Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
|
|
|
- Todd Walker
- 10 years ago
- Views:
Transcription
1 Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc.
2 Introduction Public clouds are the latest evolution of computing, offering tremendous value to businesses in terms of better economics, agility, rapid elasticity, etc. The public cloud infrastructure is operated by a cloud service provider and the services are offered over the internet. This very nature of public clouds offers various advantages such as better ROI and faster time to market, while also raising concerns about lack of visibility, security, reliability, etc. Public clouds are well suited to meet the collaborative needs of today s global workforce distributed across different geographies and time zones. What is a Public Cloud? Simply put, a public cloud is the availability of IT resources, like compute, storage, development platforms, applications, etc., as service over the internet and which can be provisioned on demand using a self-service portal. Public clouds offer rapid elasticity and seemingly infinite scalability with an ability to consume resources on a pay-per-use basis. Typically public clouds are operated and managed at datacenters belonging to service providers and shared by multiple customers (multi-tenancy). Such a shared model helps reduce vendor costs, which manifests itself in better cloud economics. However, there is also less visibility and control in a public cloud than a private cloud because the underlying infrastructure is owned by the service provider. The degree of visibility and control depends on the specific public cloud delivery model. Delivery Models The most common framework for cloud delivery models is the SPI model (Software, Platform, Infrastructure) in which cloud services are classified into three different delivery types: IaaS (Infrastructure as a Service) - Shared infrastructure such as servers, storage and network are delivered as a service over the internet. Some examples include Amazon Web Services, Rackspace Cloud, etc. IaaS offers the most control to the users and generally the least security from the service provider. The users are expected to be responsible for ensuring the security of their cloud infrastructure as well as the applications built on top of them. PaaS (Platform as a Service) - Application development framework offered as a service to developers for quick deployment of their code. Some examples for PaaS include Google App Engine, Heroku, Cloud Foundry, etc. PaaS offers no control over the underlying infrastructure while offering some control over the applications and its configuration. While the provider takes care of the security of the underlying infrastructure, the developer is responsible for application security. Krishnan Subramanian 2011 Public Clouds Page 1
3 SaaS (Software as a Service) - Application software offered as a service using a multitenant model which can be consumed using web browsers. Some examples are Gmail, Salesforce, etc. With SaaS solutions, service providers are responsible for security because they control the infrastructure and applications. However, because service providers retain control, SaaS offers the customer very little visibility and customizability over the infrastructure underneath or even application configuration. Trend Micro Survey Results A recent survey conducted by Trend Micro, a cloud security company, offers some insights into the expectations and concerns businesses have about cloud technologies. The survey was conducted in six different countries with 1200 respondents from companies with at least 500 employees. Some of the key results are: 43% of the respondents using a cloud service reported that they have experienced a data security lapse/issue in the last 12 months. 55% expressed concerns that shared storage is vulnerable without encryption. 49% of them said a guaranteed SLA will help them adopt public clouds. 93% of the respondents indicated that their organization is using at least one cloud service when they were presented with a list of cloud providers. However, 7% of these same respondents had previously indicated in the survey that their company had no plans to deploy cloud services showing that this 7% did not realize that their company had already deployed cloud computing. 85% of those using a public cloud in production said they are encrypting the data stored in the cloud and keep a local copy synched to the cloud. In general, these results clearly highlight the need for these companies to have better awareness on how they can use cloud services. Also, these concerns indicate the need for these companies to control the security of their data in public cloud services. Benefits The very fact that public cloud services are offered by third-party providers with an ability to scale big offers some unique advantages that are otherwise not available in private clouds. The use of public cloud services shifts the responsibility of managing complex IT, which is not the core business of many companies, to a third-party provider, thereby, offering some benefits that cannot be realized either in traditional infrastructure or private clouds. Some of the benefits offered by public clouds to business organizations are: Krishnan Subramanian 2011 Public Clouds Page 2
4 Cost Savings Eliminates capex and offers reduced opex because the maintenance and labor costs associated with managing the infrastructure is offloaded to a third-party provider. Ensures cost efficiency because of the pay-per-use models. Typically, service providers charge by the hour and this comes in handy when a company s resource needs are for a temporary project or to meet a sudden spike in usage, avoiding the need to build out internal infrastructure to cover these projects. Offers self-service provisioning, leading to lower costs and better agility because human intervention in resource provisioning is minimized. Business Agility Provides massive scalability and an ability to elastically re-size compute resources based on the organization s IT needs. Gives programmatic access to compute resources through API, helping applications scale automatically without any human intervention. Supplies robust infrastructure with better support staff, offering cost and talent advantages in an increasingly shrinking pool of expertise. Security Considerations Even though the public cloud offers tremendous benefits, businesses cannot embrace public cloud services without taking some security considerations into account. The use of public clouds requires trust on the side of businesses using these services and transparency on the side of cloud providers. In this section, we will highlight some of the security considerations that are important for any business planning to move to public clouds. Multi-tenancy risks: The shared multi-tenant nature of public clouds adds security risks such as unauthorized access of data by other tenants using the same hardware. Also, a multi-tenant environment exposes resource contention issues whenever one of the tenants using the hardware consumes a disproportionate amount of resources either due to need or due to hack attacks. Control and visibility: Businesses have limited control and visibility because the vendor is responsible for completely managing the infrastructure. This adds some additional security concerns associated with lack of transparency. Business organizations need a mental shift as they cede the control of IT to a third party while using public cloud services. Security responsibility: Security is a shared responsibility between the vendor and the user, with the degree of responsibility of each varying by type of cloud model. Krishnan Subramanian 2011 Public Clouds Page 3
