The most elegant solutions are the ones that take complicated

Size: px
Start display at page:

Download "The most elegant solutions are the ones that take complicated"

Transcription

1 ISSA PREEMINENT TRUSTED GLOBAL INFORMATION SECURITY COMMUNITY Virtualization - The Missing Element of the Cloud By Tom McAndrew and Mike McGee ISSA members, Puget Sound, USA Chapter This article discusses six major challenges of virtual environments and provides tips on how to protect and secure a virtual infrastructure. Abstract Virtualization is the critical element which enables cloud computing. This article discusses six major challenges of virtual environments and provides tips on how to protect and secure a virtual infrastructure. The most elegant solutions are the ones that take complicated subjects and break them down into basic rules and elements that anyone can understand. For example, Physics is the science that attempts to understand and explain how the world around us works. There are fundamental rules that explain energy (E=mc 2 ), force (F=MA), and the basic building blocks of all matter (atoms). The complexities of the world could be broken down into simple concepts that almost anyone can grasp. A simple core set of rules and definitions that are broadly adopted ensure consistency and evolution in the scientific community. This same scientific approach is currently being taken in cloud computing today. We are defining the basic rules and fundamental elements of cloud computing. Some have taken very scientific approaches in defining the cloud, and others have taken a more practical approach built on business uses. For example, one way to define the cloud is by identifying one of the four ways it is deployed (in a private data center, public data center, community data center, or hybrid model). Another is to define it by the type of service that is offered; Infrastructure as a service (IaaS), Software as a Service (Saas), or Platform as a Service (PaaS). Yet another way is to define essential characteristics of cloud services (elasticity, on demand, etc.). All of these are each appropriate ways of getting the information security community to speak in a common language. However, there is relatively very little around the explanation of the three common building blocks of all cloud environments. Just as an atom is made of three basic elements (electrons, protons, and neutrons), cloud environments consistent of three basic elements: hardware, software, and virtualized components (HSV). Despite all the marketing hype about data living in the cloud, you can be assured that your data is living right here on earth on a piece of hardware, software, or a virtual component. So if all clouds are made up of fundamental elements, how do we go about assessing the risk for these environments and ensuring that they are secure? The good news is that we have already been practicing how to secure hardware and software for several years. We are still improving our processes, but there is a lot of guidance out there on business continuity, software development, secure coding, etc. However, when it comes to the world of virtual components, we have only a handful of generally accepted security practices. Without having generally accepted practices around virtualization, we are missing one of the three fundamental elements of all clouds. This lack of guidance has evolved primarily be of the vendor neutral approaches of the virtualization papers and industry guidance. Most organizations that publish cloud guidance are careful to ensure that they are not endorsing or highlighting any particular product. They also want to ensure that their guidance is relevant and not outdated by the time it get published. They shy away from the strengths and weaknesses of different virtual environments and security considerations and tend to focus on the big picture. For example, one of the leading industry papers on cloud in the United States is the National Institute for Standards and Technology (NIST) special publication , Draft Guidelines on Security and Privacy in Public Cloud Computing. Throughout the 38-page body of the document there is not a single chapter, paragraph, or sentence that speaks to the unique risks of different virtual environments from different vendors. By attempting to be vendor neutral, NIST has omitted the most critical guidance 25

