Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson

Size: px
Start display at page:

Download "Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson (robert.rowlingson@bt.com)"

Transcription

1 Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson Theo Dimitrakos Chief Security Researcher, BT Research & Technology Fadi El-Moussa, Joshua Daniel, Gery Ducatel, Pramod Pawar, Ali Sajjad British Telecommunications plc Template Version 1.2 BT Assure. Security that matters

2 Introduction Why Cloud Security? Cyber Security follows» The current threat The threat follows» Criminal opportunity Opportunity arises from» Identification of Targets» Emergence of vulnerabilities Targets and Vulnerabilities emerge from the evolution of new applications for ICT Cloud computing is possibly the biggest trend in ICT BT sees significant growth opportunity as cloud service provider British Telecommunications plc Slide 2

3 Motivation: CIO dilemma: cloud vs. visibility & control I worry about: My privacy Loss of my data The integrity of transactions Harmful cloud applications You have to: Protect IT assets against cyber-threats Account for security incidents. Cloud is cheap use it now! Security is too expensive find a way around it Cybercrime thrives on application/data/ platform/infrastructure security gaps Every cloud journey is a new security project Migration assessment Risk Analysis Architecture Integration costs Operational costs Cloud providers consider application & data protection to be beyond their concern Complicated and expensive for users to protect assets on public or hybrid clouds Confused Security Consultant Cloud users have little visibility or control of CIOhow their assets are protected in the cloud End-User CFO Cloud Provider I guarantee the infrastructure & platform You protect your applications and data Cloud adoption will always be limited until the application/data/infrastructure security & governance gap is filled British Telecommunications plc Template Version 1.2

4 G-Cloud Digital Market Place (previously G-Cloud ServiceStore) The process aims to make it clearer, simpler and faster to find a service on the Digital Marketplace that meets a buyer s requirements. It aims to also reduce the time and cost for suppliers and emphasise finding a service that suits the buyer needs. Suppliers will assert how they meet the Cloud Security Principles by selecting a predefined answer for a range of questions that meet the Cloud Security Principles. Suppliers will then be required to provide evidence and documentation to support their assertion. These self-assertion statements will form part of the Suppliers service entry on the Digital Marketplace. Buyers will be able to assess and compare services with a view as to what meets their specific requirements. Suppliers will be able to continuously update the assertion statements, ensuring that Buyers have the latest information. British Telecommunications plc Template Version 1.2

5 Common capabilities for Cloud Service Stores: basic ecosystem definition Cloud-based British Telecommunications plc Template Version Self-managed 1.2 Fully managed On-premise 5

6 BT Intelligent Protection Core strengths & innovative features In flight intrusion prevention, no down time Comprehensive security solution: Virtual firewall, IPS, Security Patch management, Anti-malware 360 o Protection of customer applications Build for Cloud/VDC- hypervisor level security, more effective, easier to integrate into the cloud Intelligent Protection British Telecommunications plc Security Dashboard Cloud portal Slide 6

7 Intelligent Protection Service Security is secretly out of control Protection of Systems & Apps in the Cloud What is it? A cloud security service that has ben designed and developed to address customer demand for protecting virtual servers and hosted applications on cloud infrastructures. Supports multiple cloud service providers, including BT Cloud Compute, Amazon EC2, vcloud etc. Comprehensive security solution: Virtual firewall, Intrusion Prevention/Detection, Security Patch management, Anti-malware. Deploy security patching & intrusion prevention with no down time. Central Security Portal to manage protection in Multiple Cloud Platforms. Automatically Protect deployed applications / systems in Virtual Environment. Flexible delivery of protection: At Hypervisor / virtualisation management level. By self-installing agents on 3 rd party environments. Automatically integrate with Application Deployment via Service Store. Current status Inclusion in BT Compute product roadmap About to go live in the next release of BT Cloud Compute. Market place and intelligent protection service can be used to autoprovision on most popular cloud infrastructure / platform providers Benefits Reduction of complexity through integration with the cloud environment for automatic capability provisioning, life-cycle management and inventory synchronisation. Provides vulnerability protection. Eliminates the cost and risk of deployment, integration and management of complex security software or appliances. Next steps BT Assure portfolio proposition multi-cloud version BT Advice proposition security policy management consultancy BT Wholesale Proposition multi-cloud VSP version DEMO at

