Data, Data, Who Has The Data?

Size: px
Start display at page:

Download "Data, Data, Who Has The Data?"

Transcription

1 Data, Data, Who Has The Data? 13 February 2015 Mari Heiser IBM STSM (Senior Technical Staff Member) Master Certified Architect IBM Cloud Security and Compliance

2 What is Cloud? The practice of using a remote server or computers hosted on the internet to store, manage and process data rather than on a local server or personal computer. 2

3 Cloud computing is continuing to transform the way organizations manage their infrastructure 80% of organizations were using cloud services by the end of 2014 Many cloud vendors stand ready to supply clouds to consumers in 2015 and beyond. 3

4 Cloud requires a change in mindset Logical vs physical Perimeters are dynamic rather than fixed Compliance concerns becomes a shared model between you and your provider Vendor certifications (proof of capabilities) Service type (hybrid, private, multi-tenancy) Data location Workload analysis Data ownership Ability to layer on additional security/privacy controls Incident response/disaster recovery Managed services 4

5 Look for these certification and/or compliance audits as proof of capabilities : ITAR Certification FedRAMP Certification 5

6 What is their service model? Do they offer hybrid, private, multi-tenancy or other solutions? Keep in mind, multi-tenant environments often have compliance challenges. Where are the servers located? You should be able to choose the exact location of your servers Do you know the exact location (geographical) your data will be stored? Do you have control of where it will reside? Some cloud services do not give you an option of where your data is physically stored in the world Do you retain ownership rights? Check to insure that your intellectual capital is your own Can the provider access your data? IaaS best case, no but may vary. PaaS depends SaaS likely Will you be allowed to bring your security policies, standards and tools? Best case, you should be able to bring some of your own to enhance what they offer. 6

7 Build your dynamic cloud on SoftLayer Complete control, access, and transparency Seamless fault-tolerant, multi-site topography Single-tenant and multi-tenant environments Complete portfolio available on demand in all data centers 7

8 SoftLayer offers a broad portfolio of infrastructure choices for greater business agility Bare metal with your own stack For high input and output (I/O)- intensive apps, databases, big data Shared virtual environment For unpredictable, seasonal or research and development workloads Dedicated virtualized environment Designed to be ideal for enterprises Build and customize the environment based on what you want to achieve Fine-tune to meet changing business needs or respond to competitive pressures Additional services for compute, storage, network, security, platform management and big data are available 8

9 SoftLayer currently holds certifications and/or is compliant with: In place now: SOC1, SOC2, SOC3 ISO/IEC Certification Managed to NIST FFIEC Ready Privacy Standards Self Assessment PCI DSS v3.0 AoC HIPAA Ready In progress due in 2015: 9 FISMA Moderate FedRAMP Certification ITAR Certification (FedRAMP Only)

10 SoftLayer s Global footprint allows regional data residency controlled by the customer London Amsterdam Frankfurt Paris India China Hong Kong Tokyo Seattle San Jose Los Angeles Houston Denver Dallas Mexico City Montreal Toronto Chicago New York City Washington D.C. Atlanta Miami Singapore Brazil Sydney Melbourne 10 DATA CENTER & NETWORK POINT OF PRESENCE PLANNED DATA CENTER & NETWORK POINT OF PRESENCE NETWORK POINT OF PRESENCE IPv4/IPv6 dual stack Global DNS Global DDOS Mitigation Global Internet Exchanges & Peering

11 Useful Links go here to learn more and get smart, fast! https://engage.vevent.com/index.jsp?eid=556&ecid=66663 SoftLayer Fundamentals Training webcast replays Eleven separate 60 min models; Lessons 5 - Keep safe securing your SoftLayer virtual instances and a replay of this presentation SoftLayer Security: Questions and Answers (SoftLayer Blog post - Darrel Haswell) https://www.youtube.com/watch?v=t9h2cxwcuva Lance Crosby, CEO SoftLayer IBM PartnerWorld Leadership Conference 2014 General Session https://www.youtube.com/user/softlayer Data center tours DAL05, Amsterdam Power and network videos Information about all data centers Information about networks including transit, peering status Looking glass full visibility into network connections, status and latency SoftLayer Developer Network Home of all the documentation you need for leveraging the SoftLayer API SoftLayer Knowledgelayer, your single stop for learning more about all things SoftLayer. Press release: Gaming companies flock to SoftLayer s cloud, adding to 130 million players worldwide 11

12 Thank You! 12

HYBRID CLOUD Why is it important & how do you manage it?