2 for IT security experts seeking standardization what to do with the virtual platforms. They published another document, SP , around virtualization, but Microsoft is mentioned only once, and VMware is not any where at all. But for those of us on the ground, we have to face the reality that most cloud environments are built on well-known virtualization IT security is great because no one knows everything, but anyone can have an opinion. products (VMware, Microsoft Hyper- V, Xen, Citrix, Parallels, etc.). These vendors make up the virtualization in the three basic elements, and failing to address them and their current risks explicitly when defining the cloud is slowing down the standardization and adoption of the cloud. Each vendor solution was designed to address a specific industry need, and each has different benefits and drawbacks from a security perspective. Without tackling the risks and security mitigations of each vendor s approach, we are missing the most critical element of cloud computing. In 2010 Gartner estimated that more than 60% of virtual environments will be less secure than their physical counterparts through VMware states that 96% of Fortune 1,000 are using virtualization. 2 Microsoft has stated the primary vehicle for cloud infrastructure is virtualization. 3 When you add all these statements up, what do you get? Everyone is moving to the cloud; the cloud is built on virtualization; and virtualized environments are less secure than their physical counterparts. Sounds like a CISO s worst nightmare! The good news is that armed with this basic knowledge, you can follow these simple steps to ensure that you are addressing the new risks of virtualization in your environment. Tip #1 Read the vendor s documents IT security is great because no one knows everything, but anyone can have an opinion. You d think that this tip would go without saying, but I m amazed at the number of people giving security advice on virtualization that have no knowledge of how their specific instance of virtualization actually works. We have been so accustomed to believing that anything from a vendor is marketing hype, but the reality is that these vendors have invested a tremendous amount of time and resources in describing the security architecture of their environments. And as a security expert you can be discredited quickly if you have not taken the time to understand the specific virtual solution. Just last month I had a call with a client on virtualization and its impact to the Payment Card Industry (PCI) compliance. The company set me up on a conference call with Bob, their virtualization expert who had been maintaining their VMware environment for the past three years. He was prepared to go into great technical detail on why their rather complicated environment should be acceptable for PCI. The conversation went something like this: Me: What type of virtualization are you using? Bob: We are running VMware Me: ESX or ESXi? Bob: We are running ESX Me: Oh, can you explain why you are using a product which is end of life? VMware announced over a year ago that they were no longer going to be supporting ESX and that all customers should migrate to ESXi, which has several security benefits. vsphere 4.1 will be the last release to support the old ESX architecture, and you should be on ESXi as soon as possible. Bob: I wasn t aware of that. What does that mean? I then went into detail of the security benefits of ESXi and why as a security practitioner I recommend that they migrate their architecture not just for PCI compliance, but for a variety of other security issues. It turned out that Bob s organization had not made a choice of what type of virtualization they were using. They were not aware of the differences between ESX and ESXi. Instead they mistakenly believed that all VMware environments were the same. They were simply unaware of the risks and virtual architecture they were running. Within three weeks they had followed most of published guidance and our recommendations; the rest of the assessment was completed quickly, and the customer was significantly more secure. It sounds simple, but it is hard for us as security practitioners to admit that we have limitations. Security and information technology is a large, complicated industry that changes rapidly. Know your limits and have the courage to say I do not know if you are getting beyond your skill set. Very few individuals are able to keep up with the latest and greatest in technology and security on a daily basis. If you are using a specific vendor, read their documentation. All of them have created great knowledge bases for customers and prospects. While some of the documentation is going to be self-serving for the vendor, it is the first place to start. In addition, more and more companies are having their architecture and services reviewed by an independent third party. These assessments take a variety of forms, from SSAE 16 reports (formerly SAS 70s), letters from auditors, or technical whitepaper or publications. These third-party assessments are great reads for getting up to speed on the critical risks and mitigation recommendations. Tip #2 Provide a narrative of your environment Most organizations have some documentation, which describes what they do in words. There is usually some promotional literature that is designed for marketing or sales to 26