8 High level architecture of Intelligent Protection Capability

9 New customer experience Simplify how a customer can achieve and maintain security and compliance in the cloud whilst reducing cost and simplifying policy management. Fusion Make security management integral part of cloud application assembly Uniformity and Customisation Automation Versatility Universality integrity &security functions become managed parameters while the form and coverage of the functions automatically adjust to user selection. click-to-buy security services click-to-build secure applications in less than 5 clicks. automatic generation of recommended security policy based on vulnerability analysis of the application stack, cloud characteristics, user preferences and desired business impact levels; one cloud-based service securing applications and data on multiple private and public cloud infrastructures and platforms Visibility Automatically generated customisable security dashboard per user Unifying view of the security state of user s applications on any cloud Control enables enforcing a common security policy to all instances of an application on multiple cloud environments.

10 Automatic Application Protection Cloud Service Provisioning During Application Provisioning, Customers / Tenants: Purchase intelligent protection License for the required Security Modules (Firewall, Anti-Malware, Intrusion Detection, Integrity Monitoring, Log Inspection) Select an Application from the Application Market Place. Automatic Protect deployed Application with selected Security Options. 10

11 Automatic Application Protection 11

12 Automatic Application Protection 12

13 Automatic Application Protection 13

14 Automatic Application Protection 14

15 Case Study 1: Trusted Personal Data EIT ICT Labs High Impact Initiative for Trusted Data Management and Service Infrastructure Developing the Cloud Incubator platform Will develop APIs for the on-boarding of new innovative trusted services - as reusable capabilities on BT's cloud service store For partner applications (e.g. Telecom Italia) and SMEs via a funding competition BT is developing a data protection capability offering encryption as a service

16 Eastfield Welcome to Eastfield Mall

17 Case Studies 2: OPTIMIS A Cloud Broker architecture developed under FP7 To support organisations to externalise services and applications to trustworthy Cloud providers Key aspects of the Cloud Broker architecture proposed includes: i) Maximization of the user choice; ii) Multi-tier reseller model and user driven customization; iii) Provision of services on multi-tier reseller model; iv) Harmonization of high-value enhancements. 17

18 CASE Studies 3: Fed4Fire Orchestration of Cloud and user resources for provisioning and operating Intelligent Protection The IPCS4Fire experiment is currently being tested on following testbeds: Virtual Wall, W- Lab, BonFire and PlanetLab Europe.

19 Overview of the system used in the Fed4FIRE experiment

20 Case Study 4: Pilot use for public sector services (STRATEGIC) Aims to facilitate European public bodies and regional government to adopt public Cloud services Three pilot partners: Municipality of Camden (UK), City of Genoa (Italy) and Municipality of Stari Grad (Serbia) Sensitive data and multi-tiered applications involving deployment over multiple servers across Cloud infrastructures

21 Success: use in trials and production Exposure via a global cloud service 16platforms across 4 continents 45 data centres 4 global customer service centre hubs and 22 satellite centres operating 24/7 and serving businesses in 198 countries. protect future revenue of over 68M over 3 years. Incorporated into BT Cloud Compute release roadmap as a value-add feature UK: London Borough of Camden Italy: City of Genoa Serbia: Strati-Grand, Belgrade Exposure to 2000 users of public services Enable secure consumption of public services across European regions Baseline technology for governmental cloud pilots Part of Trusted Cloud Platform - EIT ICT Labs High Impact Initiative To be exposed to UK SMEs for as a co-innovation platform by the ICT Catapult in the UK Platform of choice for future research on cyber-security attack analysis and prevention by Imperial College London UK Global Uncertainties programme Baseline platform for Trusted Cloud innovation by SMEs