HYBRID CLOUD Why is it important & how do you manage it? HYBRID CLOUD Why is it important & how do you manage it? TECTONIC SHIFT IN IT 5 How disruptive can the cloud be? 6 7 8 $223B $1B Total Valuation 234 $USD $10B FinTech Innovation 9 Platform to Innovate

More information

SoftLayer: Introduction

SoftLayer: Introduction SoftLayer: Introduction Kim Mortensen SoftLayer & Cloud Managed Services ITS Channel Sales Denmark kim@dk.ibm.com 2013 IBM Corporation IBM cloud offerings Cloud Managed Services Formerly (SCE+) Have it

More information

Molnet öppnar nya möjligheter för kostnadseffektiv IT

Molnet öppnar nya möjligheter för kostnadseffektiv IT Molnet öppnar nya möjligheter för kostnadseffektiv IT March 3 Magnus Arildsson, Cloud Leader, IBM Nordic 2015 IBM Corporation Market Shifts are creating a new era of IT Data is becoming the world s new

More information

SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company. 2014 IBM Corporation

SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company. 2014 IBM Corporation SoftLayer differentiation Stand apart from the crowd with SoftLayer, an IBM company 2014 IBM Corporation Executive summary Early cloud models shared, virtualized resources are no longer enough to achieve

More information

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation

Mohamed Sayed SGI Cloud Executive Middle East & Africa. IBM ITIDA MoU WUP12370-USEN-00. 2014 IBM Corporation Mohamed Sayed SGI Cloud Executive Middle East & Africa IBM ITIDA MoU WUP12370-USEN-00 Cloud computing is continuing to transform the way organizations manage their infrastructure. 80% of organizations

More information

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer

Building cloud infrastructure: The importance of scale, speed, and flexibility. William Lim Asia Channel Development Manager, SoftLayer Building cloud infrastructure: The importance of scale, speed, and flexibility William Lim Asia Channel Development Manager, SoftLayer Global cloud leader Formed by 10 industry veterans in 2005 Model predicated

More information

Infrastructure on the Cloud Faster, Easier, Economical

Infrastructure on the Cloud Faster, Easier, Economical Infrastructure on the Cloud Faster, Easier, Economical Global cloud leader Formed by 10 industry veterans in 2005 Model predicated on software-driven infrastructure Unencumbered by early-industry legacy

More information

IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud

IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud IBM SoftLayer Cloud - fleksibel infrastruktur i skyen - perfekt til hybrid cloud Kim Mortensen Marts 2015 2014 IBM Corporation The emergence of social, mobile, analytics and cloud are fundamentally changing

More information

Succeed at a New Business Speed: IBM Cognos Business Intelligence on Cloud

Succeed at a New Business Speed: IBM Cognos Business Intelligence on Cloud Marc delorimier Succeed at a New Business Speed: IBM Cognos Business Intelligence on Cloud 2 Accelerated by Cloud Cloud is CHANGING the way work gets done IT Application Developers Business Leaders Quickly

More information

IBM Cloud :Infrastructure-as-a-Service

IBM Cloud :Infrastructure-as-a-Service IBM :Infrastructure-as-a-Service July 30 th, 2014 www.ibm.com/investor Forward Looking Statements and Non-GAAP Information Certain comments made in this presentation may be characterized as forward looking

More information

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation

Softlayer. Team-Enablement. An IBM company. 5th September 2013. 2013 IBM Corporation Softlayer An IBM company Team-Enablement 5th September 2013 SoftLayer has a global footprint 13 data centers 17 network PoPs Global private network 685 employees (25 in Europe, o/w 4 Sales) 2013 Projected

More information

借 力 IBM 云 服 务 构 筑 企 业 混 合 云 架 构 门 捷 声 IBM( 中 国 ) 全 球 科 技 服 务 部 大 西 区 解 决 方 案 经 理 云 计 算 正 在 为 传 统 产 业 模 式 带 来 一 场 革 命 新 的 客 户 需 求 正 在 驱 动 商 业 模 式 的 改 变 客 户 需 要 : 更 多 引 入 移 动 和 社 交 网 络 通 过 智 能 分 析 驱 动 个

More information

Auf dem Weg zur digitalen Transformation

Auf dem Weg zur digitalen Transformation SAP IT Expert Summit Zürich 04. November 2015 IBM Cloud für SAP Applications Auf dem Weg zur digitalen Transformation Thomas Mattern Digital Transformation 2 Partnership 3 Partnership Global Scale Hybrid

