Securing the Cloud Cloud Computer Security Techniques and Tactics

Size: px
Start display at page:

Download "Securing the Cloud Cloud Computer Security Techniques and Tactics"

Transcription

1

2 Securing the Cloud Cloud Computer Security Techniques and Tactics

3 This page intentionally left blank

4 Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint of Elsevier

5 Acquiring Editor: Angelina Ward Development Editor: Matt Cater Project Manager: Jessica Vaughan Designer: Alisa Andreola Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA 2011 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data Application submitted British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN: For information on all Syngress publications visit our website at Typeset by: diacritech, Chennai, India Printed in the United States of America

6 This book is dedicated to my parents Gernot and Renate, wife Rebecca, daughter Carra, and to Rebecca s father William Payne. Rebecca: Thank you for putting up with me (and not only because of this book) during this time. I owe you a great deal. Carra: You are embarking on your own story; watch your punctuation. Blue skies and may the wind always be at your back. My father-in-law William Payne passed away this past year. Bill embodied Southern charm and he left a legacy not only with his daughter but also as the Chief Engineer of the C130.

7 This page intentionally left blank

8 Contents Acknowledgments xiii About the Author...xv About the Technical Editor xvii Introduction...xix CHAPTER 1 CHAPTER 2 Introduction to Cloud Computing and Security...1 Understanding Cloud Computing Cloud Scale, Patterns, and Operational Efficiency... 2 A Synergistic Trick Elasticity, Shape Shifting, and Security... 3 The IT Foundation for Cloud Cloud Computing as Foundation for Cloud Services Cloud Computing Qualities The Bottom Line An Historical View: Roots of Cloud Computing Decentralization and Proliferation Networking, the Internet, and the Web Virtualization...12 A Brief Primer on Security: From 50,000 ft...13 Terminology and Principles...14 Risk Management Security Must Become a Business Enabler...17 A Brief Primer on Architecture Systems Engineering...19 IT Architecture...20 Security Architecture: A Brief Discussion Defense in Depth Cloud Is Driving Broad Changes Cloud Works Today Valid Concerns Summary Endnotes Cloud Computing Architecture...29 Cloud Reference Architecture Revisiting Essential Characteristics Cloud Service Models Cloud Deployment Models...35 vii

9 viii Contents CHAPTER 3 Control over Security in the Cloud Model Cloud Application Programming Interfaces Making Sense of Cloud Deployment Public Clouds Private Clouds...40 Community Clouds Hybrid Clouds Making Sense of Services Models Cloud Software-as-a-Service...43 Cloud Platform-as-a-Service...43 Cloud Infrastructure-as-a-Service How Clouds Are Formed and Key Examples Using Virtualization to Form Clouds Using Applications or Services to Form Clouds...48 Real-world Cloud Usage Scenarios Virtualization Formed Clouds Application/Service Formed Clouds Hybrid Cloud Models...52 Summary Endnotes Security Concerns, Risk Issues, and Legal Aspects...55 Cloud Computing: Security Concerns A Closer Examination: Virtualization A Closer Examination: Provisioning A Closer Examination: Cloud Storage A Closer Examination: Cloud Operation, Security, and Networking Assessing Your Risk Tolerance in Cloud Computing...67 Assessing the Risk Information Assets and Risk Privacy and Confidentiality Concerns Data Ownership and Locale Concerns Auditing and Forensics Emerging Threats...73 So, Is It Safe? Legal and Regulatory Issues Third Parties Data Privacy Litigation Summary Endnotes....87

10 Contents ix CHAPTER 4 CHAPTER 5 Securing the Cloud: Architecture...89 Security Requirements for the Architecture Physical Security...91 Cloud Security Standards and Policies Cloud Security Requirements Security Patterns and Architectural Elements Defense In-depth Honeypots Sandboxes Network Patterns The Importance of a CMDB Cabling Patterns Resilience and Grace Planning for Change Cloud Security Architecture Cloud Maturity and How It Relates to Security Jericho Forum Representative Commercial Cloud Architectures Representative Cloud Security Architectures Planning Key Strategies for Secure Operation Classifying Data and Systems Define Valid Roles for Cloud Personnel and Customers Summary Endnotes Securing the Cloud: Data Security Overview of Data Security in Cloud Computing Control over Data and Public Cloud Economics Organizational Responsibility: Ownership and Custodianship Data at Rest Data in Motion Common Risks with Cloud Data Security Data Encryption: Applications and Limits Overview of Cryptographic Techniques Common Mistakes or Errors with Data Encryption Cloud Data Security: Sensitive Data Categorization Authentication and Identity Access Control Techniques Data Categorization and the Use of Data Labels Application of Encryption for Data at Rest