3 share with potential clients. There is also usually another set of documentation which is shared among auditors or existing clients under NDA, which goes into more detail. Unfortunately, I see that many of these narratives are lacking even basic information on virtual environments, and many of them do not describe virtualization at all. Virtualization is not simply another piece of software to be noted in the narrative. Virtualization is a fundamental architectural change that drastically affects the security, configuration requirements, and system boundaries of an IT environment. If virtualization is used, organizations should ensure they have an accurate narrative explaining the scope of virtualization, why it was implemented, and what systems are affected. Most IT administrators are the only ones that really know the details, but unfortunately documentation is not their strengths. They do not get up in the morning hoping to spend their day writing a Word document. In order to get a good narrative, you will have to work collaboratively with business owners, administrators, IT technicians, and your audit team to get a comprehensive narrative. The narrative should include Why, What, and How: why you are using virtualization? what is the architecture that you have deployed? and how is the organization using the virtual environment to support business needs? The best way to get ahead of this is to ensure that you embrace and document your virtual environment up front. If you have a SSAE 16, PCI assessment, bank assessment, vendor due diligence document, or any document that may be externally facing, make sure that you are clear about virtualization within the environment. Start with the why, why are you using virtualization? does it save money? does it ensure greater consistency? or does it help your business continuity plan? There is likely a compelling business reason or security driver that was critical to your decision. State how and why you are using virtualization up front, and it will significantly improve your dialogue with vendors, assessors, and business owners. Tip #3 Keep three separate network diagrams Three times in the past year I was more than two weeks into an assessment only to find that virtualization existed midway through the assessment. Why did I not know about it earlier? It was because there was not a single document, diagram, or interview which mentioned virtualization at all. I only found out when I went through the data centers to visually look at the servers. The diagrams would show 10 windows servers, and the server room would have only two servers and a SAN. When I asked were the other eight were, then the topic of virtualization would pop up. Unfortunately this changes the entire assessment because virtualization affects the flow and security of all network traffic in the virtual environment. It is not simply another piece of software to be added to an inventory list (although it should definitely be included). Security controls deemed appropriate in a physical-only environment are not the only controls necessary for a virtual environment. The primary issue here is that many times network drawings are not updated to reflect the true placement and network flow of virtualized systems. My recommendation: create and maintain three network diagrams. Network diagram #1 Physical network topology The first network drawing should be a Layer-3 drawing. This should include all the physical hardware, network interface cards, routers, switches, firewalls, and other components that are used to router bits from point A to point B. Focus on the physical connections. One of the biggest mistakes I find is that virtual systems look like they are physically connected to routers, when it is actually the virtual hypervisor that connects to a physical network interface card (NIC) on a piece of hardware. My advice is to keep the physical world on a physical drawing. If you are running a Dell Server with three NICs, then show that server with three NICs and how they are connected. If you are an IT security assessor evaluating the systems, compare the network diagram to the system components that you actually see with your eyes. Trust but verify continues to be timeless advice. If you see five servers, look for five servers. If you see one NIC, look to ensure that that system only has one NIC. I always start by looking at the network diagram physically counting the number of servers, routers, and firewalls and comparing that to my walkthrough. While this is not practical in very large environments, usually you can tell in a matter of minutes if the network diagram you are looking at matches the physical hardware you are seeing. Network diagram #2 - Data flow diagram IT systems do not exist for the sake of existing. All systems serve a function and are designed to meet a critical business need. Most organizations map this out in a data flow diagram. These diagrams are usually built on three general concepts: input, process, and output. This diagram helps provide the business owners with views of how IT supports their functions. Many organizations maintain dozens of data flow diagrams, covering the flow of health care information, credit card data, personally identifiable information, financial data, marketing data, etc. Ensure that you capture all the system components that can affect the security of that data as it flows through an organization. This usually requires some creativity, since not every system will fit into a network diagram, so my advice is to choose the most important systems that affect the flow of data. In small, controlled environments you can likely fit all components into a diagram. In larger environments, you may want to split it up into different views (networking, servers, databases, etc.). The key element is that you should be able to match your list of components to a visual network diagram. 28