More information

How WebSphere Fits in IBM s Cloud Strategy

How WebSphere Fits in IBM s Cloud Strategy March 25, 2014 How WebSphere Fits in IBM s Cloud Strategy Adam Gunther Program Director, Cloud Offerings, WebSphere Product Management Agenda Market Trends & IBM Cloud Strategy What s New: IBM Codename:

More information

Lifesize Cloud, Architecture. A comprehensive guide

Lifesize Cloud, Architecture. A comprehensive guide A comprehensive guide Reference Paper February 2015 A service built to provide a connected experience, running on a platform built to perform that s Lifesize Cloud, powered by SoftLayer, an IBM Company.

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1

Data Risk Management: ISM Ground to Cloud Summit. accelerate your ambition 1 Data Risk Management: ISM Ground to Cloud Summit accelerate your ambition 1 John Jones Branch Practice Manager Networking, Communications & Security Solutions John.Jones@dimensiondata.com Justin Evans

More information

How Safe are you in your Cloud?

How Safe are you in your Cloud? Nov Nov 4-5, 4-5, 2014 2014 Monarch Monarch Beach, Beach, CA CA How Safe are you in your Cloud? Security Intelligence and Regulatory Compliance in the Cloud November 2014 Heather Hinton, Ph.D. IBM Distinguished

More information

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12

Who is Savvis. * Pro forma. 2 Savvis Proprietary & Confidential 10/24/12 Savvis Overview Who is Savvis Savvis is an IT outsourcing provider delivering visionary enterprise-class cloud and IT solutions and proactive service, and enabling enterprises to gain a competitive advantage

More information

Company Overview. October 2014

Company Overview. October 2014 Company Overview October 2014 Presentation Structure 1 DDoS Attacks 2 Black Lotus DDoS Defense Solution 3 About Black Lotus What Does Black Lotus Do? We are a security company that protects businesses

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE

PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE PRODUCTS & SERVICES EQUINIX CLOUD EXCHANGE Enabling private virtual connections for direct cloud access Cloud services are being quickly adopted worldwide, but concerns about them linger. People worry

More information

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development

We keep internet traffic flowing Frank Ip VP of Marketing and Business Development We keep internet traffic flowing Frank Ip VP of Marketing and Business Development WHD 2015 Presentation SLA 1 I will make it short 2 3 Hopefully, it will be informative You can ask questions, but I probably

More information

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015

10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com info@lbmctech.com Purpose: Cloud computing provides public sector organizations

More information

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012 A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES

More information

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Cloud and Regulations: A match made in heaven, or the worst blind date ever? Cloud and Regulations: A match made in heaven, or the worst blind date ever? Vinod S Chavan Director Industry Cloud Solutions, IBM Cloud October 28, 2015 Customers are faced with challenge of balancing

More information

Infrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS:

Infrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS: CenturyLink Cloud Infrastructure, application services, and managed services - all in a single, integrated platform Businesses like yours are moving their apps to CenturyLink Cloud. All signs point to

More information

Hans Bos Microsoft Nederland. hans.bos@microsoft.com

Hans Bos Microsoft Nederland. hans.bos@microsoft.com Hans Bos Microsoft Nederland Email: Twitter: hans.bos@microsoft.com @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party

More information

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud

Cloud Security. DLT Solutions LLC June 2011. #DLTCloud Cloud Security DLT Solutions LLC June 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com www.dlt.com/cloud Your Hosts Van Ristau Chief Technology Officer, DLT Solutions

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

Managing digital audio video court record in the age of HD video and YouTube. technology and privacy. Tony Douglass President, For The Record

Managing digital audio video court record in the age of HD video and YouTube. technology and privacy. Tony Douglass President, For The Record Managing digital audio video court record in the age of HD video and YouTube technology and privacy Tony Douglass President, For The Record Introduction Digital court recording architecture Content what

More information

Security Considerations for the Cloud

Security Considerations for the Cloud June 6, 2012 Security Considerations for the Cloud Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Policy Task Force 1 2012 NIST/OCR Conference Agenda Threat Implications

More information

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week Cloud Security Panel: Real World GRC Experiences ISACA Atlanta s 2013 Annual Geek Week Agenda Introductions Recap: Overview of Cloud Computing and Why Auditors Should Care Reference Materials Panel/Questions