11 x Contents CHAPTER 6 CHAPTER 7 Application of Encryption for Data in Motion Impediments to Encryption in the Cloud Deletion of Data Data Masking Cloud Data Storage Cloud Lock-in (the Roach Motel Syndrome) Metadata AvoidingCloudLock-in(theRoachMotelSyndrome) Summary Endnotes Securing the Cloud: Key Strategies and Best Practices Overall Strategy: Effectively Managing Risk Risk Management: Stages and Activities Overview of Security Controls Cloud Security Controls Must Meet Your Needs NIST Definitions for Security Controls Unclassified Models Classified Model The Cloud Security Alliance Approach The Limits of Security Controls Security Exposure Will Vary over Time Exploits Don t Play Fair Best Practices Best Practices for Cloud Computing: First Principals Best Practices across the Cloud Community Other Best Practices for Cloud Computing: Cloud Service Consumers Other Best Practices for Cloud Computing: Cloud Service Providers Security Monitoring The Purpose of Security Monitoring Transforming an Event Stream The Need for C.I.A. in Security Monitoring The Opportunity for MaaS Summary Endnotes Security Criteria: Building an Internal Cloud Private Clouds: Motivation and Overview Security Implications: Shared versus Dedicated Resources

12 Contents xi CHAPTER 8 Considerations for Achieving Cost Savings Private Clouds: The Castle Keep? Analysis to Support Architecture Decisions Security Criteria for Ensuring a Private Cloud Network Considerations Data Center Considerations Operational Security Considerations Regulation Summary Endnotes Security Criteria: Selecting an External Cloud Provider Selecting a CSP: Overview of Assurance Vendor Claims and Independent Verification Selecting a CSP: Vendor Transparency Selecting a CSP: Overview of Risks Risk Will Vary by Customer and by CSP Assessing Risk Factors Selecting a CSP: Security Criteria Security Criteria: Revisiting Defense-in-depth Security Criteria: Other Considerations Additional Security-relevant Criteria Summary Endnotes CHAPTER 9 Evaluating Cloud Security: An Information Security Framework Evaluating Cloud Security Existing Work on Cloud Security Guidance or Frameworks Checklists for Evaluating Cloud Security Foundational Security Business Considerations Defense-in-depth Operational Security Metrics for the Checklists Summary Endnotes CHAPTER 10 Operating a Cloud From Architecture to Efficient and Secure Operations The Scope of Planning Physical Access, Security, and Ongoing Costs

13 xii Contents Logical and Virtual Access Personnel Security From the Physical Environment to the Logical Bootstrapping Secure Operations The Refinement of Procedures and Processes over Time Efficiency and Cost Security Operations Activities Server Builds Business Continuity, Backup, and Recovery Managing Changes in Operational Environments Information Security Management Vulnerability and Penetration Testing Security Monitoring and Response Best Practices Resilience in Operations Summary Endnotes Index...279