22 Fusion Make security management integral part of cloud application assembly Summary integrity &security functions become managed parameters automatic generation of recommended security policy Unifying view of the security state of user s applications on any cloud Ubiquity Automated Versatile Universal Visibility Control click-to-buy security services click-to-build secure applications in less than 5 clicks. one service protecting applications and data on multiple clouds enables enforcing a common enterprise security policy across clouds Exposure in production via a global cloud service (BT Cloud Compute) Exposure to 2000 users of public services UK Research & Development Product Development Core Service operations The benefit has been in convincing the customer that Securityis not just in our DNA, it's something that they can embed in their DNA with a single click! David Cairns, Principle Solutions Architect, BT Cloud Compute

23

BT Assure. Security that matters. British Telecommunications plc Template Version 1.2

BT Assure. Security that matters. British Telecommunications plc Template Version 1.2 BT Cloud Enterprise Service Store with Intelligent Protection Rob Rowlingson Principal Security Researcher, BT Research & Technology Contact: robert.rowlingson@bt.com BT Assure. Security that matters Motivation:

More information

Security-as-a-Service in Multi-cloud and Federated Cloud Environments

Security-as-a-Service in Multi-cloud and Federated Cloud Environments Security-as-a-Service in Multi-cloud and Federated Cloud Environments Pramod S. Pawar 1, Ali Sajjad 1, Theo Dimitrakos 1,2, David W Chadwick 1 1 The University of Kent, Canterbury, Kent CT2 7NZ, United

More information

Cloud Security Challenges and Guidelines

Cloud Security Challenges and Guidelines Cloud Security Challenges and Guidelines Theo Dimitrakos Chief Security Researcher, BT Research & Technology Professor of Computer Science, University of Kent Contact: theo.dimitrakos@bt.com British Telecommunications

More information

Accenture Cloud Platform Unlocks Agility and Control

Accenture Cloud Platform Unlocks Agility and Control Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

HP S POINT OF VIEW TO CLOUD

HP S POINT OF VIEW TO CLOUD HP S POINT OF VIEW TO CLOUD Frank Bloch Director Technology Consulting 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 3 GLOBAL MEGA

More information

Cloud Computing and Data Center Consolidation

Cloud Computing and Data Center Consolidation Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Digital Marketplace - G-Cloud

Digital Marketplace - G-Cloud Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Economic Benefits of Cisco CloudVerse

Economic Benefits of Cisco CloudVerse Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

PARTNER PROGRAMME GUIDE

PARTNER PROGRAMME GUIDE PARTNER PROGRAMME GUIDE Content Introduction...3 Committed to Partnerships...4 Market Environment...4 Discover Dimension Data Cloud...5 Partner Programme Overview...6 Why become a Dimension Data partner?...7

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

BT Virtual Data Centre. Craig Parker Proposition Manager Andy Weller Product Manager

BT Virtual Data Centre. Craig Parker Proposition Manager Andy Weller Product Manager BT Virtual Data Centre Craig Parker Proposition Manager Andy Weller Product Manager BT Global Services - Data Centre Services Customers 1,994 customer platforms across EMEA Reach, Skills and Capabilities

More information

HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P.

HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P. HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY 1 INSTANT-ON ENTERPRISE Everything and everyone s connected Everyone expects immediate gratification and instant results Business & IT one and

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

G CLOUD SERVICE DEFINITION

G CLOUD SERVICE DEFINITION G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: info@ashtoncourt.com Web: www.ashtoncourt.com

More information

Maximizing Configuration Management IT Security Benefits with Puppet

Maximizing Configuration Management IT Security Benefits with Puppet White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops

More information

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National

More information

G CLOUD SERVICE DEFINITION

G CLOUD SERVICE DEFINITION G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: info@ashtoncourt.com Web: www.ashtoncourt.com

More information

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers

HP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers HP CLOUDSYSTEM A single platform for private, public, and hybrid clouds Simply the most complete cloud system for enterprises and service providers Solution brief It s a fact of life: cloud computing is

