Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson
|
|
- Stephanie Simmons
- 8 years ago
- Views:
Transcription
1 Intelligent Protection for Applications in the Cloud Industrial Case Studies Rob Rowlingson Theo Dimitrakos Chief Security Researcher, BT Research & Technology Fadi El-Moussa, Joshua Daniel, Gery Ducatel, Pramod Pawar, Ali Sajjad British Telecommunications plc Template Version 1.2 BT Assure. Security that matters
2 Introduction Why Cloud Security? Cyber Security follows» The current threat The threat follows» Criminal opportunity Opportunity arises from» Identification of Targets» Emergence of vulnerabilities Targets and Vulnerabilities emerge from the evolution of new applications for ICT Cloud computing is possibly the biggest trend in ICT BT sees significant growth opportunity as cloud service provider British Telecommunications plc Slide 2
3 Motivation: CIO dilemma: cloud vs. visibility & control I worry about: My privacy Loss of my data The integrity of transactions Harmful cloud applications You have to: Protect IT assets against cyber-threats Account for security incidents. Cloud is cheap use it now! Security is too expensive find a way around it Cybercrime thrives on application/data/ platform/infrastructure security gaps Every cloud journey is a new security project Migration assessment Risk Analysis Architecture Integration costs Operational costs Cloud providers consider application & data protection to be beyond their concern Complicated and expensive for users to protect assets on public or hybrid clouds Confused Security Consultant Cloud users have little visibility or control of CIOhow their assets are protected in the cloud End-User CFO Cloud Provider I guarantee the infrastructure & platform You protect your applications and data Cloud adoption will always be limited until the application/data/infrastructure security & governance gap is filled British Telecommunications plc Template Version 1.2
4 G-Cloud Digital Market Place (previously G-Cloud ServiceStore) The process aims to make it clearer, simpler and faster to find a service on the Digital Marketplace that meets a buyer s requirements. It aims to also reduce the time and cost for suppliers and emphasise finding a service that suits the buyer needs. Suppliers will assert how they meet the Cloud Security Principles by selecting a predefined answer for a range of questions that meet the Cloud Security Principles. Suppliers will then be required to provide evidence and documentation to support their assertion. These self-assertion statements will form part of the Suppliers service entry on the Digital Marketplace. Buyers will be able to assess and compare services with a view as to what meets their specific requirements. Suppliers will be able to continuously update the assertion statements, ensuring that Buyers have the latest information. British Telecommunications plc Template Version 1.2
5 Common capabilities for Cloud Service Stores: basic ecosystem definition Cloud-based British Telecommunications plc Template Version Self-managed 1.2 Fully managed On-premise 5
6 BT Intelligent Protection Core strengths & innovative features In flight intrusion prevention, no down time Comprehensive security solution: Virtual firewall, IPS, Security Patch management, Anti-malware 360 o Protection of customer applications Build for Cloud/VDC- hypervisor level security, more effective, easier to integrate into the cloud Intelligent Protection British Telecommunications plc Security Dashboard Cloud portal Slide 6
7 Intelligent Protection Service Security is secretly out of control Protection of Systems & Apps in the Cloud What is it? A cloud security service that has ben designed and developed to address customer demand for protecting virtual servers and hosted applications on cloud infrastructures. Supports multiple cloud service providers, including BT Cloud Compute, Amazon EC2, vcloud etc. Comprehensive security solution: Virtual firewall, Intrusion Prevention/Detection, Security Patch management, Anti-malware. Deploy security patching & intrusion prevention with no down time. Central Security Portal to manage protection in Multiple Cloud Platforms. Automatically Protect deployed applications / systems in Virtual Environment. Flexible delivery of protection: At Hypervisor / virtualisation management level. By self-installing agents on 3 rd party environments. Automatically integrate with Application Deployment via Service Store. Current status Inclusion in BT Compute product roadmap About to go live in the next release of BT Cloud Compute. Market place and intelligent protection service can be used to autoprovision on most popular cloud infrastructure / platform providers Benefits Reduction of complexity through integration with the cloud environment for automatic capability provisioning, life-cycle management and inventory synchronisation. Provides vulnerability protection. Eliminates the cost and risk of deployment, integration and management of complex security software or appliances. Next steps BT Assure portfolio proposition multi-cloud version BT Advice proposition security policy management consultancy BT Wholesale Proposition multi-cloud VSP version DEMO at
8 High level architecture of Intelligent Protection Capability
9 New customer experience Simplify how a customer can achieve and maintain security and compliance in the cloud whilst reducing cost and simplifying policy management. Fusion Make security management integral part of cloud application assembly Uniformity and Customisation Automation Versatility Universality integrity &security functions become managed parameters while the form and coverage of the functions automatically adjust to user selection. click-to-buy security services click-to-build secure applications in less than 5 clicks. automatic generation of recommended security policy based on vulnerability analysis of the application stack, cloud characteristics, user preferences and desired business impact levels; one cloud-based service securing applications and data on multiple private and public cloud infrastructures and platforms Visibility Automatically generated customisable security dashboard per user Unifying view of the security state of user s applications on any cloud Control enables enforcing a common security policy to all instances of an application on multiple cloud environments.