14 Acknowledgments I would like to thank Rachel Roumeliotis for contacting me out of the blue, first to act as Technical Editor for this book and later to assume the role of Author. I never imagined this to be both so hard and consuming. Oddly, I am thankful! We all come from somewhere I d like to thank two companies that no longer exist: Planning Research Corporation and Sun Microsystems. I can t begin to express the joy I felt at the many opportunities I discovered in both places. May the spirit of these companies persist. At PRC, Wayne Shelton and others presented me with one opportunity after another. At Sun Microsystems, I found myself in the heart of the Silicon Valley revolution. To many Sun Microsystems colleagues over the past few years: You taught me more than you ll ever know. To the incomparable Bill Meine, Thom Schoeffling, Joe Carvalho, Dan Butzer, Layne Jester, David Rodgers, Brian Foley, Dan Hushon, Jim Parkinson, Rinaldo DiGiorgio, and several dozen others whom I joined in designing and then building rather safe and rather cool platforms for grid and cloud computing: We achieved an incredible feat, several times over. At Sun, I learned the difference between marketing, innovation, engineering, and magic. But life goes on, and I have found new opportunities at Booz Allen Hamilton, so I would like to thank Bob Harbick, who convinced me to join his team of talented engineers. I am grateful for this experience as well. Did I thank Jimmy Page, Jimi Hendrix, and Tommy Bolin? O.K., here we go: Thank you Mordaunt-Short, Parasound, PS Audio, Apple Computer, the Google, late night TV, bad monster movies, uncertain walks in pitch dark with my dog Uli, great cigars, dangerously excellent spirits and wine, the attention my dog Bella lavishes on me, the truth of fiction, sea and air, mountains and snow, fireworks, a beautiful girl whose name I still remember after nearly 40 years, old friends, young friends, the existence of the power grid, the fact that NY is intact, and that star over there. I will again thank Bill Meine, who agreed to be the Technical Editor for this book. After many conversations with Bill, it is not surprising that many of his words and ideas should be in this book. Lastly, Matt Cater: Thank you for being a great shepherd for this project. xiii

15 This page intentionally left blank

16 About the Author Vic (J.R.) Winkler is a Senior Associate at Booz Allen Hamilton, providing technical consultation to U.S. Government clients. He is a published InfoSec and cyber security researcher as well as an expert in intrusion/anomaly detection. At Sun Microsystems, Vic served as the Chief Technologist for Security for the Sun Public Cloud. He was also Chairman of the Board for the Sun Security Technology Ambassador program (presales security engineers). In 2010, he became a member of the Advisory Board for StratuScape (a Silicon Valley startup). Vic s background includes positions as an R&D principal investigator at Planning Research Corporation (PRC), where he was the lead designer and Program Manager for a trusted B1 UNIX OS. At PRC, he also conceived of and built one of the first network/host Intrusion Detection Systems (IDS). Vic has over 30 years experience in InfoSec/cyber security, cloud computing, systems and applications engineering, and IT operations and management. He has numerous technical conference publications, and as a visiting cyber security expert, Vic was the author of the Information Security policy for the Government of Malaysia. Vic resides in Reston, Virginia, with his family: Rebecca, Carra, Uli, Bella, and Toby. xv

17 This page intentionally left blank

18 About the Technical Editor Bill Meine recently moved to the other side of the cloud delivery system by joining Software-as-a-Service startup Evergreen Energy, where he is the product owner for the agile software development effort. Part of his time is spent on the security concerns for delivering cloud service applications to customers in the power generation business. Previously, Bill was the chief architect for the infrastructure, security, and operations on Sun Microsystems public cloud, where he led the design of a large cloud infrastructure and operational processes that offered a leap in security at commodity prices. He instituted a lean manufacturing model with agile techniques for all aspects of the construction, development, and delivery of the cloud infrastructure. In his 25+ years at Sun, he was an architect for their dollar an hour public grid offering, enterprise IT architect, fly-and-fix smoke jumper, and staff engineer. Somewhere in his dark past, he wrote software for mine planning, controlling a laser-fusion experiment, and locating earthquakes. Bill lives in Denver, Colorado, with his family: Melinda and Kalen. xvii

19 This page intentionally left blank

20 Introduction INFORMATION IN THIS CHAPTER Book Audience Terminology Risk, Perception of Risk and Cloud Computing Cloud Computing as a Tectonic Shift Structure of the Book Conclusion BOOK AUDIENCE This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services engineers, and integrators will find value in learning about relevant security approaches and cloud security architecture. It will also provide value to those who are interested in understanding cloud security. Executive-level management will gain an understanding of the security advantages and developing trends that are likely to mature as cloud computing progresses. TERMINOLOGY In this book, we use the term cloud in a broad way to refer to cloud computing and cloud services. Bycloud computing we mean: The Information Technology (IT) model for computing, which is composed of all the IT components (hardware, software, networking, and services) that are necessary to enable development and delivery of cloud services via the Internet or a private network. By cloud services, we mean those services that are expressed, delivered, and consumed over the Internet or a private network. Cloud services range from Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) and include everything else that uses these more basic services to create new services. These services may be deployed privately, publically, or in some combination. Cloud computing is far broader a field than public cloud services. There are different advantages and even risks in adopting either a private, community, public, or hybrid cloud deployment. Likewise, there are different value propositions and risks with the three main cloud services. xix