More information

AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS

AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS AT-A-GLANCE DATA CENTER INDUSTRY SEGMENTS Category Wholesale Colocation Managed Services Customer need Alternative to own. Large scale homogenous applications. Network edge solution for high input output

More information

Powering the Interconnected World Analyst Investor Day

Powering the Interconnected World Analyst Investor Day Powering the Interconnected World Analyst Investor Day Steve Smith CEO & President 2014 Equinix Inc. www.equinix.com Agenda 1 Company Positioning 15-Year Journey Global Interconnection Platform Strategic

More information

Cloud vision and capabilities

Cloud vision and capabilities Nov 7, 2012 Cloud vision and capabilities - N-Cloud framework - Introduction Marv Mouchawar President, Cloud Services NTT DATA Inc Kazuhiro Gomi President & CEO NTT America Steve Nola CEO, Cloud Solutions

More information

DRUVA SECURITY OVERVIEW ICT AFRICA CAPE TOWN LEE MEPSTED EMEA CHANNEL MANAGER

DRUVA SECURITY OVERVIEW ICT AFRICA CAPE TOWN LEE MEPSTED EMEA CHANNEL MANAGER DRUVA SECURITY OVERVIEW ICT AFRICA CAPE TOWN LEE MEPSTED EMEA CHANNEL MANAGER ABOUT DRUVA Company Fastest growing data protection company Headquartered in Silicon Valley Backed by Sequoia and EMC Ranked

More information

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?

More information

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012

Cloud Security Alliance and Standards. Jim Reavis Executive Director March 2012 Cloud Security Alliance and Standards Jim Reavis Executive Director March 2012 About the CSA Global, not for profit, 501(c)6 organization Over 32,000 individual members, 120 corporate members, 60 chapters

More information

Microsoft Azure. The cloud platform built for business. Tarmo Tikerpäe DC SSP Microsoft

Microsoft Azure. The cloud platform built for business. Tarmo Tikerpäe DC SSP Microsoft Microsoft Azure The cloud platform built for business Tarmo Tikerpäe DC SSP Microsoft The next strategic opportunity is here Cloud Mobile Social How do you use technology innovation Big data? to architect

More information

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014 Why Migrate to the Cloud ABSS Solutions, Inc. 2014 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process Information System

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Fundamental Concepts and Models

Fundamental Concepts and Models Fundamental Concepts and Models 1 1. Roles and Boundaries Could provider The organization that provides the cloud based IT resources Cloud consumer An organization (or a human) that has a formal contract

More information

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014

Equinix Cloud Exchange Datacenter Forum. Stephane Buchs, IMS 17 th September 2014 Equinix Cloud Exchange Datacenter Forum Stephane Buchs, IMS 17 th September 2014 Largest carrier-neutral data center provider Market Challenge Expanding addressable market; ensuring consistent performance

More information

A Secure Cloud Platform For egaming

A Secure Cloud Platform For egaming A Secure Cloud Platform For egaming JT CLOUD Mark Stuchfield, VP, Business Development, JT Lab & egaming mark.stuchfield@jtglobal.com consultancy voice & data cloud & hosted solutions internet security

More information

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC

Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns. Privacy and Information Management Practice / Washington, DC Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC Disclaimer THIS PRESENTATION IS TO ASSIST IN A GENERAL

More information

Audit My OpenStack Cloud!!

Audit My OpenStack Cloud!! Audit My OpenStack Cloud!! Prabhakar Attaluri, IBM Distinguished Engineer, CTO Vinod Chavan, Cloud Executive Wednesday, August 12, 2015: 04:30 PM - 05:30 PM, Dolphin, Southern Hemisphere 3 Insert Custom

More information

Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business. Peter Sheldon VP Strategy, Magento Commerce

Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business. Peter Sheldon VP Strategy, Magento Commerce Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business Peter Sheldon VP Strategy, Magento Commerce 88% of Organizations Have a Cloud 1 st Strategy Source: Gartner Forecast Analysis:

More information

Virtualization in Enterprise Environment. Krisztian Egi

Virtualization in Enterprise Environment. Krisztian Egi Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

CONSULTING SERVICES Business & technology consulting and managed services

CONSULTING SERVICES Business & technology consulting and managed services CONSULTING SERVICES Business & technology consulting and managed services SUNGARD CONSULTING SERVICES Leveraging global delivery to help drive operational efficiency while reducing IT cost Companies face