4 # H,S, V Quantity Type Brand Version Dynamic? Comments 1 Hardware 2 Firewall Cisco ASA IOS 8.4(1) with ASDM 6.4(1) No Internal Firewall 2 Hardware 2 Firewall Juniper SSG 140 No VPN 3 Software 100 Adobe Acrobat Reader No Authorized PDF reader 4 Software 4 Hypervisor VMware ESXi ESXi 5.0 No Running on four separate physical servers 5 Virtual Componenent Web Server Windows 2008 R2 Yes Scales to meet customer needs 6 Virtual Componenent Swtich VMware N/A Yes Scales to meet customer needs Figure 1 Sample inventory Network diagram #3 Virtual diagram Once you have captured your physical layout and data flows, it is important to document all the virtual components and their relationships to hardware and critical data. When updating your virtual diagram, ensure that you include all critical components, such as virtual switches, operating systems, databases, storage, servers, virtual firewalls, etc. Also, be sure to discuss whether they are dynamic or static virtual components. A large public cloud provider such as Amazon is not going to be able to track every single virtual instance that is running, but they can provide an explanation of how they deploy a virtual switch and ensure that it is managed and configured correctly. Remember, most software was not written with virtualization in mind, and may be prone to different attacks and security flaws when running in a virtual environment. For example, a piece of software may encrypt data and keep the encryption key only in volatile memory, which is relatively lower risk. But if you allow dirty snapshots (which is essentially when you copy a running virtual machine and store it exactly as it existed), then that encryption key could be written to a hard drive, stored in a SAN, and duplicated in your backup systems? The same software has different security risks depending on your virtual environment. These sorts of items need to be considered with the virtual diagram. Tip #4 Update your inventory In the beginning of this article, I mentioned that there are three critical elements to any cloud environment: hardware, software, and virtual components. Maintaining an inventory of all IT systems can be an overwhelming task, particularly in large environments. Hardware is relatively easy to track; software is a little more complicated, but there are a variety of tools that make tracking software much easier. However, tracking virtual components is still largely a manual process today, and there are few automated reports that can be run to show all the virtual systems running. Since virtual components are critical elements, you need to have some way of tracking how they are deployed, retired, configured, and maintained. Today this primarily done through change control tickets and the sys- Hypervisor Hardware Bare Metal tem development life cycle (SDLC). However, more and more vendors are creating tools for tracking these components and reporting on them. For example, Trend Micro has an agentless anti-virus solution that has visibility at the hypervisor level. 4 As you review and update your system inventory, make sure to include all the software and versions that you are using, including your virtual systems (see Figure 1). Remember that virtual systems are not limited to servers. There are virtual workstations, virtual switches, virtual firewalls, etc. Additionally, make sure you take the time to review your software and see if there are known security vulnerabilities, or if the software is nearing its end of life. Tip #5 Go bare metal A hypervisor (also known as a virtual machine monitor) is the software that allows multiple operating systems and virtual components to run on shared hardware. However, not all hypervisors are created equal. There are two types of hypervisors. Type 1 hypervisors are bare metal, meaning they are installed directly on top of the hardware they run on; there is no operating system (see Figure 2). They are the direct interface between the hardware and the virtual world. The security community believes this is the best type of deployment and it is recommended in nearly all security guidance on virtualization such as NIST for one. Host OS Hardware Hosted Hypervisor Figure 2 Bare metal vs. hosted hypervisor 29

5 A Type 2 hypervisor is one that is installed on top of another operating system. This deployment is common for small environments that are looking to test out virtualization. Many small organizations using Microsoft get a trial of their virtualization software and run it on a server that is primarily tasked with other functions. A type 2 hypervisor is also common for laptops that are running different operating systems such as VMware Fusion or Parallels. Tip #6 Clearly define the system boundaries I saved this tip for last, because it is one of the hardest things to do in a virtual environment. It was not too long ago that all networks were essentially flat, meaning that anything on the network could talk to anything else on the network. As much as we would like everything to be secure, different systems need to meet different levels of security, so we segment our IT infrastructure into different zones. The traditional thinking of network segmentation has historically been physical separation or the use of firewall rules (Layer-3 segmentation). But virtualization and cloud computing are forcing us to consider alternative ways of meeting acceptable segmentation. The term segmentation is interesting because no IT environments are truly segmented unless they are physically disconnected from each other (and even then, there are still ways to breach that segmentation such as wireless and sniffing electrical transmissions). Most organizations are comfortable with defining system boundaries at the network layer. As technology evolved, we began considering other ways of enforcing segmentation, such as using VLANs, IPSEC, applications, and other technology. Take a webserver that communicates to a backend database and the Internet. Traditionally, we would put the webserver in its own DMZ and segment it from the Internet and back- end database by installing a firewall. But a Layer-3 firewall alone will not prevent an attacker from exploiting a software flaw and executing a SQL injection attack to gain access to the back end system. Virtual environments are no different in that they can create segments, but those segments are only as good as their configuration and threats that test them. However, one of the biggest risks is that subtle configurations and vulnerabilities in the virtual environment have the ability to affect everything on the host. To put it simply, if you do not securely configure your virtual settings on your hypervisor, you are putting your entire environment at risk! In summary Cloud computing is upon us and becoming more common as companies continually look to improve their operational efficiencies. However, before we can understand the risks of moving into a cloud, we have to understand the fundamental elements that make up a cloud environment. There are several theoretical deployment models, but the risks around virtualization and security best practices are still emerging. If you are using virtualization or a cloud environment, start with these six tips and you will be off to a better start than most! About the Authors Tom McAndrew and Mike McGee are security practitioners living in the Seattle area and members of the Puget Sound Chapter of the ISSA. Both have worked in a variety of setting including the banking, retail, service providers, utility providers, military, and healthcare organizations. Tom is also the current President of the Puget Sound chapter of ISACA. They can be reached at thecloudguys@gmail. com. 30

