How Safe are you in your Cloud?

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "How Safe are you in your Cloud?"

Transcription

1 Nov Nov 4-5, 4-5, Monarch Monarch Beach, Beach, CA CA How Safe are you in your Cloud? Security Intelligence and Regulatory Compliance in the Cloud November 2014 Heather Hinton, Ph.D. IBM Distinguished Engineer CTO Cloud Security and Compliance GTS Cloud Services Division

2 Executive Summary Cloud Adoption Compliance concerns Security concerns IBM Focus Cloud environments need to satisfy the same compliance requirements as traditional IT, with same security tools, policies and procedures, adapted for Cloud deployment Cloud adoption highlights changes to thinking about compliance including adoption of transitive compliance Infrastructure compliance with SOC2, ISO27001/2 or similar Client-side workload compliance built on Infrastructure + Workload Software/service compliance built on Infrastructure + Service Cloud adoption requires security solutions covering Identity, ion and Insight to be extended to stand alone and hybrid cloud Identity (user identification, access control and governance) ion (infrastructure security, app and data security, risk mgmt) Insight (user activity, threat intelligence, compliance, cost) Deploy Cloud offerings On and with extensive regulatory and compliance assertions Address hybrid cloud use cases by leveraging underlying compliance of,, layers With Integrated security capabilities Address hybrid cloud use cases by leveraging strong enterprise security solutions and services

3 Cloud computing is rapidly transforming the enterprise Access IBM Dynamic Cloud Security Data Optimize Security Operations Gain Workloads IBM Transitive Cloud Compliance Infrastructure Optimize Compliance Activities Leverage

4 Challenge: Adapt our understanding of risk management to allow adoption of secure, compliant, business friendly cloud Perceived Biggest Risks Software as a Service () Platform as a Service () Infrastructure as a Service () provider doesn t have adequate (up to my standards) practices around data protection, identity management, intrusion protection Focused on risks of managed by other and not enough on security basics for integrating with other providers and solutions provider won t have the same types of basic controls (up to my standards) that I need for my developers in my environment Focused on what the developer will do when removed from the training wheels of internal IT controls (developers let lose on the Internet!) provider doesn t have adequate (up to my standards) practices around physical security Tends to think in context of a traditional data center with physical cages

5 Cloud presents the opportunity to radically transform security practices and adopt new approaches to workload compliance Cloud compliance allows us to rethink risks based on the comprehensive hybrid cloud and transitive compliance Traditional Compliance Client dictated and driven control of risks for end-to-end operational stack Dynamic Cloud Compliance Compliance statements provided by each layer build up an end-to-end compliance statement Traditional Security Manual, static, and reactive Dynamic Cloud Security Standardized, automated, agile, and elastic Cloud security is not only achievable, it is an opportunity to drive the business, improve defenses and reduce risk

6 IBM SoftLayer and Bluemix provide a security-rich environment IBM Marketplace IBM Bluemix IBM Marketplace, Bluemix, and Partners AppScan for Mobile Vuln Single Sign On Intel TXT SoftLayer s Triple-layer network security SoftLayer: certified compliance Supports Data Privacy PCI DSS v3.0 AoC Ready for HIPAA Ready for GxP FedRAMP Ready System

7 IBM Transitive Compliance for the Hybrid Cloud is built on a layer cake model Workloads Infrastructure Leverage Hosted MssP Provider demonstrates MssP/ using Compliance Assertions, Ready For statements, and MssP/ specific audits as needed Customer provides Workload Compliance using Compliance Assertions, Ready For statements, and workload specific audits as needed Ready For Compliance Assertions Data Privacy Optimize Compliance Activities

8 IBM Dynamic Cloud Security Portfolio for the Hybrid Cloud supports security solutions tailored for your workload s needs Access Data Gain Hosted MssP Cloud Identity Services Intelligent Threat ion Cloud Cloud Sign On Service Cloud Web and Mobile Application Analyzers Cloud Access r Cloud Privileged Identity r Cloud Data Activity Monitoring Cloud Security Intelligence Security Intelligence and Operations Consulting Services Optimize Security Operations Cloud Security d Services

9 International Financial Services Consortium deploys Cloud hosted document exchange for Customer provided on IBM and IBM Security, builds transitive compliant solution Access Data Gain IBM Marketplace Hosted MssP Cloud Identity Services Cloud Sign On Service Cloud Access r Cloud PIM Security Intelligence and Operations Consulting Services Cloud Web and Mobile Application Analyzers Cloud Data Activity Monitoring Data Privacy Optimize Security Operations, Compliance Activities Data Encryption Cloud Security d Services Intelligent Threat ion Cloud Unified Threat Monitoring