More information

Steelhead Cloud Accelerator

Steelhead Cloud Accelerator 1 Steelhead Cloud Accelerator Optimization for SaaS Applications in the hybrid cloud Joe Ghory Sr. Product Marketing Manager; Riverbed Mike Cucchi - Director, Product Marketing; Akamai The Cloud is Primarily

More information

Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com

Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com Sikkerhet i skytjenester; hva bør en tenke på? Ole Tom Seierstad National Security Officer Microsoft Norway oles@microsoft.com Cloud is becoming integral to business transformation The secure pathway to

More information

Cyber Security Symposium 2015 September 29,2015

Cyber Security Symposium 2015 September 29,2015 Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that

More information

GRC Stack Research Sponsorship

GRC Stack Research Sponsorship GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary

More information

Top 10 reasons to move to the cloud

Top 10 reasons to move to the cloud Checklist: Top 10 reasons to move to the cloud WHITE PAPER Checklist: Top 10 reasons to move to the cloud There are many reasons to move to the cloud, including rapid deployment, reduced support, improved

More information

NVIDIA GPUs in the Cloud

NVIDIA GPUs in the Cloud NVIDIA GPUs in the Cloud 4 EVOLVING CLOUD REQUIREMENTS On premises Off premises Hybrid Cloud Connecting clouds New workloads Components to disrupt 5 GLOBAL CLOUD PLATFORM Unified architecture enabled by

More information

SoftLayer Investments Drive Growth and Improved Customer Experience

SoftLayer Investments Drive Growth and Improved Customer Experience SoftLayer Investments Drive Growth and Improved Customer Experience A Neovise Vendor Perspective Report 2010 Neovise, LLC. All Rights Reserved. Executive Summary Hosting and datacenter services provider

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Key Considerations for Libraries

Key Considerations for Libraries Software as a Service and Cloud Computing: Key Considerations for Libraries 1 I ncreasingly, libraries are considering technology as a strategy. Rather than treating technology as merely tools for completing

More information

Securing the Microsoft Cloud

Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

Global Real Estate Outlook

Global Real Estate Outlook Global Real Estate Outlook August 2014 The Hierarchy of Economic Performance, 2014-2015 China Indonesia India Poland South Korea Turkey Australia Mexico United Kingdom Sweden United States Canada South

More information

Intermedia s Dedicated Exchange

Intermedia s Dedicated Exchange Intermedia s Dedicated Exchange This is a practical guide to implementing Intermedia s Dedicated Hosted Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

Hybrid and Multi Cloud Deployments Via Cloud Exchange

Hybrid and Multi Cloud Deployments Via Cloud Exchange Hybrid and Multi Cloud Deployments Via Cloud Exchange Eric M. Hui Director Service Provider Markets August, 2014 2014 Equinix Inc. www.equinix.com Context Control Flexibility Management Choice Best of

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

Internet Security for Remote Users

Internet Security for Remote Users Internet Security for Remote Users ABSTRACT: This document explains the advantages of cloud-based Internet security services for remote/mobile email and Web users. Traditional gateway or in-house security

More information

Five steps to Cloud Adoption. Laurent De Grauwe Sales Manager Datacenter

Five steps to Cloud Adoption. Laurent De Grauwe Sales Manager Datacenter Five steps to Cloud Adoption Laurent De Grauwe Sales Manager Datacenter 1 How Microsoft defines cloud Microsoft You One consistent experience Service provider Why Microsoft and the cloud? Cloud services

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

Hybrid Cloud Services

Hybrid Cloud Services Hybrid Cloud Services Leverage IaaS platforms to meet demand for hybrid cloud services KVH Private Cloud Integrate multiple cloud components, services and providers Secure L2 Connectivity Public Cloud

More information

Indian E-Retail Congress 2013

Indian E-Retail Congress 2013 The Retail Track The Omni Channel Retail Supply Chain Indian E-Retail Congress 2013 Subhendu Roy Principal Consumer Industries and Retail Practice 15 February, 2013 Disclaimer This document is exclusively

More information

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises

Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises Products and Services INTERNET ACCESS Pacnet Premium Dedicated Internet Access Dedicated Internet Access for Web-Centric Enterprises MEETING THE CRITICAL DEMANDS OF TODAY S MULTI-SITE ENTERPRISES Enterprises

More information

Current Reality: A Look at Cloud Opportunities Beyond the Hype

Current Reality: A Look at Cloud Opportunities Beyond the Hype Outsmart Your Competitors Current Reality: A Look at Cloud Opportunities Beyond the Hype May 17 and 18, 2011 Presented by: Jeremiah Caron, Vice President - Analysis Amy DeCarlo, Principal Analyst Security

More information

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy

Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management

More information

SOFTLAYER TECHNOLOGIES, INC.