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S Network Segmentation in Virtualized Environments B E S T P R A C T I C E S ware BEST PRAC TICES Table of Contents Introduction... 3 Three Typical Virtualized Trust Zone Configurations... 4 Partially Collapsed

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor

Definitions. Hardware Full virtualization Para virtualization Hosted hypervisor Type I hypervisor. Native (bare metal) hypervisor Type II hypervisor Virtualization Objectives Definitions Why Problems Versions Virtualization vs Cloud Creating a New Virtual Machine Working with a Virtual Machine Virtual Machine Settings Virtual Machine Snapshots Definitions

More information

How To Extend Security Policies To Public Clouds

How To Extend Security Policies To Public Clouds What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their

More information

Mitigating Information Security Risks of Virtualization Technologies

Mitigating Information Security Risks of Virtualization Technologies Mitigating Information Security Risks of Virtualization Technologies Toon-Chwee, Wee VMWare (Hong Kong) 2009 VMware Inc. All rights reserved Agenda Virtualization Overview Key Components of Secure Virtualization

More information

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure

BEST PRACTICES. DMZ Virtualization with VMware Infrastructure BEST PRACTICES DMZ Virtualization with ware Infrastructure ware BEST PRACTICES Table of Contents Virtualized DMZ Networks... 3 Three Typical Virtualized DMZ Configurations... 4 Partially Collapsed DMZ

More information

Meeting the Challenges of Virtualization Security

Meeting the Challenges of Virtualization Security Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization

More information

Securing the Physical, Virtual, Cloud Continuum

Securing the Physical, Virtual, Cloud Continuum Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud

More information

Securing the private cloud

Securing the private cloud Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing

More information

Hosting Blackbaud Software in the Cloud

Hosting Blackbaud Software in the Cloud Software and services are moving off corporate and organizational networks and into the cloud. The trends are clear and the pace is accelerating. But what exactly is the cloud? Can client-server software

More information

Virtualization and Cloud Computing

Virtualization and Cloud Computing Virtualization and Cloud Computing Security is a Process, not a Product Guillermo Macias CIP Security Auditor, Sr. Virtualization Purpose of Presentation: To inform entities about the importance of assessing

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Whitepaper: Cloud Computing for Credit Unions

Whitepaper: Cloud Computing for Credit Unions Whitepaper: Cloud Computing for Credit Unions A new twist on an old strategy MYCU SERVICES December 29, 2011 Authored by: Lingle, Linda Table of Contents Introduction... 2 Cloud Providers... 3 Cloud Components...