10 National retailer deploys loyalty program extension including mobile accessibility, builds transitive compliant solution Access Data Gain Hosted MssP Cloud Identity Services Intelligent Threat ion Cloud IBM Marketplace Cloud Sign On Service Cloud Access r Cloud PIM Cloud Application Analyzers Cloud Data Activity Monitoring Cloud Security Intelligence Unified Threat Monitoring Security Intelligence and Operations Consulting Services Data Privacy Optimize Security Operations, Compliance Activities Cloud Security d Services

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Cloud and Regulations: A match made in heaven, or the worst blind date ever? Cloud and Regulations: A match made in heaven, or the worst blind date ever? Vinod S Chavan Director Industry Cloud Solutions, IBM Cloud October 28, 2015 Customers are faced with challenge of balancing

More information

Dynamic Security for the Hybrid Cloud

Dynamic Security for the Hybrid Cloud Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security

More information

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Securing the Cloud infrastructure with IBM Dynamic Cloud Security Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

Data, Data, Who Has The Data?

Data, Data, Who Has The Data? Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance Twitter: @MariHeiser What is Cloud? The

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

5 Things to Look for in a Cloud Provider When it Comes to Security

5 Things to Look for in a Cloud Provider When it Comes to Security 5 Things to Look for in a Cloud Provider When it Comes to Security In This Paper Internal technology services that lack resources, rigor or efficiencies are prime candidates for the cloud Understand the

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

What is Security Intelligence?

What is Security Intelligence? 2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the

More information

Strategies for assessing cloud security

Strategies for assessing cloud security IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary

More information

Introduction to AWS Security July 2015

Introduction to AWS Security July 2015 Introduction to AWS Security July 2015 Page 1 of 7 Table of Contents Introduction... 3 Security of the AWS Infrastructure... 3 Security Products and Features... 4 Network Security... 4 Inventory and Configuration

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Practical Development with a Platform as a Service (PaaS) Beyond the Basics

Practical Development with a Platform as a Service (PaaS) Beyond the Basics IBM Cloud: Think it. Build it. Tap into it. Carl Osipov, Developer Evangelist, IBM Bluemix osipov@us.ibm.com @CloudsWithCarl September 25, 2014 Practical Development with a Platform as a Service (PaaS)

More information

IBM Security in the Cloud

IBM Security in the Cloud Cesare Radaelli Security Tiger Team Leader, Italy IBM Security Solutions IBM Security in the Cloud What is cloud computing? Cloud is an emerging consumption and delivery model for many IT-based services,

More information

AWS Worldwide Public Sector

AWS Worldwide Public Sector 15 Minute Introduction to AWS and Q&A April 2015 Mark Fox Sr. Manager DoD Sales I love/hate relationship with the term cloud Now the IT norm Commercial Cloud should not be scary nor considered less secure

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

SOC & HIPAA Compliance

SOC & HIPAA Compliance 2014 All Rights Reserved ecfirst An ecfirst Case Study: SOC & HIPAA Compliance An ecfirst Case Study: Lunarline & HIPAA Compliance TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 SECURITY OPERATIONS CENTER (SOC)...

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Security of Cloud Computing for the Power Grid

Security of Cloud Computing for the Power Grid ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY

More information

Hybrid Cloud - Your Path to Business Agility

Hybrid Cloud - Your Path to Business Agility IBM BusinessConnect 2015 Seize the Moment 21 st October 2015 Hybrid Cloud - Your Path to Business Agility Peter Eeles Executive IT Architect IBM Cloud Worldwide Tiger Team peter.eeles@uk.ibm.com Agenda

More information

Q1 Labs Corporate Overview

Q1 Labs Corporate Overview Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,

More information

Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia

Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia Feliciano Intini Responsabile dei programmi di Sicurezza e Privacy Microsoft Italia NonSoloSecurity Blog: http://blogs.technet.com/feliciano_intini Twitter: @felicianointini Trustworthy Computing Cloud:

More information

On Demand Cloud Services Value First

On Demand Cloud Services Value First On Demand Cloud Value First Hardware, Software, and Engineered to Work Together John Barker Oracle On Demand john.barker@oracle.com 804-967-7228 Safe Harbor Statement The following

More information

Empowering Your Business in the Cloud Without Compromising Security

Empowering Your Business in the Cloud Without Compromising Security Empowering Your Business in the Cloud Without Compromising Security Cloud Security Fabric CloudLock offers the cloud security fabric for the enterprise that helps organizations protect their sensitive