10 Automatic Application Protection Cloud Service Provisioning During Application Provisioning, Customers / Tenants: Purchase intelligent protection License for the required Security Modules (Firewall, Anti-Malware, Intrusion Detection, Integrity Monitoring, Log Inspection) Select an Application from the Application Market Place. Automatic Protect deployed Application with selected Security Options. 10
11 Automatic Application Protection 11
12 Automatic Application Protection 12
13 Automatic Application Protection 13
14 Automatic Application Protection 14
15 Case Study 1: Trusted Personal Data EIT ICT Labs High Impact Initiative for Trusted Data Management and Service Infrastructure Developing the Cloud Incubator platform Will develop APIs for the on-boarding of new innovative trusted services - as reusable capabilities on BT's cloud service store For partner applications (e.g. Telecom Italia) and SMEs via a funding competition BT is developing a data protection capability offering encryption as a service
16 Eastfield Welcome to Eastfield Mall
17 Case Studies 2: OPTIMIS A Cloud Broker architecture developed under FP7 To support organisations to externalise services and applications to trustworthy Cloud providers Key aspects of the Cloud Broker architecture proposed includes: i) Maximization of the user choice; ii) Multi-tier reseller model and user driven customization; iii) Provision of services on multi-tier reseller model; iv) Harmonization of high-value enhancements. 17
18 CASE Studies 3: Fed4Fire Orchestration of Cloud and user resources for provisioning and operating Intelligent Protection The IPCS4Fire experiment is currently being tested on following testbeds: Virtual Wall, W- Lab, BonFire and PlanetLab Europe.
19 Overview of the system used in the Fed4FIRE experiment
20 Case Study 4: Pilot use for public sector services (STRATEGIC) Aims to facilitate European public bodies and regional government to adopt public Cloud services Three pilot partners: Municipality of Camden (UK), City of Genoa (Italy) and Municipality of Stari Grad (Serbia) Sensitive data and multi-tiered applications involving deployment over multiple servers across Cloud infrastructures
21 Success: use in trials and production Exposure via a global cloud service 16platforms across 4 continents 45 data centres 4 global customer service centre hubs and 22 satellite centres operating 24/7 and serving businesses in 198 countries. protect future revenue of over 68M over 3 years. Incorporated into BT Cloud Compute release roadmap as a value-add feature UK: London Borough of Camden Italy: City of Genoa Serbia: Strati-Grand, Belgrade Exposure to 2000 users of public services Enable secure consumption of public services across European regions Baseline technology for governmental cloud pilots Part of Trusted Cloud Platform - EIT ICT Labs High Impact Initiative To be exposed to UK SMEs for as a co-innovation platform by the ICT Catapult in the UK Platform of choice for future research on cyber-security attack analysis and prevention by Imperial College London UK Global Uncertainties programme Baseline platform for Trusted Cloud innovation by SMEs
22 Fusion Make security management integral part of cloud application assembly Summary integrity &security functions become managed parameters automatic generation of recommended security policy Unifying view of the security state of user s applications on any cloud Ubiquity Automated Versatile Universal Visibility Control click-to-buy security services click-to-build secure applications in less than 5 clicks. one service protecting applications and data on multiple clouds enables enforcing a common enterprise security policy across clouds Exposure in production via a global cloud service (BT Cloud Compute) Exposure to 2000 users of public services UK Research & Development Product Development Core Service operations The benefit has been in convincing the customer that Securityis not just in our DNA, it's something that they can embed in their DNA with a single click! David Cairns, Principle Solutions Architect, BT Cloud Compute
23
BT Assure. Security that matters. British Telecommunications plc Template Version 1.2
BT Cloud Enterprise Service Store with Intelligent Protection Rob Rowlingson Principal Security Researcher, BT Research & Technology Contact: robert.rowlingson@bt.com BT Assure. Security that matters Motivation:
More informationSecurity-as-a-Service in Multi-cloud and Federated Cloud Environments
Security-as-a-Service in Multi-cloud and Federated Cloud Environments Pramod S. Pawar 1, Ali Sajjad 1, Theo Dimitrakos 1,2, David W Chadwick 1 1 The University of Kent, Canterbury, Kent CT2 7NZ, United
More informationCloud Security Challenges and Guidelines
Cloud Security Challenges and Guidelines Theo Dimitrakos Chief Security Researcher, BT Research & Technology Professor of Computer Science, University of Kent Contact: theo.dimitrakos@bt.com British Telecommunications
More informationAccenture Cloud Platform Unlocks Agility and Control
Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationTrend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
More informationHP S POINT OF VIEW TO CLOUD
HP S POINT OF VIEW TO CLOUD Frank Bloch Director Technology Consulting 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice 3 GLOBAL MEGA
More informationCloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationThe SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationDigital Marketplace - G-Cloud
Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We
More informationDOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
More informationEconomic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Executive Summary Cloud enables IT to be delivered as a service, when and wherever it is needed, from central, secure, public and private data centers. Enterprises
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationPARTNER PROGRAMME GUIDE
PARTNER PROGRAMME GUIDE Content Introduction...3 Committed to Partnerships...4 Market Environment...4 Discover Dimension Data Cloud...5 Partner Programme Overview...6 Why become a Dimension Data partner?...7
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationBT Virtual Data Centre. Craig Parker Proposition Manager Andy Weller Product Manager
BT Virtual Data Centre Craig Parker Proposition Manager Andy Weller Product Manager BT Global Services - Data Centre Services Customers 1,994 customer platforms across EMEA Reach, Skills and Capabilities
More informationHP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY. Copyright 2011 Hewlett-Packard Development Company, L.P.
HP CLOUD STRATEGY AND SOLUTIONS THE PATH TO HYBRID DELIVERY 1 INSTANT-ON ENTERPRISE Everything and everyone s connected Everyone expects immediate gratification and instant results Business & IT one and
More informationSecuring the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
More informationG CLOUD SERVICE DEFINITION
G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: info@ashtoncourt.com Web: www.ashtoncourt.com
More informationMaximizing Configuration Management IT Security Benefits with Puppet
White Paper Maximizing Configuration Management IT Security Benefits with Puppet OVERVIEW No matter what industry your organization is in or whether your role is concerned with managing employee desktops
More informationAccelerating Software Security With HP. Rob Roy Federal CTO HP Software
Accelerating Software Security With HP Rob Roy Federal CTO HP Software If we were in a cyberwar today, the United States would lose. Mike McConnell Former DNI, NSA. Head of Booz Allen Hamilton National
More informationG CLOUD SERVICE DEFINITION
G CLOUD SERVICE DEFINITION Ashton Court Group Ltd Thorpewood Management Centre Blisworth Road Courteenhall Northampton NN7 2QB Tel: + 44 1604 864 781 Email: info@ashtoncourt.com Web: www.ashtoncourt.com
More informationHP CLOUDSYSTEM. A single platform for private, public, and hybrid clouds. Simply the most complete cloud system for enterprises and service providers
HP CLOUDSYSTEM A single platform for private, public, and hybrid clouds Simply the most complete cloud system for enterprises and service providers Solution brief It s a fact of life: cloud computing is
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationAPAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION
APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance
More informationOVERVIEW. Enterprise Security Solutions
Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s
More informationVICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions
More informationEnterprise Security and Risk Management
Enterprise Security and Risk Management Growth, innovation, efficiency depend on security HP protects what matters Banking Manufacturing Public Sector $9 trillion USD per day 1000+ Business processes 13
More informationCIO SUMMIT l LAS VEGAS
CIO SUMMIT l LAS VEGAS Copyright 2014 EMC Corporation. All rights reserved. 1 IT Transformation Facilitator: Tom Roloff, SVP Global Services, EMC Many Industries Face Structural Change 3 Today s Business
More informationTransform service delivery with HP Cloud Management
Transform service delivery with HP Cloud Management Christian Dinten, Software Pre-Sales, Hewlett-Packard The state of IT today IT is stretched too far Slower IT response Loss of controls & governance
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More informationRightScale mycloud with Eucalyptus
Swiftly Deploy Private and Hybrid Clouds with a Single Pane of Glass View into Cloud Infrastructure Enable Fast, Easy, and Robust Cloud Computing with RightScale and Eucalyptus Overview As organizations
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationVodafone Private Cloud
Vodafone Co-location Secure, resilient, energy efficient space for your IT equipment in our data centres Vodafone Private Cloud Reduce your infrastructure costs and be more flexible, secure and in control,
More informationHRO in the cloud? What does the new generation of HR systems mean for HR sourcing?