21 xx Introduction RISK, PERCEPTION OF RISK AND CLOUD COMPUTING A good way to view cloud computing is as a landscape that already offers great value and services, but one that is not yet at the Goldilocks stage, where every customer s computing needs are met by a just right solution. As a new paradigm for computing, cloud introduces challenges even as it offers advantages. Not all cloud deployment models (public, hybrid, private, and community) are appropriate for each service, each service customer, or all tenants. Likewise, it is not cost effective for all cloud providers to implement high assurance security or offer the same level of security. However, cloud computing is compelling, it is a rapidly growing trend in IT, and it is forcing significant advances in supporting technologies. In this book, we address some of the common security issues or questions that prospective cloud adopters face: Network Availability Network reliability is a key lynchpin for cloud computing and cloud services. Since a public cloud is by definition accessed over the Internet, the cloud provider must address the potential for catastrophic loss of Internet backbone connectivity. The same concern should be a primary consideration for cloud service consumers who entrust critical infrastructure to the cloud. Similar concerns exist for private clouds. Privacy and Data Data may not remain in the same system, the same data center, or within the same cloud provider s systems. Conceivably, data may even be stored in another country, incurring considerable concern. Control over Data A given user or organization s data may be comingled in storage or processing with data belonging to others. At minimum, data should be encrypted at the granularity of files belonging to given users or organizations. Cloud Provider Viability Since cloud providers are relatively new to the business, there are questions about provider viability and commitment. This concern is exacerbated when a provider requires that tenants use nonstandardsbased application program interfaces (APIs), thus effecting lock-in (impeding a tenant in migrating to an alternative provider). Security Incidents Tenants and users need to know what information the provider will share when an incident is discovered. This concern is related to questions about transparency that providers may offer into security processes, procedures, and internal policies. Disaster Recovery and Business Continuity Tenants and users must understand how they can continue their own operations and services if the underlying production environment is subject to a disaster. Systems Vulnerabilities and Risk of Common Attacks All software, hardware, and networking equipment is subject to exposure of new vulnerabilities. Some components may pose greater risks based on a history of vulnerabilities and exploits. Tenants may not tolerate specific vulnerabilities or risk areas for a range of reasons. A specific cloud may be subject to new attack types, or it may be immune to common attack types based on various reasons.

22 Introduction xxi Regulatory or Legislative Compliance It is difficult to utilize public clouds when your data is subject to legal restrictions or regulatory compliance. Building a cloud that can be certified may be challenging due to the current stage of cloud knowledge and best practices. CLOUD COMPUTING AS A TECTONIC SHIFT Cloud computing and cloud-based services (or cloud) are exciting for many reasons. Cloud is a significant step in the evolution of computing paradigms and a revolution in delivering IT services. At the same time, cloud threatens destabilization for the IT status quo. We appear to be at the early stages of a tectonic shift that will force changes in: Information security approaches, application development models, capital and operational expense decisions, and the IT operations workforce size and skill set. In many ways, cloud is breaking down our models of what we accept as being possible and even reasonable to do with computers. Being able to lease a dozen servers and have them be delivered in a fully provisioned manner within mere moments is astonishing, but doing so for a miniscule fraction of the traditional cost is revolutionary. Cloud computing has raised concerns about the erosion of control as information and software move off of organic resources and into someone else s IT management sphere. Despite concerns from many security professionals, cloud computing isn t innately more or less secure. But the cloud model does force a movement toward a more robust and capable foundation of security services. The mere act of transitioning from legacy systems gives us hope that we can regain control over gaps and issues that stem from poorly integrated or after-thought security. With cloud, greater investment for in-common security services has great potential for return on investment (ROI) given cloud scale. Even as it evolves and matures, cloud computing is being adopted at a fast pace. Despite the hype, cloud brings multiple fundamental shifts in how computing infrastructure is acquired and managed. Despite often shameless marketing by vendors and cloud providers, the opportunities with cloud computing may prove challenging to IT, business, and government. Already today, significant security concerns about cloud computing are coloring many early cloud adoption decisions. But we see cloud as a driver for better security, and we see security as an enabler and foundation for better cloud computing. STRUCTURE OF THE BOOK We begin by examining cloud computing in light of the continuing evolution of IT. Later, we will build a set of guidelines and simple tools that we can use to plan or evaluate security in different cloud deployment models and for different service models SaaS, PaaS, and IaaS. Together, we refer to these as the SPI