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions

More information

Enterprise Security and Risk Management

Enterprise Security and Risk Management Enterprise Security and Risk Management Growth, innovation, efficiency depend on security HP protects what matters Banking Manufacturing Public Sector $9 trillion USD per day 1000+ Business processes 13

More information

CIO SUMMIT l LAS VEGAS

CIO SUMMIT l LAS VEGAS CIO SUMMIT l LAS VEGAS Copyright 2014 EMC Corporation. All rights reserved. 1 IT Transformation Facilitator: Tom Roloff, SVP Global Services, EMC Many Industries Face Structural Change 3 Today s Business

More information

Transform service delivery with HP Cloud Management

Transform service delivery with HP Cloud Management Transform service delivery with HP Cloud Management Christian Dinten, Software Pre-Sales, Hewlett-Packard The state of IT today IT is stretched too far Slower IT response Loss of controls & governance

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

RightScale mycloud with Eucalyptus

RightScale mycloud with Eucalyptus Swiftly Deploy Private and Hybrid Clouds with a Single Pane of Glass View into Cloud Infrastructure Enable Fast, Easy, and Robust Cloud Computing with RightScale and Eucalyptus Overview As organizations

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Vodafone Private Cloud

Vodafone Private Cloud Vodafone Co-location Secure, resilient, energy efficient space for your IT equipment in our data centres Vodafone Private Cloud Reduce your infrastructure costs and be more flexible, secure and in control,

More information

HRO in the cloud? What does the new generation of HR systems mean for HR sourcing?

HRO in the cloud? What does the new generation of HR systems mean for HR sourcing? Alsbridge Insights HRO in the cloud? What does the new generation of HR systems mean for HR sourcing? Executive Summary A number of new cloud based multi-process HR systems are competing for the attention

More information

Software defined networking. Your path to an agile hybrid cloud network

Software defined networking. Your path to an agile hybrid cloud network Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?

More information

Managed Cloud Services

Managed Cloud Services Managed Services From Data Centre to Managed Public Traditional data centre Virtual Data Centre In-house Dedicated External Multi-tenant External Managed Public Consulting approach: Breakdown of Business

More information

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure

More information

Comprehensive real-time protection against Advanced Threats and data theft

Comprehensive real-time protection against Advanced Threats and data theft TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Interoute Virtual Data Centre. Hands on cloud control.

Interoute Virtual Data Centre. Hands on cloud control. Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute

More information

Copyright 2013 enstratius, Inc.

Copyright 2013 enstratius, Inc. The Enterprise Cloud Management Solution Copyright 2013 enstratius, Inc. Enstratius is a cloud infrastructure management solution for deploying and managing enterprise-class applications in public, private

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

NTT i 3 Cloud Services Orchestration Platform

NTT i 3 Cloud Services Orchestration Platform NTT i 3 Cloud Services Orchestration Platform Enabling the Digital Business 2 Our Point of View Cloud computing is a business imperative, not just a technology trend IaaS, PaaS and SaaS are becoming mainstream,

More information

A7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP

A7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP A7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP Jens-Peter Jensen (SAP SE) Public Use this title slide only with an image Disclaimer

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader

IBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation

More information

Cisco Cloud Enablement Services for Adopting Clouds

Cisco Cloud Enablement Services for Adopting Clouds Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud

More information

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools

Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools IT Enterprise Services Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools The freedom and agility which cloud unleashes directly impacts business performance. Cloud productivity

More information

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services

ISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better

More information

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud?

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Analyst: William Fellows 21 Jan, 2015 The Accenture Cloud Platform (ACP) is now at a v3 release. The first two iterations were mostly consumed

More information

Virtualization and IaaS management

Virtualization and IaaS management CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization

More information

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises agility PLATFORM Product Whitepaper An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises ServiceMesh 233 Wilshire Blvd,

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Moving to a new dimension of networks. Connect IQ: evaluator

Moving to a new dimension of networks. Connect IQ: evaluator Moving to a new dimension of networks Connect IQ: evaluator Welcome to Connect IQ evaluator We begin the journey into the new network dimension with the BT Connect IQ evaluator. This is a complimentary