SOFTLAYER TECHNOLOGIES, INC. SOFTLAYER TECHNOLOGIES, INC. SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT SYSTEM DESCRIPTION OF THE PLATFORM SERVICES RELEVANT TO SECURITY AND AVAILABILITY TABLE OF CONTENTS REPORT OF INDEPENDENT ACCOUNTANTS...

More information

Cloud Security Certification

Cloud Security Certification Cloud Security Certification January 21, 2015 1 Agenda 1. What problem are we solving? 2. Definitions (Attestation vs Certification) 3. Cloud Security Responsibilities and Risk Exposure 4. Who is responsible

More information

Global Talent Index Highlights

Global Talent Index Highlights 2012 Global Talent Index Highlights Talent is critical to Boston s economic future, and to the future of metropolitan regions around the world. Of all the factors driving economic growth, none is more

More information

SoftLayer an IBM company

SoftLayer an IBM company Government Efficiency through Innovative Reform SoftLayer an IBM company Service Definition i Copyright IBM Corporation 2014 Table of Contents Overview... Error! Bookmark not defined. Major differentiators...

More information

The Evolution of Media Workflows

The Evolution of Media Workflows The Evolution of Media Workflows 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com,

More information

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) DLT Solutions LLC May 2011 Contact Information DLT Cloud Advisory Group 1-855-CLOUD01 (256-8301) cloud@dlt.com dl www.dlt.com/cloud Your Hosts Van Ristau Chief Technology

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

Next Generation Data Centre Connectivity. Cloud Expo Asia 13 November 2013

Next Generation Data Centre Connectivity. Cloud Expo Asia 13 November 2013 Next Generation Data Centre Connectivity Cloud Expo Asia 13 November 2013 Shaun Woodhouse Commercial Director, Singapore 2 Digital Realty overview World s largest investor, developer, owner and operator

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud Computing Risk management @HKQAA Symposium Antony Ma Chairman, CSA-HK&M Chapter Global, not-for-profit organization Over 40,000 individual members, around 200 corporate and affiliate members, 64

More information

T&E. Where Business Travelers Spend Money

T&E. Where Business Travelers Spend Money T&E Where Business Travelers Spend Money Contents Introduction 3 Key Findings 4 Top Expensive Cities for Business Travel 5 International 5 U.S. 5 Top 10 Spend Categories 6 International 6 U.S. 7 Most Visited

More information

Het is een kleine stap naar een hybrid cloud

Het is een kleine stap naar een hybrid cloud Het is een kleine stap naar een hybrid cloud Isabel Moll-Kranenburg Microsoft 14 jaar IT industrie 4 jaar Microsoft Cloud Private Private Cloud Meeting customers where they are The Microsoft Cloud Computing

More information

EVERYBODY S NETWORK CLOUD

EVERYBODY S NETWORK CLOUD PRIVATE INTERNET WAN PUBLIC CONNECT PARTNERS SERVICE PROVIDER CLOUD EVERYBODY S NETWORK CLOUD THE WIN-WIN WAN MARKET CONTEXT The cloud is the new IT architecture for enterprises. 85% of global IT decision-makers

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Singapore Internet Connectivity. Cloud Expo Asia 14 November 2013

Singapore Internet Connectivity. Cloud Expo Asia 14 November 2013 Singapore Internet Connectivity Cloud Expo Asia 14 November 2013 Shaun Woodhouse Commercial Director, Singapore 2 Digital Realty overview World s largest investor, developer, owner and operator of data

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved.

vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved. vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved. Cloud Computing! Exciting! But wait 2009 2014 98% 94% 2% 6% VMs in Public Cloud VMs On-Premises

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society

More information

Architecting the Cloud

Architecting the Cloud Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

IBM Website Monitoring on Cloud

IBM Website Monitoring on Cloud Mark Weatherill APM architect 17th September 2015 IBM Website Monitoring on Cloud Document number 2015 IBM Corporation Important Notice & Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED

More information

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014 IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security

More information

CLOUD BUILT TO PERFORM. Brought to you by

CLOUD BUILT TO PERFORM. Brought to you by CLOUD BUILT TO PERFORM Brought to you by CLOUD BUILT TO PERFORM The Basics What is SoftLayer? The platform built to perform. No two clouds are built the same way. SoftLayer gives you the highest performing

More information