Software Journey to the Cloud - CATUG Discussion Document

Size: px
Start display at page:

Download "Software Journey to the Cloud - CATUG Discussion Document"

Transcription

1 Software Journey to the Cloud - CATUG Discussion Document Cloud Arena Technical Users Group (CATUG) ABSTRACT The CloudArena Technical Users Group (CATUG) developed this discussion document, which could act as a checklist for companies considering building software in the Cloud securely.

2 Table of Contents Acknowledgment... 2 Background... 2 Disclaimer... 2 Software journey to the Cloud Starting point Technology Development frameworks Security module & controls Platforms Development lifecycle Data protection, storage and extraction Encryption (Part of security) Auditing and logging Security review Ongoing security... 7 Key contributors to this document... 8 Acknowledgment The CloudArena Technical Users Group (CATUG) developed this discussion document. The group is made up of a number of IT professionals with a broad range of IT experience and skills. The group s purpose is to share and exchange knowledge with a particular focus on Cloud Computing. Background Based on the groups discussion around shared experiences of working in the Cloud the group wanted to produce a document in support of CloudArena s security event for companies who were looking to build a bespoke software in the Cloud, whether internal or external facing, software as a service or not. It s a very high level guide, which could act as a checklist for companies considering building software in the Cloud securely. There are a number of questions and pointers to consider which are captured in the document. Disclaimer This document is intended to support businesses of all types who are considering building software in the Cloud. It is a general guide and cannot reflect all of the particular requirements of every organisation. Ultimately, any decisions on the development and adoption of business technology should be made by users based on their own judgment, supported by professional advice where required. Neither the authors nor the publishers of this document can accept liability for any loss incurred by any person acting or refraining from acting on as a result of material in this document. The content of this document was compiled from the input of many individuals working in a personal capacity. Their input does not necessarily reflect the opinions of the organisations that they are employed by and no such validation should be assumed. 2 Copyright Cloud Arena

3 Software journey to the Cloud 1.0 Starting point So what s the business case? The standard rules still apply when it comes to the cloud and the proper justification needs to be sought. Do you have business or organisational buy in at this stage? You need to fully understand the cost benefit of moving to the cloud and clearly research the potential costs of such a move. Based on the CATUG s experience pricing services in the cloud was not always easy or as expected. At this starting point do you know what is the service you are looking to provide? Is it an internal service or an external service? Are there legacy constraints or is a clean slate. Will it be a managed service or self-service. Are their any integration requirements e.g. to third party software or services? Is it already available and how mission critical is the service? What is the level of support requirements e.g. for bandwidth, spikes and uptime. 3 Copyright Cloud Arena

4 What level of security to do you require? It would be the group s recommendation to involve a security specialist at the start of your project as well as at the end for verification. 2.0 Technology So you ve got support and you now need to select the right technology so there are a number of considerations at this point. Do you go with an open source technology such as PHP, JEE, Ruby, Python, or a closed technology such as Microsoft s.net? Do you understand the benefits or potential challenges of this decision such as? Do you understand licensing implications of the technology? What community support is available for the technology? Paid support versus free. What is the maturity and quality of the technology? What is your experience and understanding of using that technology? Needs to be a clear fit now and also in the future You don t want to cul-de-sac yourself so be sure! Consider maintenance and future proofing yourself Security concerns Some technologies can be less error prone than others Known vulnerabilities and misconfigurations need to be considered and understand How well documented is the technology? Access to resources Accessibility to the skill base you require for that technology now and in the future is a very important issue. Interoperability Enterprise integration with third parties and services What environments and devises do you intend to run your system on 3.0 Development frameworks Development frameworks are like the scaffolding for your application. The benefits of using a framework would be you are typically using proven components, which should improve the overall quality the system so you re not reinventing the wheel. There are risks with some development frameworks because of the possibility of introducing rogue or malicious code that is perhaps unchecked by the framework or community. What is your or your development team s understanding of the framework? What is the quality of the implementation of the framework? And again it s critical to have the right skills and experience to leverage the chosen framework. 4 Copyright Cloud Arena

