluating the Cloud An Executive Perspective

Evaluating the Cloud An Executive Perspective Evaluating the Cloud An Executive Perspective Terry Ginley, Socius Jason Rook, Microsoft Cloud is front and center In This Session Why is the cloud gaining traction? Types of Cloud Deployments IAAS Hosted

More information

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Cloud Security & Risk Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com Agenda About Compass Overcast - Cloud Overview Thunderheads - Risks in the Cloud The Silver Lining - Security Approaches

More information

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP

SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

Cloud Computing Overview

Cloud Computing Overview Cloud Computing Overview Mark Troester CIO/IT Product Marketing 1 WHY CLOUD COMPUTING? The cloud computing model can significantly help agencies grappling with the need to provide highly reliable, innovative

More information

Transition From Virginia Interactive

Transition From Virginia Interactive Transition From Virginia Interactive Transition Webinar October 2012 1 1 Authors VITA SiteVision CyberData BroadPoint AIS Hosting O & M Hosting topics include: Network Server performance Backups Patches

More information

Cloud Computing Trends, Examples & What s Ahead

Cloud Computing Trends, Examples & What s Ahead Cloud Computing Trends, Examples & What s Ahead Mike Klein President, Online Tech June 21, 2010 Cloud Computing Defined One Definition: On-Demand Computing Elastic & Scalable Rapidly Provisioned Virtualized

More information

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers

More information

The Cloud. JL Cabrera LTEC 4550

The Cloud. JL Cabrera LTEC 4550 The Cloud JL Cabrera LTEC 4550 Introduction What is the Cloud? Cloud Basics What can the cloud bring to business? Costs and Benefits Capacity and Agility Risks to evaluate prior to proceeding into the

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Cloud Security for Federal Agencies

Cloud Security for Federal Agencies Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

Navigating The World of Cloud Computing

Navigating The World of Cloud Computing Navigating The World of Cloud Computing Mike Klein President, Online Tech Cloud Computing Instead of having 20 servers Pool them together into a gigantic super-server Split up super-server into 100 virtual

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Study concluded that success rate for penetration from outside threats higher in corporate data centers

Study concluded that success rate for penetration from outside threats higher in corporate data centers Auditing in the cloud Ownership of data Historically, with the company Company responsible to secure data Firewall, infrastructure hardening, database security Auditing Performed on site by inspecting

More information

Legal Issues in the Cloud: A Case Study. Jason Epstein

Legal Issues in the Cloud: A Case Study. Jason Epstein Legal Issues in the Cloud: A Case Study Jason Epstein Outline Overview of Cloud Computing Service Models (SaaS, PaaS, IaaS) Deployment Models (Private, Community, Public, Hybrid) Adoption Different types

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions

Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions Agenda Current State Frustrations Evolving Tax Solutions PaaS, SaaS, IaaS and you Changing the Model Q&A 1 Current State

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Presented by Mike Jennings President BEI

Presented by Mike Jennings President BEI Presented by Mike Jennings President BEI Cloud Computing Defined Benefits of Cloud Computing Risks of Cloud Computing When and How to Utilize Cloud Computing Recommendations 2 Cloud Computing Defined 3

More information

TRG Clients in the Cloud Today

TRG Clients in the Cloud Today Understanding Your Cloud Options for Microsoft Dynamics GP Presented by: Brady Curtis Building Now for Your Future TRG Clients in the Cloud Today Cloud 5% On Prem 95% Building Now For Your Future RG Connect

More information

Evolving Technology Issues: Cloud Computing

Evolving Technology Issues: Cloud Computing Evolving Technology Issues: Cloud Computing Michael Bennett October 16, 2011 2011 Edwards Wildman Palmer LLP & Edwards Wildman Palmer UK LLP Cloud Computing Does compliance with applicable laws fall to

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist

More information

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Where in the Cloud are You? Session 17032 Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle) Abstract The goal of this session is to understanding what is meant when we say Where in the

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS

AHLA. JJ. Keeping Your Cloud Services Provider from Raining on Your Parade. Jean Hess Manager HORNE LLP Ridgeland, MS AHLA JJ. Keeping Your Cloud Services Provider from Raining on Your Parade Jean Hess Manager HORNE LLP Ridgeland, MS Melissa Markey Hall Render Killian Heath & Lyman PC Troy, MI Physicians and Hospitals

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge

Program. Maria Fiore Business Development Manager Hartco. Hugo Boutet igovirtual. Introduction to MicroAge. SME and «cloud computing» 2006 MicroAge A presentation from and October 19th 2010 Program Introduction to MicroAge Maria Fiore Business Development Manager Hartco SME and «cloud computing» Hugo Boutet igovirtual 2006 MicroAge Introduction to

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for

More information

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud?

East African Information Conference 13-14 th August, 2013, Kampala, Uganda. Security and Privacy: Can we trust the cloud? East African Information Conference 13-14 th August, 2013, Kampala, Uganda Security and Privacy: Can we trust the cloud? By Dr. David Turahi Director, Information Technology and Information Management

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Cloud Computing: Contracting and Compliance Issues for In-House Counsel

Cloud Computing: Contracting and Compliance Issues for In-House Counsel International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

RFP IaaS for MRM Questions and Answers Issued: July 24, 2015 Updated: July 31, 2015

RFP IaaS for MRM Questions and Answers Issued: July 24, 2015 Updated: July 31, 2015 1. Is the requirement that the primary and secondary data center be located 1000 miles apart a firm requirement? Will NASWA/ITSC consider proposals for facilities that are 500 miles apart or will this

More information

Validating Cloud. June 2012 Merry Danley

Validating Cloud. June 2012 Merry Danley Validating Cloud June 2012 Merry Danley Agenda Validation of Cloud Introduction Environments Definitions Manage Risk by Designation of Systems Why Go Cloud Success Dependencies Validation Personal Experience

More information

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Cloud Computing: The atmospheric jeopardy Unique Approach Unique Solutions Salmon Ltd 2014 Commercial in Confidence Page 1 of 5 Background Cloud computing has its place in company computing strategies,

More information

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

Achieve Economic Synergies by Managing Your Human Capital In The Cloud Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid

More information

A Look into the Cloud

A Look into the Cloud A Look into the Cloud An Allstream White Paper 1 Table of contents Why is everybody talking about the cloud? 1 Trends driving the move to the cloud 1 What actually is the cloud? 2 Private and public clouds

More information

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally

More information

The Keys to the Cloud: The Essentials of Cloud Contracting

The Keys to the Cloud: The Essentials of Cloud Contracting The Keys to the Cloud: The Essentials of Cloud Contracting September 30, 2014 Bert Kaminski Assistant General Counsel, Oracle North America Ken Adler Partner, Loeb & Loeb LLP Akiba Stern Partner, Loeb

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information