5 Data and encryption: Data privacy is at risk if data in the cloud is unencrypted. There is the potential for unauthorized access either by a rogue employee on the cloud service provider side or an intruder gaining access to the infrastructure. Data retention: When the data is moved or deleted by a service provider or customer, there may be remaining data remnants, potentially exposing sensitive data to unauthorized sources. Compliance requirements: Different countries have different regulatory requirements on data privacy. Since some public cloud providers offer no information on the location of the data, it is important to consider the regulatory requirements on where data can reside. Security Best Practices This section focuses on the security best practices for the IaaS cloud model. IaaS provides customers with the most flexibility and responsibility to provide their own security. As mentioned above, the service provider is responsible for most, if not all, of the security for the SaaS and PaaS cloud models. Public cloud services require businesses to rethink traditional security practices. In this section, we will highlight some of the best practices that can greatly reduce the risks associated with public clouds. With less risk, businesses can move more data safely into the public cloud, allowing them to realize IaaS cloud benefits, such as service agility and cost savings. VM-level security: Unlike the traditional computing model or private clouds, the idea of perimeter completely vanishes in a public cloud environment. A defense should be built at the Virtual Machine (VM) level so that it travels with the VM into the cloud infrastructure. Multi-layered defense: Using tools like firewall, IDS/IPS, log inspection, etc. geared towards virtual machines is important. More importantly, the traffic between the virtual machines should be continuously monitored by setting up policies appropriately. It is also equally important to take advantage of the security features offered by the public cloud providers themselves. Data and encryption: Data in the cloud should be encrypted. An encryption solution should have well-designed encryption key management policies to ensure data integrity. Also, businesses should maintain encryption key ownership. In fact, encryption and efficient key management can offset any lack of transparency on the cloud provider side. Patch management: Having the right set of policies around patching is important. Patching in the cloud environment is much more difficult than in the physical environment, because VMs can be moved around and switched on and off at will. Krishnan Subramanian 2011 Public Clouds Page 4
6 Identity and access: Businesses should consider using third-party tools for single signon and for implementing better access control than what is available in the management console of the cloud provider. Regulatory compliance: Businesses should understand the impact of regulations and assess which policies and procedures change with respect to the public cloud deployment. Companies should realize the nature of this change and associated impact; develop processes to collect evidence, such as audit logs; and store this evidence securely. It is absolutely critical to collect the necessary evidence from the public cloud provider and store it outside the cloud environment. Also, businesses will benefit from selecting an auditor who understands the changed dynamics and challenges of using public cloud services. Recommendations for Public Cloud Adoption Public Cloud Implementation In the Trend Micro survey, 13% of respondents had a public cloud in production and another 43% were implementing or were in the midst of piloting a public cloud. Public Cloud Use Cases Businesses can take advantage of the cost benefits and elasticity of public clouds to their advantage. A video production company can use public clouds for video rendering and pay for only the time they used the resources. A business can tap into public clouds when they expect unpredictable demand during a marketing promotion. A pharmaceutical company can run their drug design processes on public cloud, thereby, accelerating the time to market. With proper security procedures, more and more workloads can be moved to the public clouds. In fact, public clouds easily match the private clouds with respect to availability and business continuity. Conclusion Public clouds offer tremendous value for businesses of all sizes across many different verticals. Even with stringent compliance requirement, businesses can take advantage of public cloud services to enjoy benefits such as better cost structure, business agility, etc. Public cloud services require a different set of security considerations to mitigate any potential risks, but by following security best practices such as self-defending virtual machines and encryption in cloud environments, data can be safely deployed into the public cloud. Hybrid and private clouds are considered in two other whitepapers where security considerations and solutions on these environments are discussed. Krishnan Subramanian 2011 Public Clouds Page 5
Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
Hybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Total Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
How Data-Centric Protection Increases Security in Cloud Computing and Virtualization
How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Executive Overview Cloud services and virtualization are driving significant shifts in IT spending and deployments.
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
VMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Enhancing Operational Capacities and Capabilities through Cloud Technologies
Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone. Table of Contents. Cloud.com White Paper April 2010. 1 Executive Summary...