5 4.0 Security module & controls When you are developing where are the security controls within the application and what do they do? Authorisation (privileges to invoke a function) Authentication (proving who the user is) Input validation (accepting appropriate non malicious data) For more information on security controls check out OWASP s top ten. What security components does your framework offer or contain? Do they meet your requirements? Are they sufficiently proven and future proofed? Can you change or enhance these if required to maintain a level of compliance? Do you need to integrate with other services or third parties with different security controls? For example integrating a Microsoft technology with OpenID or an enterprise environment connecting to a legacy system or mainframe. How effective are the security controls you are connecting to. 5.0 Platforms Do you know what types of platforms exist? There are public, private, hybrid, community cloud platforms and each provides it s own type of service. For example there is a significant difference in the services supplied between Cloud providers e.g. Amazon versus Google Apps versus Force.com versus Microsoft. So what are the differences between cloud platforms and data centres? Get your own server versus a managed service? What are the risks and security issues? Depends on the platform you ve selected and service provided! Key is to understand the security module being provided by the platform and then compliment that with your own requirements Do you understand the service level agreements (SLA) What are the terms of the service? Do you need legal advice to review? How do you deploy to these platforms? Make sure you understand what the process is and how you intend deploy following best practice Make sure you document and test! Make sure you restrict and control access! Pricing and cost modules Based on the groups experience it is critical you understand how your Cloud provider charges for its services. Costs for bandwidth, transactions, storage and content delivery can quickly accumulate if your service doesn't take these into consideration or not architected for the Cloud. Ease of integration with other Cloud services For example Amazon plugins, IBM integration services, Azure AppFabric & Azure Accelerators 5 Copyright Cloud Arena

6 6.0 Development lifecycle What are the differences between traditional methods and developing in the Cloud? Behavior of a Cloud application, depending on the Cloud service, could be quite different to a tradition architecture The lifecycle of a Cloud application maybe different as you could run several instances and versions of the same application concurrently This in turn could impact maintenance, code versioning and management, as well as administration of the system itself Deployment maybe different depending on the cloud service The benefits of spinning and ramping services: Switching it off when you don t need it! Testing potential scenarios before deciding appropriate path Speed at which you can deploy environments 7.0 Data protection, storage and extraction It is critical you understand jurisdiction requirements and adhere to them. How are you going to secure your data in storage and is data size a potential issue for backup or extraction? How are you managing storage / backups? Will you use a different Cloud provider or back up in-house? Are their any standards you need to consider in relation to extraction? Closed versus open standards and code versus data extraction. You also need to consider who has access to the system and more importantly the data that is held within the system. What levels of access and visibility are appropriate and what internal governance and policies do you need to have in place to make sure those levels are adhered to? 8.0 Encryption What is the appropriate level of encryption required for your application? What type of data are you encrypting? Are there any legal or compliance obligations that you need to adhere to? What is the industry standard for the level of encryption required? Do you have to encrypt data all the way to the client? Is there encryption required in transit and in storage? What levels of encryption do you require? Performance of data once encrypted Decrypting data will create an overhead on the performance of the application If you are using encryption how will you manage your encryption keys? Supporting policies and procedures How are you going to manage and administrate the encryption Again consider independent third party advice! 9.0 Auditing and logging You need to ask yourself what are you looking to capture? Do you understand the key system events and steps you need to log? And what are you NOT going to 6 Copyright Cloud Arena

7 log? Auditing and logging customers as well as your own employees need to be considered. Are there quality or compliance requirements do you need to adhere too? What alerts do you need or expect? How does auditing / logging impact your backups? What level of analysis is required from the logs What supporting procedures are required How do you rate or describe a breach? How will you deal with a breach 10.0 Security review So what are the benefits of a security review. It s key you understand the importance of this stage and budget appropriately at the start of your project. A proper security review can ensure the continuity of the service and privacy of data held within the system. It enhances the quality and compliance of the service if you need to adhere to compliance requirements. Based on the CATUG s experience third party evidence that you take security seriously means you ll be taken seriously. Penetration testing External and internal testing of your system Seeking application vulnerabilities Authenticated and unauthenticated access testing Network and / or application layer Code review Independent review that code is securely developed and following industry best practice Availability of the code Ensure ongoing maintenance is managed in a secure manner 11.0 Ongoing security Good ongoing security is about taking each of the items outlined and making sure you ve considered and understood your options. You ve adhered to best practice with you approach and implementation and you understand the risks and are managing them appropriately. You have a proactive approach to security and continuously review and monitor. You have independently verified that what you ve set out to achieve has actually been achieved. Hopefully this discussion document has provided some helpful tips and considerations with your move to building your software in the Cloud. You re more than welcome to join CATUG and share your experiences. 7 Copyright Cloud Arena

8 Key contributors to this document Trevor Dagg: Chairman of CATUG & Managing Director Talentevo Eoin Keary: Owasp Global Vice Chair/Director of BCC Risk Advisory Mike O'Brien: Founder & CEO at Eastpoint Enterprise Information Solutions Ltd Terry Jack: Tech Project Manager at Citi Michael Bradford: Lecturer NCI School of Computing Derek Hardiman: Chief Technology Officer at Abbey Capital Dave Feenan: Business Development Manager, Swiss Post Solutions Ireland Richie Bowden: Chief Operations Officer, Cloud Consulting Ltd Freddie Graham: Senior Account Manager at Commidea Ltd Vikas Sahni: Independent consultant Chad Gilmore: Managing Director, iplanit Joe Haugh: Managing Director of ProductFul.com And other members of the CATUG Group - You can view their profiles and also join our Linkedin group at: 8 Copyright Cloud Arena