More information

INTRODUCTION THE CLOUD

INTRODUCTION THE CLOUD INTRODUCTION As technologies rapidly evolve, companies are responding with creative business models and exciting ways to reach new markets. But major technology shifts and the influx of information that

More information

Learn the Essentials of Virtualization Security

Learn the Essentials of Virtualization Security Learn the Essentials of Virtualization Security by Dave Shackleford by Dave Shackleford This paper is the first in a series about the essential security issues arising from virtualization and the adoption

More information

Cisco Intercloud Fabric for Business

Cisco Intercloud Fabric for Business Data Sheet Cisco Intercloud Fabric for Business Combining the Benefits of Public and Private Clouds in a Hybrid Cloud Cisco Intercloud Fabric for Business enables enterprises to create a seamless hybrid

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

CA ARCserve Replication and High Availability Deployment Options for Hyper-V Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization

More information

Learn the essentials of virtualization security

Learn the essentials of virtualization security Learn the essentials of virtualization security White Paper Table of Contents 3 Introduction 4 Hypervisor connectivity and risks 4 Multi-tenancy risks 5 Management and operational network risks 5 Storage

More information

NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes

NETWORK FUNCTIONS VIRTUALIZATION. The Top Five Virtualization Mistakes WHITE PAPER www.brocade.com NETWORK FUNCTIONS VIRTUALIZATION The Top Five Virtualization Mistakes Virtualization is taking the IT world by storm. After years of IT build-out, virtualization suddenly fixes

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Attachment D System Hardware & Software Overview & Recommendations For IRP System Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3

More information

How To Decide If You Should Move To The Cloud

How To Decide If You Should Move To The Cloud Can security conscious businesses really adopt the Cloud safely? January 2014 1 Phone: 01304 814800 Fax: 01304 814899 info@ Contents Executive overview The varied Cloud security landscape How risk assessment

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth)

Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) Hosting Services VITA Contract VA-120416-AISN (Statewide contract available to any public entity in the Commonwealth) March 2014 Premier Provider of egov Services to the Commonwealth of Virginia Virginia

More information

Expert Reference Series of White Papers. VMware vsphere Essentials

Expert Reference Series of White Papers. VMware vsphere Essentials Expert Reference Series of White Papers VMware vsphere Essentials 1-800-COURSES www.globalknowledge.com VMware vsphere Essentials Raj Tolani, Global Knowledge Instructor Introduction Every VMware class

More information

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010 Three Critical Success Factors for PCI Assessment Seth Peter NetSPI April 21, 2010 Introduction Seth Peter NetSPI Chief Technology Officer and Founder 15 year history of application, system, and network

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what

More information

VMware vsphere Design. 2nd Edition

VMware vsphere Design. 2nd Edition Brochure More information from http://www.researchandmarkets.com/reports/2330623/ VMware vsphere Design. 2nd Edition Description: Achieve the performance, scalability, and ROI your business needs What

More information

William Saichek Professor, Computer Science & Information Systems Orange Coast College

William Saichek Professor, Computer Science & Information Systems Orange Coast College William Saichek Professor, Computer Science & Information Systems Orange Coast College What is Cloud Computing What is Cloud Computing The Internet is NOT the cloud Virtualization is NOT the cloud Storage

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Server Virtualization A Game-Changer For SMB Customers

Server Virtualization A Game-Changer For SMB Customers Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers

More information

Virtualization Impact on Compliance and Audit

Virtualization Impact on Compliance and Audit 2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance

More information

VMware Solution Guide for. Payment Card Industry (PCI) September 2012. v1.3

VMware Solution Guide for. Payment Card Industry (PCI) September 2012. v1.3 VMware Solution Guide for Payment Card Industry (PCI) September 2012 v1.3 VALIDATION DO CU MENT Table of Contents INTRODUCTION... 3 OVERVIEW OF PCI AS IT APPLIES TO CLOUD/VIRTUAL ENVIRONMENTS... 5 GUIDANCE

More information

CLOUD COMPUTING OVERVIEW

CLOUD COMPUTING OVERVIEW CLOUD COMPUTING OVERVIEW http://www.tutorialspoint.com/cloud_computing/cloud_computing_overview.htm Copyright tutorialspoint.com Cloud Computing provides us a means by which we can access the applications

More information

Which is Better: Virtualization or Cloud IaaS?