23 xxii Introduction service model. Developing guidelines entails a review and understanding of security principles, security risks, and security architecture. What we aim to do is to describe the security issues associated with cloud computing and how to apply security to cloud computing. We recognize that security requirements and solutions will vary greatly, and thus our underlying goal for the book is that the reader becomes better prepared to evaluate the conditions under which we should adopt Cloud Computing services and technologies. Chapters in This Book This book is organized in a top-down manner that begins with an introduction to cloud computing and security, progresses to an examination of cloud security architectures and issues, then presents a series of key strategies and best practices for cloud security, discusses the major security considerations for building or selecting a cloud provider, and concludes with an examination of what it means to securely operate a cloud. Chapter 1: Introduction to Cloud Computing and Security Chapter 1 Introduction to Cloud Computing and Security presents an overview to cloud computing along with its IT foundations, the historical underpinnings, and the cost benefits. Also covered are the essential qualities of clouds and a brief security and architecture background to support the remaining chapters. The bottom line with cloud computing is the combination of cost advantages it brings along with the pervasive changes it is unleashing. Chapter 2: Cloud Computing Architecture Chapter 2 CloudComputingArchitecture examines cloud computing, the NIST Cloud Computing Model, and identifies the essential characteristics of clouds. Also covered is the SPI cloud service model (SaaS, PaaS, and IaaS) along with the four cloud delivery models (public, private, hybrid, and community). The chapter also covers the relative degree of security control a tenant or consumer has with the different models. Chapter 3: Security Concerns, Risk Issues, and Legal Aspects Chapter 3 Security Concerns, Risk Issues, and Legal Aspects takes a closer look at the security concerns and issues with clouds along with surveying the legal and regulatory considerations of different types of clouds. Chapter 4: Securing the Cloud: Architecture Chapter 4 Securing the Cloud: Architecture identifies a number of security requirements for cloud computing. Proceeding from those requirements we identify common security patterns and architectural elements that make for better security. We then look at a few representative cloud security architectures and discuss several important aspects of those. This chapter also details several key

24 Introduction xxiii strategies that if considered during design can present considerable operational benefits. Chapter 5: Securing the Cloud: Data Security Chapter 5 Securing the Cloud: Data Security examines data security in cloud computing along with data protection methods and approaches. Cloud security countermeasures must comprise a resilient mosaic that protects data at rest and data in motion. Security concerns around storing data in the cloud are not inherently unique compared to data that is stored within the premises of an organization; nonetheless there are important considerations for security when adopting the cloud model. Chapter 6: Securing the Cloud: Key Strategies and Best Practices Chapter 6 Securing the Cloud: Key Strategies and Best Practices presents an overall cloud security strategy for effectively managing risk. Also covered is a treatment of cloud security controls and a discussion of the limits of security controls in cloud computing. The chapter also includes a detailed treatment of best practices for cloud security and a discussion of security monitoring for cloud computing. Chapter 7: Security Criteria: Building an Internal Cloud Chapter 7 Security Criteria: Building an Internal Cloud discusses the various motivations for embarking on a private cloud strategy along with an overview of what adopting a private cloud strategy entails in terms of benefits to both the enterprise and to security. The remainder of the chapter details the security criteria for a private cloud. Chapter 8: Security Criteria: Selecting an External Cloud Provider Chapter 8 Security Criteria: Selecting an External Cloud Provider ties together the material from the previous chapters in providing guidance for selecting a cloud service provider (CSP). In doing so, it addresses the gaps between vendor claims and the various aspects of information assurance, including those elements that are critical in selecting a CSP. That discussion includes an overview of vendor transparency and the prudent limits of disclosure. The chapter includes a discussion on the nature of risks in cloud computing along with the probability, impact affected assets, and factors that may be involved. The chapter concludes with a lengthy discussion of security criteria to enable selection of a CSP. Chapter 9: Evaluating Cloud Security: An Information Security Framework Chapter 9 Evaluating Cloud Security: An Information Security Framework builds on previous chapters and presents a framework for evaluating cloud security. This framework augments the security criteria identified in Chapter 8 and serves to provide a set of tools to evaluate the security of a private, community, or public cloud.