More information

Managing the Challenges of Cloud Management November 7, 2013

Managing the Challenges of Cloud Management November 7, 2013 Copyright 2013 Vivit Worldwide Managing the Challenges of Cloud Management November 7, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Mihai Grigorescu Vivit Chapter Leader South Africa

More information

FLEXIANT. Utility Computing on Demand

FLEXIANT. Utility Computing on Demand FLEXIANT Utility Computing on Demand Flexiant Flexiant is a software and services company, one of the world's first public/private Cloud providers. We provide cloud infrastructure software and services

More information

Economic Benefits of Cisco CloudVerse

Economic Benefits of Cisco CloudVerse Economic Benefits of Cisco CloudVerse Key Takeaways Executive Summary Cloud architecture enables IT to be delivered as a service and delivered only when it is needed over the network from central, secure

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development

WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud odysseas.pyrovolakis@ec.europa.eu

More information

Start New Conversations, Open New Doors

Start New Conversations, Open New Doors @ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing

More information

AWS Service Catalog. User Guide

AWS Service Catalog. User Guide AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information

WHOLESALE SIP TRUNKING

WHOLESALE SIP TRUNKING 1 WE MAKE IT POSSIBLE The dawn of a new era of communications BT Wholesale s how new technology can bring new opportunities. 2 The dawn of a new era of communications The world of communications is changing,

More information

Putting Operators at the Centre of

Putting Operators at the Centre of Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified

More information

Please give me your feedback

Please give me your feedback Please give me your feedback Session DF3117 Speaker Felix Fernandez Use the mobile app to complete a session survey 1. Access My schedule 2. Click on this session 3. Go to Rate & review If the session

More information

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center

Data Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA

Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Technology shifts center on applications Advanced threats APIs Internet of things Mobility SDDC/Cloud

More information

10 BenefIts. that only an Integrated platform security solution can BrIng

10 BenefIts. that only an Integrated platform security solution can BrIng If It s not KaspersKy endpoint security for BusIness, It s not an endpoint protection platform 10 BenefIts that only an Integrated platform security solution can BrIng Kaspersky Lab s Global IT Security

More information

INFRASTRUCTURE ARCHITECTURE BLUEPRINT

INFRASTRUCTURE ARCHITECTURE BLUEPRINT INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview

More information

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation

Healthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

Secure Cloud Computing

Secure Cloud Computing Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for

More information

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.

ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service

More information

Guide to AWS. Brought to you by

Guide to AWS. Brought to you by Guide to AWS Brought to you by Welcome to Ingram Micro Cloud For more than 35 years, Ingram Micro a Fortune 100 company with $30 billion in annual revenue has been successfully connecting IT technology

More information

Connect for new business opportunities

Connect for new business opportunities Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine

More information

VMware vcloud Networking and Security Overview

VMware vcloud Networking and Security Overview VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility

More information

SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013

SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013 SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013 SAP HANA Cloud Platform for SuccessFactors Executive Summary The SAP HANA Cloud Platform for SuccessFactors is a new solution,

More information

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to

More information

GCloud 7 Hybrid Cloud Management Service- Service Description Issue 1

GCloud 7 Hybrid Cloud Management Service- Service Description Issue 1 Overview of the Hybrid Cloud Management Ideal recognise that enterprises wishing to leverage hybrid (private and public) cloud infrastructure face a number of key technical and organisational challenges:

More information

DNS Server Security Survey

DNS Server Security Survey EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security

More information

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational

More information

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1

BT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1 BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for

More information

HP Helion, Cloud and the customer reality in the UK

HP Helion, Cloud and the customer reality in the UK HP Helion, Cloud and the customer reality in the UK 11.40 Thursday 9 th October 2014 Presented by Alexis Cheshire, CIO, The Scout Association Iain Mobberley, Technology Director, OCSL Introduction UK Cloud

More information

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today

More information

BT Unified Trading communication. The Future Delivered

BT Unified Trading communication. The Future Delivered BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based

More information