More information

Microsoft Azure. Die "Hyper-Scale" Cloudplattform. Gerwald Oberleitner 22. September 2015

Microsoft Azure. Die Hyper-Scale Cloudplattform. Gerwald Oberleitner 22. September 2015 Microsoft Azure Die "Hyper-Scale" Cloudplattform Gerwald Oberleitner 22. September 2015 Wie sich Microsoft Hyper-scale Azure differenziert Enterprise Grade Hybrid Azure footprint Azure footprint Datacenter

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Cyber Security Symposium 2015 September 29,2015

Cyber Security Symposium 2015 September 29,2015 Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that

More information

Transforming Analytics for Cognitive Business

Transforming Analytics for Cognitive Business Transforming Analytics for Cognitive Business Alistair Rennie General Manager Solutions, IBM Analytics @alistair_rennie IBM Chief Data Officer Strategy Summit Data fuels innovative offerings 28% of car

More information

Managing risks in a Salesforce environment

Managing risks in a Salesforce environment Managing risks in a Salesforce environment Managing risks in a Salesforce environment In today s rapidly changing world of business, only companies that understand and anticipate customer needs and consistently

More information

A Guide to. Cloud Services for production workloads

A Guide to. Cloud Services for production workloads A Guide to Cloud Services for production workloads Intro Workload Requirements Matter Intro With the benefits of the cloud supported by both research and case studies, a growing number of cloud service

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

How to ensure control and security when moving to SaaS/cloud applications

How to ensure control and security when moving to SaaS/cloud applications How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk

More information

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Ragy Magdy Regional Channel Manager MEA IBM Security Systems Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by

More information

Start New Conversations, Open New Doors

Start New Conversations, Open New Doors @ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing

More information

The Production Cloud

The Production Cloud The Production Cloud The cloud is not just for backup storage, development projects and other low-risk applications. In this document, we look at the characteristics of a public cloud environment that

More information

Cloud Security: The Grand Challenge

Cloud Security: The Grand Challenge Dr. Paul Ashley IBM Software Group pashley@au1.ibm.com Cloud Security: The Grand Challenge Outline Cloud computing: the pros, the cons, the blind spots Security in the cloud - what are the risks now and

More information

CERTIFICATIONS / DATAFARMAR&B

CERTIFICATIONS / DATAFARMAR&B CERTIFICATIONS / DATAFARMAR&B INFRASTRUCTURE DATAFARMAR&B INTEGRATION SERVERS DATABASE DATABASE DATABASE PROCESSORS VALIDATION OF PROCESSING AND DATA STRUCTURE DATABASE LABORATORY PHARMACY LOGYSTIC OPERATOR

More information

In the Cloud We Trust!

In the Cloud We Trust! In the Cloud We Trust! Dejan Cvetkovic CTO, Microsoft CEE ISACA, Athens, Greece, November 24 th, 2015 Agenda Compliance for Financial Services The Microsoft Approach to Compliance Risk Management and Threat

More information

Analytics In the Cloud

Analytics In the Cloud Analytics In the Cloud 9 th September Presented by: Simon Porter Vice President MidMarket Sales Europe Disruptors are reinventing business processes and leading their industries with digital transformations

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine

More information

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application

More information

Cloud Computing Trends, Examples & What s Ahead

Cloud Computing Trends, Examples & What s Ahead Cloud Computing Trends, Examples & What s Ahead Mike Klein President, Online Tech June 21, 2010 Cloud Computing Defined One Definition: On-Demand Computing Elastic & Scalable Rapidly Provisioned Virtualized

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Audit My OpenStack Cloud!!

Audit My OpenStack Cloud!! Audit My OpenStack Cloud!! Prabhakar Attaluri, IBM Distinguished Engineer, CTO Vinod Chavan, Cloud Executive Wednesday, August 12, 2015: 04:30 PM - 05:30 PM, Dolphin, Southern Hemisphere 3 Insert Custom

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed

More information

EMA Radar for Private Cloud Platforms: Q1 2013

EMA Radar for Private Cloud Platforms: Q1 2013 EMA Radar for Private Cloud Platforms: Q1 2013 By Torsten Volk ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Radar Report March 2013 BMC Software EMA Radar for Private Cloud Platforms: Q1 2013 (IaaS, PaaS, SaaS)

More information

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Enterprise Cloud Adoption- Deployment Models, Workloads and Industry Perspective

Enterprise Cloud Adoption- Deployment Models, Workloads and Industry Perspective Enterprise Cloud Adoption- Deployment Models, Workloads and Industry Perspective Prabhakar Attaluri IBM Friday, August 16, 2013 8:00 9:00AM Room 309, Hynes Convention Center Session Number 14066 Abstract

More information

Innovate with the Cloud built for Cognitive Business - IBM Cloud.