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE

A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE A COMPLETE GUIDE HOW TO CHOOSE A CLOUD-TO-CLOUD BACKUP PROVIDER FOR THE ENTERPRISE Contents How to Buy Cloud-to-Cloud Backup...................... 4 Wait What is Cloud-to-Cloud Backup?.....................

More information

Top 10 Risks in the Cloud

Top 10 Risks in the Cloud A COALFIRE PERSPECTIVE Top 10 Risks in the Cloud by Balaji Palanisamy, VCP, QSA, Coalfire March 2012 DALLAS DENVER LOS ANGELES NEW YORK SEATTLE Introduction Business leaders today face a complex risk question

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015 Cloud Computing Mike Bourgeois Platform as a Service Point of View September 17, 2015 Agenda Cloud Computing Definition Platform as a Service Business Drivers and Benefits Technology Drivers and Benefits

More information

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com

Cloud Computing. Benefits and Risks. Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com Cloud Computing Benefits and Risks Bill Wells, CISSP, CISM, CISA, CRISC, CIPP/IT bill.wells@transamerica.com 10/3/2012 1 Let s make sure we re all talking about the same thing. WHAT IS CLOUD COMPUTING?

More information

Cloud Security Who do you trust?

Cloud Security Who do you trust? Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud

More information

NOTICE: This is a FREE Report You MAY Give Away This Report

NOTICE: This is a FREE Report You MAY Give Away This Report NOTICE: This is a FREE Report You MAY Give Away This Report (As long as you do not alter it or misrepresent it.) (c) JP Fox Consulting - All Rights Reserved. ALL RIGHTS RESERVED. No part of this report

More information

Optimizing Service Levels in Public Cloud Deployments

Optimizing Service Levels in Public Cloud Deployments WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of

More information

The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance. A publication by:

The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance. A publication by: The CIO s Dream: A Cloud Platform With Lower Cost, More Agility and Better Performance A publication by: Introduction The chief information officer or chief technology officer carries the weight of the

More information

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public

More information

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer Problems Faced by Cloud Computing tyuiopasdfghjklzxcvbnmqwertyuiopas

More information

Cloud Computing: Making the right choices

Cloud Computing: Making the right choices Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Cloud Courses Description

Cloud Courses Description Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols

THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE

More information

2015 Vulnerability Statistics Report

2015 Vulnerability Statistics Report 2015 Vulnerability Statistics Report Introduction or bugs in software may enable cyber criminals to exploit both Internet facing and internal systems. Fraud, theft (financial, identity or data) and denial-of-service

More information

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting

Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting Cloud security: A matter of trust? Dr Mark Ian Williams CEO, Muon Consulting I wandered lonely as a cloud... The academic, globe-trotting years: 1992 1993: Parallel software for PET scanner images in Geneva

More information

Credit Unions and The Cloud. By: Chris Sachse

Credit Unions and The Cloud. By: Chris Sachse Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A

Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected

More information

Public Versus Private Cloud Services

Public Versus Private Cloud Services Public Versus Private Cloud Services Table of Contents vs. What constitutes a Public Cloud versus a Private Cloud solution? When considering moving to a public Cloud infrastructure, what questions should

More information

Cloud Computing The Evolution of IT

Cloud Computing The Evolution of IT Cloud Computing The Evolution of IT 17 March 2010 IDC Cloud Computing Conference Moscow Copyright IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market Overview What Is the

More information

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES

TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES TECHNOLOGY TRANSFER PRESENTS MAX DOLGICER IT S ALL ABOUT CLOUD CONCEPTS, STRATEGIES, ARCHITECTURES, PLAYERS, AND TECHNOLOGIES APRIL 2-4, 2014 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY) info@technologytransfer.it

More information

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization

The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization The Business Value of a Comprehensive All-in-One Data Protection Solution for Your Organization You have critical data scattered throughout your organization on back-office servers, desktops, mobile endpoints

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

Data In The Cloud: Who Owns It, and How Do You Get it Back?

Data In The Cloud: Who Owns It, and How Do You Get it Back? Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?