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Cloud Computing. Bringing the Cloud into Focus

Cloud Computing. Bringing the Cloud into Focus Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice

More information

Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006

Virtualization 101: Technologies, Benefits, and Challenges. A White Paper by Andi Mann, EMA Senior Analyst August 2006 Virtualization 101: Technologies, Benefits, and Challenges A White Paper by Andi Mann, EMA Senior Analyst August 2006 Table of Contents Introduction...1 What is Virtualization?...1 The Different Types

More information

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications

White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications White Paper: Optimizing the Cloud Infrastructure for Enterprise Applications 2010 Ashton, Metzler, & Associates. All rights reserved. Executive Summary Given the technological and organizational risks

More information

1 Introduction. 2 What is Cloud Computing?

1 Introduction. 2 What is Cloud Computing? 1 Introduction Table of Contents 1 Introduction 2 What is Cloud Computing? 3 Why is Cloud Computing important? 4 Why Cloud deployments fail? 5 Holistic Approach to cloud computing implementation 6 Conclusion

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

THE INS AND OUTS OF CLOUD COMPUTING

THE INS AND OUTS OF CLOUD COMPUTING THE INS AND OUTS OF CLOUD COMPUTING and Its Impact on the Network April 2010 Rev. A 04/10 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com http://www.spirent.com AMERICAS

More information

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com

Introduction to Cloud Computing. Srinath Beldona srinath_beldona@yahoo.com Introduction to Cloud Computing Srinath Beldona srinath_beldona@yahoo.com Agenda Pre-requisites Course objectives What you will learn in this tutorial? Brief history Is cloud computing new? Why cloud computing?

More information

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business

WHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,

More information

Kent State University s Cloud Strategy

Kent State University s Cloud Strategy Kent State University s Cloud Strategy Table of Contents Item Page 1. From the CIO 3 2. Strategic Direction for Cloud Computing at Kent State 4 3. Cloud Computing at Kent State University 5 4. Methodology

More information

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise David Linthicum SaaS or On-Premise? How to Select the Right Paths for Your Enterprise 2 Executive Summary The growth of Software- as-

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Whitepaper. The ABC of Private Clouds. A viable option or another cloud gimmick?

Whitepaper. The ABC of Private Clouds. A viable option or another cloud gimmick? Whitepaper The ABC of Private Clouds A viable option or another cloud gimmick? Although many organizations have adopted the cloud and are reaping the benefits of a cloud computing platform, there are still

More information

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts. Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:

More information

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase

White Paper. Architecting the security of the next-generation data center. why security needs to be a key component early in the design phase White Paper Architecting the security of the next-generation data center A White Paper by Bloor Research Author : Fran Howarth Publish date : August 2011 teams involved in modernization projects need to

More information

BUYING GUIDE. Buying Guide for Cloud Services

BUYING GUIDE. Buying Guide for Cloud Services BUYING GUIDE Buying Guide for Cloud Services Getting Started Welcome to the CompTIA Buying Guide for Cloud Services. If you are like most executives, buying technology often entails elements of excitement,

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Cloud Computing; What is it, How long has it been here, and Where is it going?

Cloud Computing; What is it, How long has it been here, and Where is it going? Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.

More information

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective

Evolution from the Traditional Data Center to Exalogic: An Operational Perspective An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information

More information

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information

More information

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you

Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance

More information

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST Future of Cloud Computing Irena Bojanova, Ph.D. UMUC, NIST No Longer On The Horizon Essential Characteristics On-demand Self-Service Broad Network Access Resource Pooling Rapid Elasticity Measured Service

More information

Data Center Networking Designing Today s Data Center

Data Center Networking Designing Today s Data Center Data Center Networking Designing Today s Data Center There is nothing more important than our customers. Data Center Networking Designing Today s Data Center Executive Summary Demand for application availability

More information

CLOUD COMPUTING SECURITY ISSUES

CLOUD COMPUTING SECURITY ISSUES CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights

More information

Capturing the New Frontier:

Capturing the New Frontier: Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

Security & Trust in the Cloud

Security & Trust in the Cloud Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models A Guide to Cloud Computing Costs, Server Costs, Pricing Plans, and Chargeback Implementation and Systems Introduction

More information

Cloud Computing Safe Harbor or Wild West?