Innovate with the Cloud built for Cognitive Business - IBM Cloud. Innovate with the Cloud built for Cognitive Business - IBM Cloud. Nancy Pearson Vice President Corporate Marketing Cognitive Business Sandy Carter General Manager IBM Cloud Ecosystem and Developers What

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

IIA Conference. September 18, 2015. Paige Needling Director, Global Information Security Recall, Inc.

IIA Conference. September 18, 2015. Paige Needling Director, Global Information Security Recall, Inc. IIA Conference September 18, 2015 Paige Needling Director, Global Information Security Recall, Inc. IT SECURITY UMBRELLA Compliance for IT Data Privacy Protection Privacy Risk Assessment Vulnerability

More information

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD CONTINUOUS MONITORING A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Well-Documented Controls Reduce Risk and Support Compliance Initiatives

Well-Documented Controls Reduce Risk and Support Compliance Initiatives White Paper Risks Associated with Missing Documentation for Health Care Providers Well-Documented Controls Reduce Risk and Support Compliance Initiatives www.solutionary.com (866) 333-2133 Many Health

More information

Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

IBM Cloud TechTalks (Part 4 of 4):

IBM Cloud TechTalks (Part 4 of 4): IBM Cloud TechTalks (Part 4 of 4): Maximizing Business Agility with Cloud on a z System November 12 th 2015 IBM Corporation IBM Corporation 2 IBM Corporation 3 IBM Corporation 4 Challenging the Perception

More information

NEC Managed Security Services

NEC Managed Security Services NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

Cloud Computing and Standards

Cloud Computing and Standards Cloud Computing and Standards Heather Kreger CTO International Standards, IBM kreger@us.ibm.com 2012 IBM Corporation Technology will play the key role in success Speed Value 90% 1 view cloud as critical

More information

Unified Identity Management

Unified Identity Management Unified Identity Management Across Data Center, Cloud and Mobile Enterprise of Things = More Complexity DESKTOPS + MOBILE DATA CENTER APPS CLOUD (SaaS) by Red Hat + DATA CENTER SERVERS + CLOUD (IaaS &

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved.

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved. Security Trends The Case for Intelligence-Driven Security 1 Attack Surface and Threat Environment ¼ ZETTABYTE 2 40-60? ZETTABYTES ZETTABYTES 2007 2013 2020 Digital Content 2 Attack Surface and Threat Environment

More information

FlexSecure. Securing All That Matters. Rex Mafiana CEO 07034003938

FlexSecure. Securing All That Matters. Rex Mafiana CEO 07034003938 FlexSecure Securing All That Matters Rex Mafiana CEO rexm@flexipgroup.com 07034003938 Agenda FPG T&S Limited an Introduction Modern Security Trends Implications for our Geo What should our organizations

More information

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges

More information

Konsolidacija podatkov v oblaku znotraj organizacije

Konsolidacija podatkov v oblaku znotraj organizacije Konsolidacija podatkov v oblaku znotraj organizacije Robert Korošec Oracle 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Deployment Models: Private, Public, Hybrid Exclusive Shared

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Things to Consider When Planning for Cloud-Based Data Protection

Things to Consider When Planning for Cloud-Based Data Protection Things to Consider When Planning for Cloud-Based Data Protection What are the chances? Having quadruplets? 1 in 15,000,000 Become President of the USA? 1 in 10,000,000 Hole-in-one? 1 in 12,500 Your laptop

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Cloud-Centric Workloads and Platforms Workstream

Cloud-Centric Workloads and Platforms Workstream Cloud-Centric Workloads and Platforms Workstream Raj Sethi Ekartha, Inc. rajsethi@ekartha.com Snehal Antani - IBM antani@us.ibm.com New Workstream Under XaaS Workgroup Mission Develop best practices for

More information

2011 Talking Points and Go-To-Market Themes

2011 Talking Points and Go-To-Market Themes 2011 Talking Points and Go-To-Market Themes Who is? is the global leader in virtualization and cloud infrastructure. s mission: To dramatically reduce the complexity of IT. The result: enables its customers