More information

Gain a competitive edge through optimized B2B file transfer

Gain a competitive edge through optimized B2B file transfer Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS

Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:

More information

Introducing SOA Governance Suite. Magnus Wettemark, Solution Consultant Manager Software AG

Introducing SOA Governance Suite. Magnus Wettemark, Solution Consultant Manager Software AG Introducing SOA Governance Suite Magnus Wettemark, Solution Consultant Manager Software AG webmethods SOA Offering Layer 7 Service Mediation webmethods X-Broker Service Enablement wm ESB / EntireX / Applinx.Net

More information

It s All About Cloud Key Concepts, Players, Platforms And Technologies

It s All About Cloud Key Concepts, Players, Platforms And Technologies It s All About Cloud Key Concepts, Players, Platforms And Technologies 3-day seminar Description Cloud computing has gained a lot of attention in recent years. It has mostly been used for non business

More information

Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management

Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management Table of Contents Executive Summary... 3 Introduction: Cloud Deployment Models... 3 Private Clouds...3 Public

More information

Are you ready for your Journey to the cloud? Maybe some of you are already using some cloud- based services?

Are you ready for your Journey to the cloud? Maybe some of you are already using some cloud- based services? 1 2 Are you ready for your Journey to the cloud? Maybe some of you are already using some cloud- based services? 3 Anyway, you ve finally decided to take the big step forward in the unknown, and to start

More information

An Agile and Scalable Mobile Workplace

An Agile and Scalable Mobile Workplace Innovapptive Technology Thought Leadership - Executive Report An Agile and Scalable Mobile Workplace Innovapptive SAP Mobile Hosting Solutions Brief Innovapptive s SAP Mobile Hosting Solutions for SAP

More information

CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION. Time-consuming infrastructure configuration and maintenance

CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION. Time-consuming infrastructure configuration and maintenance Creating An Internal Cloud: EPAM Develops A Custom Solution 1 CASE STUDY CREATING AN INTERNAL CLOUD: EPAM DEVELOPS A CUSTOM SOLUTION Many enterprise businesses face the same problem: Rapid expansion that

More information

1 The intersection of IAM and the cloud

1 The intersection of IAM and the cloud 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud

More information

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers

May 2010. Cloud Vendor Charter. Vendor Version Not for distribution to customers May 2010 Cloud Vendor Charter Vendor Version Not for distribution to customers Disclaimer This specification is published without responsibility on the part of BASDA Ltd or the various contributors, sponsors

More information

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER

E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting

More information

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS.

SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. SECURE CLOUD SOLUTIONS FOR YOUR BUSINESS. 2015 Learning Possibilities Ltd, 506 Centennial Park, Centennial Avenue, Elstree, Herts, WD6 3FG Email: info@cloudpossibilities.com Telephone: +44 (0) 20 8236

More information

Cloud Computing. What we should be auditing

Cloud Computing. What we should be auditing Cloud Computing What we should be auditing What is cloud computing? Model Description What it does Examples SAAS Software as a service Applications often available through a browser Workday, Salesforce.com

More information

Cloud Security Speak Glossary

Cloud Security Speak Glossary Glossary Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organisations. It can and will create substantial business benefits through reduced capital

More information

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Thinking about APM? 4 key considerations for buy vs. build your own

Thinking about APM? 4 key considerations for buy vs. build your own An AppDynamics Business White Paper Thinking about APM? 4 key considerations for buy vs. build your own Most technology folks have heard Marc Andreessen s provocative statement, Software is eating the

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information

Module 7 Study Guide

Module 7 Study Guide Module 7 Study Guide Change Evaluation Welcome to your Study Guide. This document is supplementary to the information available to you online, and should be used in conjunction with the videos, quizzes

More information

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center www.praetorian.com Threat Modeling "Threat modeling at the design phase is really the only way to

More information

CLOUD MIGRATION STRATEGIES

CLOUD MIGRATION STRATEGIES CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Trust and Dependability in Cloud Computing

Trust and Dependability in Cloud Computing Trust and Dependability in Cloud Computing Claus Pahl IC4 Principal Investigator November 7 th, 2013 Research Philosophy design for growth design for best service provision design for widest acceptance

More information

ATI Cloud Computing. anton@ti.ukdw.ac.id

ATI Cloud Computing. anton@ti.ukdw.ac.id ATI Cloud Computing anton@ti.ukdw.ac.id What is cloud computing? Latar belakang: server maintenance Biaya ITberdasarkan infrastruktur Cost model di perusahaan Traditional cost model Cloud cost model Traditional

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Cloud Computing for Small to Mid Size Businesses. Tech66, LLC William Burleson wcb@tech66.com www.tech66.com