Which is Better: Virtualization or Cloud IaaS? A White Paper Which is Better: Virtualization or Cloud IaaS? Which is Better: Virtualization or Cloud IaaS? Why should I consider Virtualization or Cloud IaaS at all? Simply put, they can save you money.

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Building Blocks of the Private Cloud

Building Blocks of the Private Cloud www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected

More information

Before we can talk about virtualization security, we need to delineate the differences between the

Before we can talk about virtualization security, we need to delineate the differences between the 1 Before we can talk about virtualization security, we need to delineate the differences between the terms virtualization and cloud. Virtualization, at its core, is the ability to emulate hardware via

More information

How bare-metal client hypervisors will mean the end of agent-based Windows management

How bare-metal client hypervisors will mean the end of agent-based Windows management How bare-metal client hypervisors will mean the end of agent-based Windows management Abstract... 2 Understanding the old (current?) way of managing desktops.... 2 How do companies manage desktops currently?...

More information

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources

More information

Security Checklist for Cloud Software

Security Checklist for Cloud Software Security Checklist for Cloud Software Security Checklist for Cloud Software 2 I. Overview Cloud computing has shaped the way businesses view and manage data - so much so that cloud computing terminology

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

PCI DSS and the A10 Solution

PCI DSS and the A10 Solution WHITE PAPER PCI DSS and the A10 Solution How Cloud Service Providers Can Achieve PCI Compliance with A10 Thunder ADC and vthunder Table of Contents The Challenge of PCI Compliance... 3 Overview of PCI

More information

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER

SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER SECURITY POLICY MANAGEMENT ACROSS THE NEXT GENERATION DATA CENTER An AlgoSec Whitepaper MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Introduction Corporate networks today must deliver hundreds

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1

Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 Fusion Service Schedule Virtual Data Centre ( VDC ) Version FUS-VDC-7.1 1 DEFINITIONS AND INTERPRETATIONS 1.1. Words or phrases used with capital letters in this Service Schedule shall have the same meanings

More information

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

What is Penetration Testing?

What is Penetration Testing? White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments Introduction Server virtualization and private cloud services offer compelling benefits, including hardware consolidation,

More information

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?

More information

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

RightScale mycloud with Eucalyptus

RightScale mycloud with Eucalyptus Swiftly Deploy Private and Hybrid Clouds with a Single Pane of Glass View into Cloud Infrastructure Enable Fast, Easy, and Robust Cloud Computing with RightScale and Eucalyptus Overview As organizations

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Trend Micro Deep Security Reference Architecture for the Secure Hybrid Cloud Edward L. Haletky Analyst Virtualization and Cloud Security The Virtualization Practice

More information

Tufin Orchestration Suite

Tufin Orchestration Suite Tufin Orchestration Suite Security Policy Orchestration across Physical Networks & Hybrid Cloud Environments The Network Security Challenge In today s world, enterprises face considerably more network

More information

2010 State of Virtualization Security Survey

2010 State of Virtualization Security Survey 2010 State of Virtualization Security Survey Current opinions, experiences and trends on the strategies and solutions for securing virtual environments 8815 Centre Park Drive Published: April, 2010 Columbia

More information

Vulnerability management lifecycle: defining vulnerability management

Vulnerability management lifecycle: defining vulnerability management Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By

More information

A Look into the Cloud

A Look into the Cloud A Look into the Cloud An Allstream White Paper 1 Table of contents Why is everybody talking about the cloud? 1 Trends driving the move to the cloud 1 What actually is the cloud? 2 Private and public clouds

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1

PENETRATION TESTING GUIDE. www.tbgsecurity.com 1 PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a

More information

Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools

Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools WHATSUP GOLD BUYER S GUIDE Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools 4 Critical Components of Successful Layer 2 Discovery INTRODUCTION TO AUTOMATIC LAYER 2 DISCOVERY & MAPPING Layer

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

The Virtualization Practice

The Virtualization Practice The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention

More information

SOFTWARE-DEFINED NETWORKS

SOFTWARE-DEFINED NETWORKS THE PROMISE OF SOFTWARE-DEFINED NETWORKS SDNs offer organizations a flexible solution capable of reimagining the enterprise network. The IT community is abuzz with discussions about software-defined networks

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com 1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption

More information

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.

Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted. Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Cloud Computing Security. Belmont Chia Data Center Solutions Architect

Cloud Computing Security. Belmont Chia Data Center Solutions Architect Cloud Computing Security Belmont Chia Data Center Solutions Architect 1 Cloud Computing Security What is this Cloud stuff? Security in Public Clouds Security in Private Clouds 2 Defining Cloud Computing

More information

Network Segmentation

Network Segmentation Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or

More information

Windows Server 2003. Your data will be non-compliant & at risk on

Windows Server 2003. Your data will be non-compliant & at risk on Your data will be non-compliant & at risk on Windows Server 2003. On July 14 th 2015, Microsoft will cease its support (including automatic bug fixes, updates and online technical assistance) for Windows

More information

VMware Cloud Environment

VMware Cloud Environment VMware Cloud Environment Enterprise level virtual datacentre: providing highly redundant, fast and scalable solutions. An eukhost Technical White Paper. Page 1 Introduction... 3 Traditional physical solutions...

More information

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011 Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

ILLUMIO ADAPTIVE SECURITY PLATFORM TM

ILLUMIO ADAPTIVE SECURITY PLATFORM TM ILLUMIO ADAPTIVE SECURITY PLATFORM TM HIGHLIGHTS Security with Intelligence Illumio ASP is powered by the breakthrough PCE. The PCE contextualizes all traffic flows, services, and processes on application

More information

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers. PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers. White Paper January 2013 1 INTRODUCTION The PCI SSC (Payment

More information

Introduction What is the cloud

Introduction What is the cloud Overview/Description: Discussion on the benefits of hosting the campus card system in the cloud. Topic will cover a general overview of what the cloud is; how the cloud hosted solution can benefit the

More information

Data Security Best Practices & Reasonable Methods

Data Security Best Practices & Reasonable Methods Data Security Best Practices & Reasonable Methods September 2013 Mike Tassey Technical Security Advisor Privacy Technical Assistance Center (PTAC) http://ptac.ed.gov/ E-mail: PrivacyTA@ed.gov Phone: 855-249-3072

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,

More information

Secure Cloud Computing through IT Auditing

Secure Cloud Computing through IT Auditing Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: nvgrwl06@gmail.com ABSTRACT In this paper we discuss the

More information

(ISC)2 Twin Cities Area Chapter 2013 Annual Meeting 18 June 2013, 14.00-16.00. Cloud Security

(ISC)2 Twin Cities Area Chapter 2013 Annual Meeting 18 June 2013, 14.00-16.00. Cloud Security (ISC)2 Twin Cities Area Chapter 2013 Annual Meeting 18 June 2013, 14.00-16.00 Cloud Security Matthew J. Harmon Security Researcher and Consultant IT Risk Limited, LLC CISSP, GSEC, GCIH Hello! Matthew J.

More information

PCI DSS COMPLIANCE DATA

PCI DSS COMPLIANCE DATA PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities

More information

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments #1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

What Cloud computing means in real life

What Cloud computing means in real life ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)

More information

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.

Intro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved. Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security

More information

Hyper-V: Microsoft s

Hyper-V: Microsoft s TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Hyper-V: Microsoft s Approach to Server

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R

VMware vsphere 4. Pricing, Packaging and Licensing Overview W H I T E P A P E R Pricing, Packaging and Licensing Overview W H I T E P A P E R Table of Contents Introduction to VMware vsphere 4..................................... 3 Pricing, Packaging and Licensing Overview..............................

More information

PCI DSS and the A10 Solution

PCI DSS and the A10 Solution White Paper A10 Thunder Series PCI DSS and the A10 Solution For cloud service providers, A10 s Thunder Series & AX Series appliances and SoftAX are the first step towards PCI compliance, allowing you to

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information