More information

Firewall Administration and Management

Firewall Administration and Management Firewall Administration and Management Preventing unauthorised access and costly breaches G-Cloud 5 Service Definition CONTENTS Overview of Service... 2 Protects Systems and data... 2 Optimise firewall

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

Safeguarding the cloud with IBM Security solutions

Safeguarding the cloud with IBM Security solutions Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions

More information

Secure Cloud Computing

Secure Cloud Computing Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for

More information

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment. Security Services A Solution for Providing BPM of Security Services within the Enterprise Environment. First steps towards Next Generations Operations (OPS) to drive Gross Margin Dear security colleagues,

More information

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information

More information

IBM Open Cloud Architecture

IBM Open Cloud Architecture Gerd Breiter IBM Distinguished Engineer Cloud and Smarter Infrastructure CTO Office IBM Open Cloud Architecture September 2014 2012 IBM Corporation Agenda Introduction IBM Open Cloud Architecture Softlayer

More information

CONVERGED DATA PROTECTION. ITSA Nürnberg

CONVERGED DATA PROTECTION. ITSA Nürnberg CONVERGED DATA PROTECTION ITSA Nürnberg DRUVA Company Founded in 2008 in Pune, India Headquartered in Silicon Valley 5 Offices worldwide, 24x7 Support Backed by Sequoia and EMC End of 2014 +3000 Customers,

More information

TRUSTED CLOUD. Our commitment to provide a cloud you can trust. Fernando Machado Píriz September 2014

TRUSTED CLOUD. Our commitment to provide a cloud you can trust. Fernando Machado Píriz September 2014 TRUSTED CLOUD Our commitment to provide a cloud you can trust Fernando Machado Píriz September 2014 Technology Trends Driving cloud adoption 71% of strategic buyers cite scalability, cost and business

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ

More information

IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud

IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud Kim Mortensen Marts 2015 2014 IBM Corporation The emergence of social, mobile, analytics and cloud are fundamentally changing

More information

The role of standards in driving cloud computing adoption

The role of standards in driving cloud computing adoption The role of standards in driving cloud computing adoption The emerging era of cloud computing The world of computing is undergoing a radical shift, from a product focus to a service orientation, as companies

More information

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society

More information

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Infrastructure as a Service (IaaS) Dancik International and Peak 10 Infrastructure as a Service (IaaS) Dancik International and Peak 10 Infrastructure as a Service Monty Blight, Peak 10 Data Center & Network Services Cloud Services Managed Services Agenda 1. Who is Peak

More information

STRATEGIES FOR SUCCESS IN THE CLOUD THE FIVE KEYS TO EXCEPTIONAL BUISINESS IMPACT

STRATEGIES FOR SUCCESS IN THE CLOUD THE FIVE KEYS TO EXCEPTIONAL BUISINESS IMPACT STRATEGIES FOR SUCCESS IN THE CLOUD THE FIVE KEYS TO EXCEPTIONAL BUISINESS IMPACT PERVASIVE NEW EXPECTATIONS AGILITY. EFFICIENCY. COST SAVINGS. PUBLIC CLOUDS ENTERPRISE IT Cost per VM Hour: $0.10 vs. $1.00

More information

Study concluded that success rate for penetration from outside threats higher in corporate data centers

Study concluded that success rate for penetration from outside threats higher in corporate data centers Auditing in the cloud Ownership of data Historically, with the company Company responsible to secure data Firewall, infrastructure hardening, database security Auditing Performed on site by inspecting

More information

Get Your Head in the Cloud. The Hidden Power of Coupa s True Cloud Solution

Get Your Head in the Cloud. The Hidden Power of Coupa s True Cloud Solution Get Your Head in the Cloud The Hidden Power of Coupa s True Cloud Solution INTRODUCTIONS David Williams VP, Technology @metakube Sanket Naik VP, Cloud Operations & Security @SanketNaik Jim Benoit Senior

More information

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework

Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework Cloud 101 General Overview of Cloud Services January 21, 2015 Agenda Healthcare Enterprise View of Cloud What is Cloud Additional Needs Cloud Models Cloud Economics 101 Stack Decision Framework 2. 2014

More information

VMware vcloud Powered Services

VMware vcloud Powered Services SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to

More information

The Enterprise Data Hub and The Modern Information Architecture

The Enterprise Data Hub and The Modern Information Architecture The Enterprise Data Hub and The Modern Information Architecture Dr. Amr Awadallah CTO & Co-Founder, Cloudera Twitter: @awadallah 1 2013 Cloudera, Inc. All rights reserved. Cloudera Overview The Leader

More information