Alsbridge Insights HRO in the cloud? What does the new generation of HR systems mean for HR sourcing? Executive Summary A number of new cloud based multi-process HR systems are competing for the attention
More informationSoftware defined networking. Your path to an agile hybrid cloud network
Software defined networking Your path to an agile hybrid cloud network Is your enterprise network ready for the latest business and consumer trends? Cloud How easily can your users connect to cloud resources?
More informationManaged Cloud Services
Managed Services From Data Centre to Managed Public Traditional data centre Virtual Data Centre In-house Dedicated External Multi-tenant External Managed Public Consulting approach: Breakdown of Business
More informationIntel IT s Cloud Journey. Speaker: [speaker name], Intel IT
Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure
More informationComprehensive real-time protection against Advanced Threats and data theft
TRITON AP-WEB Comprehensive real-time protection against Advanced Threats and data theft Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationInteroute Virtual Data Centre. Hands on cloud control.
Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute
More informationCopyright 2013 enstratius, Inc.
The Enterprise Cloud Management Solution Copyright 2013 enstratius, Inc. Enstratius is a cloud infrastructure management solution for deploying and managing enterprise-class applications in public, private
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationNTT i 3 Cloud Services Orchestration Platform
NTT i 3 Cloud Services Orchestration Platform Enabling the Digital Business 2 Our Point of View Cloud computing is a business imperative, not just a technology trend IaaS, PaaS and SaaS are becoming mainstream,
More informationA7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP
A7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP Jens-Peter Jensen (SAP SE) Public Use this title slide only with an image Disclaimer
More informationVodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
More informationIBM & Cloud Computing. Smarter Planet. John Easton UK & Ireland Cloud Computing Technical Leader
Cloud Getting hold Computing of the cloud: for a & Cloud Computing Smarter Planet John Easton UK & Ireland Cloud Computing Technical Leader Copyright Corporation 2010 Cloud is important to Corporation
More informationCisco Cloud Enablement Services for Adopting Clouds
Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud
More informationCapita Productivity Hub Combining secure private cloud with familiar Microsoft tools
IT Enterprise Services Capita Productivity Hub Combining secure private cloud with familiar Microsoft tools The freedom and agility which cloud unleashes directly impacts business performance. Cloud productivity
More informationISSUE BRIEF. Cloud Security for Federal Agencies. Achieving greater efficiency and better security through federally certified cloud services
ISSUE BRIEF Cloud Security for Federal Agencies Achieving greater efficiency and better security through federally certified cloud services This paper is intended to help federal agency executives to better
More informationAccenture Cloud Platform at v3 - the Airbnb or Uber of cloud?
Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Analyst: William Fellows 21 Jan, 2015 The Accenture Cloud Platform (ACP) is now at a v3 release. The first two iterations were mostly consumed
More informationVirtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
More informationAn enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises
agility PLATFORM Product Whitepaper An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises ServiceMesh 233 Wilshire Blvd,
More informationThe Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
More informationMoving to a new dimension of networks. Connect IQ: evaluator
Moving to a new dimension of networks Connect IQ: evaluator Welcome to Connect IQ evaluator We begin the journey into the new network dimension with the BT Connect IQ evaluator. This is a complimentary
More informationManaging the Challenges of Cloud Management November 7, 2013
Copyright 2013 Vivit Worldwide Managing the Challenges of Cloud Management November 7, 2013 Brought to you by Copyright 2013 Vivit Worldwide Hosted by Mihai Grigorescu Vivit Chapter Leader South Africa
More informationFLEXIANT. Utility Computing on Demand
FLEXIANT Utility Computing on Demand Flexiant Flexiant is a software and services company, one of the world's first public/private Cloud providers. We provide cloud infrastructure software and services
More informationEconomic Benefits of Cisco CloudVerse
Economic Benefits of Cisco CloudVerse Key Takeaways Executive Summary Cloud architecture enables IT to be delivered as a service and delivered only when it is needed over the network from central, secure
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationThe promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services
The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationWORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development
WORK PROGRAMME 2014 2015 Topic ICT 9: Tools and Methods for Software Development Dr. Odysseas I. PYROVOLAKIS European Commission DG CONNECT Software & Services, Cloud odysseas.pyrovolakis@ec.europa.eu
More informationStart New Conversations, Open New Doors
@ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing
More informationAWS Service Catalog. User Guide
AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in
More informationWHOLESALE SIP TRUNKING
1 WE MAKE IT POSSIBLE The dawn of a new era of communications BT Wholesale s how new technology can bring new opportunities. 2 The dawn of a new era of communications The world of communications is changing,
More informationPutting Operators at the Centre of
Putting Operators at the Centre of Enterprise Mobile Security Introduction Small and Medium Enterprises make up the majority of firms and employees in all major economies, yet are largely unidentified
More informationPlease give me your feedback
Please give me your feedback Session DF3117 Speaker Felix Fernandez Use the mobile app to complete a session survey 1. Access My schedule 2. Click on this session 3. Go to Rate & review If the session
More informationData Center is the Foundation of Carrier ICT Transformation. The challenges of building a service driven data center
P a g e 1 Data Center is the Foundation of Carrier ICT Transformation As we transform into the digital economy, the role of the Data Center has evolved from just being a container holding its individual
More information2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More informationCloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA
Cloud.. Migration? Bursting? Orchestration? Vincent Lavergne SED EMEA, South Gary Newe Sr SEM EMEA, UKISA Technology shifts center on applications Advanced threats APIs Internet of things Mobility SDDC/Cloud
More information10 BenefIts. that only an Integrated platform security solution can BrIng
If It s not KaspersKy endpoint security for BusIness, It s not an endpoint protection platform 10 BenefIts that only an Integrated platform security solution can BrIng Kaspersky Lab s Global IT Security
More informationINFRASTRUCTURE ARCHITECTURE BLUEPRINT
INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview
More informationHealthcare: La sicurezza nel Cloud October 18, 2011. 2011 IBM Corporation
Healthcare: La sicurezza nel Cloud October 18, 2011 Cloud Computing Tests The Limits Of Security Operations And Infrastructure Security and Privacy Domains People and Identity Data and Information Application
More informationIBM Security Intrusion Prevention Solutions
IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints
More informationThe New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe
The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
More informationGuide to AWS. Brought to you by
Guide to AWS Brought to you by Welcome to Ingram Micro Cloud For more than 35 years, Ingram Micro a Fortune 100 company with $30 billion in annual revenue has been successfully connecting IT technology
More informationConnect for new business opportunities
Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationSAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013
SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013 SAP HANA Cloud Platform for SuccessFactors Executive Summary The SAP HANA Cloud Platform for SuccessFactors is a new solution,
More informationWhite Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase
White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to
More informationGCloud 7 Hybrid Cloud Management Service- Service Description Issue 1
Overview of the Hybrid Cloud Management Ideal recognise that enterprises wishing to leverage hybrid (private and public) cloud infrastructure face a number of key technical and organisational challenges:
More informationDNS Server Security Survey
EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationHybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
More informationSECURING YOUR MODERN DATA CENTER WITH CHECK POINT
SECURING YOUR MODERN DATA CENTER WITH CHECK POINT Javier Hijas Security Architect Check Point Europe 1 Agenda 1 2 3 4 What Questions is a modern / Answers datacenter Datacenter protection evolution Security
More informationTRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION
www.wipro.com TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION Renaissance Delivery Experience Ecosystem Sabir Ahmad Senior Architect ... Table of Content Introduction 3 Driving Transformational
More informationBT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationHP Helion, Cloud and the customer reality in the UK
HP Helion, Cloud and the customer reality in the UK 11.40 Thursday 9 th October 2014 Presented by Alexis Cheshire, CIO, The Scout Association Iain Mobberley, Technology Director, OCSL Introduction UK Cloud
More information3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
More informationLogicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device
Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today
More informationBT Unified Trading communication. The Future Delivered
BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based
More information