Cloud Computing for Small to Mid Size Businesses. Tech66, LLC William Burleson wcb@tech66.com www.tech66.com Cloud Computing for Small to Mid Size Businesses Tech66, LLC William Burleson wcb@tech66.com www.tech66.com Why Tech66 and the Cloud? You want to focus on your core business, not on running your IT infrastructure

More information

IT Environments Management

IT Environments Management IT Environments Management IT Environments Management is probably one of the most misunderstood concepts in terms of the part it plays within the IT Organisation as a whole, especially its contribution

More information

Managing Amazon Web Services within a Hybrid IT model

Managing Amazon Web Services within a Hybrid IT model Managing Amazon Web Services within a Hybrid IT model The last few years have seen revolutionary changes to IT operations as technology infrastructure has been transformed through virtualisation, and the

More information

NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT

NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT NEXT-GENERATION, CLOUD-BASED SERVER MONITORING AND SYSTEMS MANAGEMENT COVERS INTRODUCTION A NEW APPROACH CUSTOMER USE CASES FEATURES ARCHITECTURE V 1.0 INTRODUCTION & OVERVIEW Businesses use computers

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi

CenturyLink IT Consulting Services. G-Cloud 6 - SCS. REFERENCE NUMBER RM1557vi CenturyLink IT Consulting Services G-Cloud 6 - SCS REFERENCE NUMBER RM1557vi Overview of the Service (functional and non-functional) IT Consulting Services CenturyLink's Solutions Consulting delivers customised

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

How To Choose A Cloud Computing Solution

How To Choose A Cloud Computing Solution WHITE PAPER How to choose and implement your cloud strategy INTRODUCTION Cloud computing has the potential to tip strategic advantage away from large established enterprises toward SMBs or startup companies.

More information

White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product

White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product White Paper Converting Lotus Notes Applications to the Cloud Using the CIMtrek converter Product CIMtrek Ltd Introduction: CIMTrek has been created to help organizations modernise their legacy applications

More information

Assurance of Open Source Projects

Assurance of Open Source Projects Assurance of Open Source Projects Dr Graham Oakes Founder and Principal, Graham Oakes Ltd Contents The value of Open Source Software (OSS) Two types of OSS project The challenges of implementing OSS systems

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

The trusted technology partner in the Public Sector

The trusted technology partner in the Public Sector The trusted technology partner in the Public Sector www.exponential-e.com/public-sector About Exponential-e Market Leaders in Technical Innovation GovConnect: The Exponential-e public sector service portfolio

More information

Questions to ask of your Talent Management Software provider. part of our Practical Steps series

Questions to ask of your Talent Management Software provider. part of our Practical Steps series Questions to ask of your Talent Management Software provider part of our Practical Steps series Contents We re looking to introduce Talent Management Software in one area of our talent work, but how can

More information

PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION

PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range

More information

Cloud Platform Development Services

Cloud Platform Development Services Methods Digital GCloud Service Definition HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL Midlands Office: Pure Offices, Lake

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

Cloud Computing Training

Cloud Computing Training Cloud Computing Training TechAge Labs Pvt. Ltd. Address : C-46, GF, Sector 2, Noida Phone 1 : 0120-4540894 Phone 2 : 0120-6495333 TechAge Labs 2014 version 1.0 Cloud Computing Training Cloud Computing

More information

8 Supporting Actions. 8.1 Organizational changes. 8.2 Cloud Financial Model

8 Supporting Actions. 8.1 Organizational changes. 8.2 Cloud Financial Model 8 Supporting Actions 8.1 Organizational changes The IT landscape is changing at an ever increasing pace, offering organisations and individuals new services and opportunities but also bringing with it

More information

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure

More information

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management

Service Definition MMaaS Mobile Device Management. G- Cloud VII. Service Definition Nine23 MMaaS Mobile Device Management Service Definition MMaaS Mobile Device Management G- Cloud VII 1 Table of Contents 1 SERVICE MMAAS MOBILE DEVICE MANAGEMENT... 3 1.1 OVERVIEW NINE23... 3 1.2 SERVICE SUMMARY MMAAS MOBILE DEVICE MANAGEMENT...

More information

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Cloud Security:Threats & Mitgations

Cloud Security:Threats & Mitgations Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer

More information

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the

More information

Changing attitudes to ERP How cloud is disrupting traditional approaches to ERP deployment

Changing attitudes to ERP How cloud is disrupting traditional approaches to ERP deployment Changing attitudes to ERP How cloud is disrupting traditional approaches to ERP deployment Introduction Cloud is fast becoming a viable option for businesses looking to implement a new enterprise resource

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

90% of data breaches are caused by software vulnerabilities.

90% of data breaches are caused by software vulnerabilities. 90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information