Cloud Computing Safe Harbor or Wild West? IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Managing Data in Motion

Managing Data in Motion Managing Data in Motion Data Integration Best Practice Techniques and Technologies April Reeve ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Leveraging an On-Demand Platform for Enterprise Architecture Preparing for the Change

Leveraging an On-Demand Platform for Enterprise Architecture Preparing for the Change Leveraging an On-Demand Platform for Enterprise Architecture Preparing for the Change David S. Linthicum david@linthicumgroup.com The notion of enterprise architecture is changing quickly. What was once

More information

Cloud Computing in Banking

Cloud Computing in Banking Financial Services the way we see it Cloud Computing in Banking What banks need to know when considering a move to the cloud Contents 1 Overview 3 2 Why Cloud Computing for Banks? 4 2.1 Cost Savings and

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure White Paper Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure Providing Agile and Efficient Service Delivery for Sustainable Business Advantage What You Will Learn Enterprises

More information

Enterprise Cloud Solutions

Enterprise Cloud Solutions IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public

More information

VIRTUALIZATION IS NOT THE CLOUD AN ANALYSIS OF THE GAPS BETWEEN VIRTUALIZATION AND CLOUD COMPUTING

VIRTUALIZATION IS NOT THE CLOUD AN ANALYSIS OF THE GAPS BETWEEN VIRTUALIZATION AND CLOUD COMPUTING VIRTUALIZATION IS NOT THE CLOUD AN ANALYSIS OF THE GAPS BETWEEN VIRTUALIZATION AND CLOUD COMPUTING Virtualization Is Not The Cloud Page 1 TABLE OF CONTENTS Introduction 3 Virtualization Is Not The Cloud

More information

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011

IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing

More information

Fujitsu Dynamic Cloud Bridging today and tomorrow

Fujitsu Dynamic Cloud Bridging today and tomorrow Fujitsu Dynamic Cloud Bridging today and tomorrow Contents Cloud Computing with Fujitsu 3 Fujitsu Dynamic Cloud: Higher Dynamics for Enterprises 4 Fujitsu Dynamic Cloud: Our Offering 6 High Security Standards

More information

In a dynamic economic environment, your company s survival

In a dynamic economic environment, your company s survival Chapter 1 Cloud Computing Defined In This Chapter Examining the reasons for cloud Understanding cloud types Defining the elements of cloud computing Comparing private and public clouds In a dynamic economic

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University

More information

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................

More information

Cloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r

Cloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r C l a s s i f i c a t i o n I S O 2 7 0 0 1 : P u b l i c Cloud Computing Prospects & Challenges P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r 1 OUTLINE Cloud Definition and Classification

More information

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012 A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES

More information

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud

Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

More information

Cloud Adoption. The definitive guide to a business technology revolution. shaping tomorrow with you

Cloud Adoption. The definitive guide to a business technology revolution. shaping tomorrow with you Cloud Adoption The definitive guide to a business technology revolution shaping tomorrow with you THE WHITE BOOK OF Cloud Adoption Contents Acknowledgments 4 Preface 5 1: What is Cloud? 6 2: What Cloud

More information

How cloud computing can transform your business landscape.

How cloud computing can transform your business landscape. How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014 Why Migrate to the Cloud ABSS Solutions, Inc. 2014 ASI Cloud Services Information Systems Basics Cloud Fundamentals Cloud Options Why Move to the Cloud Our Service Providers Our Process Information System

More information

Understanding the Value of Financial Intelligence for Cloud Management. A white paper by David Linthicum

Understanding the Value of Financial Intelligence for Cloud Management. A white paper by David Linthicum Understanding the Value of Financial Intelligence for Cloud Management A white paper by David Linthicum Hybrid IT Computing 2 Executive Summary Most of those who fund and operate cloud-based or virtualized

More information

Data Center Evolution without Revolution

Data Center Evolution without Revolution WHITE PAPER www.brocade.com DATA CENTER Data Center Evolution without Revolution Brocade networking solutions help organizations transition smoothly to a world where information and applications can reside

More information

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS

A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS A ROAD MAP FOR GEOSPATIAL INFORMATION SYSTEM APPLICATIONS ON VBLOCK INFRASTRUCTURE PLATFORMS June 2011 WHITE PAPER 2011 VCE Company LLC, All rights reserved. 1 Table of Contents Executive Overview... 3

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

www.brennanit.com.au Sydney Melbourne Brisbane Adelaide Newcastle

www.brennanit.com.au Sydney Melbourne Brisbane Adelaide Newcastle www.brennanit.com.au Sydney Melbourne Brisbane Adelaide Newcastle Brennan Whitepaper Cloud computing Part 1 The facts minus the hype May 2010 Table of Contents Cloud computing the facts minus the hype

More information

The Massachusetts Open Cloud (MOC)

The Massachusetts Open Cloud (MOC) The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is

More information

Effective Practices for Cloud Security

Effective Practices for Cloud Security Effective Practices for Cloud Security Effective Security Practices Series Moving some internal processes to the cloud initially looks appealing: lower capital costs, more centralized management and control,

More information

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com Hybrid Cloud Mini Roundtable April 17, 2013 Expect Excellence www.divihn.com Today s Agenda What to expect today Introductions Plus, why are you here this evening? What is Hybrid Cloud? Why Hybrid Cloud?

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

STeP-IN SUMMIT 2013. June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case) 10 th International Conference on Software Testing June 18 21, 2013 at Bangalore, INDIA by Sowmya Krishnan, Senior Software QA Engineer, Citrix Copyright: STeP-IN Forum and Quality Solutions for Information

More information

WHITEPAPER. Data Security for Office 365 Balancing control & usability

WHITEPAPER. Data Security for Office 365 Balancing control & usability WHITEPAPER Data Security for Office 365 Balancing control & usability Contents Executive Summary... 2 Top Security Issues for Office 365... 4 Compelled Disclosures... 4 Unauthorized Sharing... 4 External

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and. Cloud and Virtual Data Storage Networking Your journey to efficient and effective information services Greg Schulz CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of

More information

Cisco Cloud Enablement Services for Education

Cisco Cloud Enablement Services for Education Services Overview Cisco Cloud Enablement Services for Education Bringing the Cloud to the Campus In today s higher education environment, IT organizations must keep pace with a long list of competing demands:

More information

CLOUD MIGRATION STRATEGIES

CLOUD MIGRATION STRATEGIES CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while

More information

Cloud Computing. Karan Saxena * & Kritika Agarwal**

Cloud Computing. Karan Saxena * & Kritika Agarwal** Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic

More information

Introduction to Cloud Computing

Introduction to Cloud Computing 1 Introduction to Cloud Computing CERTIFICATION OBJECTIVES 1.01 Cloud Computing: Common Terms and Definitions 1.02 Cloud Computing and Virtualization 1.03 Early Examples of Cloud Computing 1.04 Cloud Computing

More information

Cisco Cloud Architecture for the Microsoft Cloud Platform

Cisco Cloud Architecture for the Microsoft Cloud Platform Solution Overview Cisco Cloud Architecture for the Microsoft Cloud Platform BENEFITS Deliver complete cloud services with confidence: Offer best-in-class hybrid, IaaS, PaaS, and SaaS services enabled by

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

MDE Opportunities in Multi-Tenant Cloud Applications

MDE Opportunities in Multi-Tenant Cloud Applications MDE Opportunities in Multi-Tenant Cloud Applications Mohammad Abu Matar 1 and Jon Whittle 2 1 Etisalat British Telecom Innovation Center Khalifa University of Science, Technology and Research Abu Dhabi,

More information

How Solace Message Routers Reduce the Cost of IT Infrastructure

How Solace Message Routers Reduce the Cost of IT Infrastructure How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT

More information

6 Cloud computing overview

6 Cloud computing overview 6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable

More information

A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud

A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud WHITE PAPER A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud Abstract Data center consolidation and virtualization have set the stage for cloud computing.

More information

AskAvanade: Answering the Burning Questions around Cloud Computing

AskAvanade: Answering the Burning Questions around Cloud Computing AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,

More information