Cloud Computing: Elastic, Scalable, On-Demand IT Services for Everyone Cloud.com White Paper April 2010 Table of Contents 1 Executive Summary... 2 2 Motivation Around Cloud Computing... 2 3 Comparing Cloud
All the benefits of Public Cloud on Private, Dedicated Infrastructure. Benefits. Enterprise-Level Security. High Performance. Compliant and Audited
ActiveGrid Private Cloud Solutions Support any workload with incredible flexibility and security, combined with the peace of mind of an enterprise cloud platform. All signs point to continued cloud adoption
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro [email protected] 26.03.2013
Overview. The Cloud. Characteristics and usage of the cloud Realities and risks of the cloud
Overview The purpose of this paper is to introduce the reader to the basics of cloud computing or the cloud with the aim of introducing the following aspects: Characteristics and usage of the cloud Realities
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
Performance Management for Cloudbased STC 2012
Performance Management for Cloudbased Applications STC 2012 1 Agenda Context Problem Statement Cloud Architecture Need for Performance in Cloud Performance Challenges in Cloud Generic IaaS / PaaS / SaaS
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
Building Private & Hybrid Cloud Solutions
Solution Brief: Building Private & Hybrid Cloud Solutions WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction When most
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES
VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Cloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
Effective End-to-End Enterprise Cloud Management
SOLUTION WHITE PAPER Effective End-to-End Enterprise Cloud Management By combining technologies from BMC and VMware, enterprises and large service providers gain end-to-end management of their cloud infrastructure
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Proactively Secure Your Cloud Computing Platform
Proactively Secure Your Cloud Computing Platform Dr. Krutartha Patel Security Engineer 2010 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Agenda 1 Cloud
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012
Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
SaaS, PaaS & TaaS. By: Raza Usmani
SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the
Certified Cloud Computing Professional VS-1067
Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
Securing the Physical, Virtual, Cloud Continuum
Securing the Physical, Virtual, Cloud Continuum By Ted Ritter, CISSP Senior Research Analyst Executive Summary The data center is undergoing a radical shift, from virtualization towards internal cloud
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Remote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Addressing Data Security Challenges in the Cloud
Addressing Data Security Challenges in the Cloud Coordinate Security. The Need for Cloud Computing Security A Trend Micro White Paper July 2010 I. INTRODUCTION Enterprises increasingly recognize cloud
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Cloud Computing Business, Technology & Security. Subra Kumaraswamy Director, Security Architecture, ebay
Cloud Computing Business, Technology & Security Subra Kumaraswamy Director, Security Architecture, ebay COT2010 29 June 2010 Cloud Computing: Evolution not a Revolution 2 What s Driving Interest in Clouds
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF
TOP 7 THINGS Every Executive Should Know About Cloud Computing EXECUTIVE BRIEF As interest in cloud computing increases, so does the confusion surrounding it. What is cloud computing? Can the technology
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT
Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure
Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview...
Table of Content Cloud Computing Tutorial... 2 Audience... 2 Prerequisites... 2 Copyright & Disclaimer Notice... 2 Cloud Computing - Overview... 9 What is Cloud?... 9 What is Cloud Computing?... 9 Basic
Managing Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. [email protected] Learning Objectives Understand how to identify
Trend Micro Deep Security
Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center A 2012 Trend Micro White Paper I. INTRODUCTION From its early experimental
THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents
Cloud Computing: Background, Risks and Audit Recommendations
Cloud Computing: Background, Risks and Audit Recommendations October 30, 2014 Table of Contents Cloud Computing: Overview 3 Multiple Models of Cloud Computing 11 Deployment Models 16 Considerations For
Trust but Verify. Vincent Campitelli. VP IT Risk Management
Trust but Verify Vincent Campitelli VP IT Risk Management McKesson Corporation Trust but Verify Cloud Security 3 Agenda Cloud Defined Cloud Opportunities Cloud Challenges What s Different? How to Verify
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you
Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance
The Definitive Guide to the Cloud and Kentico CMS THOMAS ROBBINS
The Definitive Guide to the Cloud and Kentico CMS THOMAS ROBBINS Contents Introduction... 4 What is Cloud Computing?... 4 The Benefits of the Cloud... 6 Full Hardware Utilization... 6 Lower Power Costs...
Optimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
How To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud
Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud Tony Bradley Microsoft MVP, CISSP-ISSAP Principal Analyst, Bradley Strategy Group The connected, mobile
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) Introduction to Cloud Security. Taniya
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 6464(Print)
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Moving Lab Management Environments to the Cloud
Moving Lab Management Environments to the Cloud white paper 2 Moving Lab Management Environments to the Cloud» Executive Summary On February 14, 2011, VMware announced their decision to discontinue additional
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services
A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services Ronnie D. Caytiles and Byungjoo Park * Department of Multimedia Engineering, Hannam University
Enterprise Cloud Solutions
IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,
Business Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected]
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. [email protected] Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Mobile cloud business
1 Mobile cloud business Sakari Luukkainen 2 Introduction term "cloud" was first used as a metaphor for the Internet, based on the cloud drawing used to depict the Internet as an abstraction of the underlying
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
How To Understand Cloud Computing
Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs
WHITE PAPER: Egenera Cloud Suite
WHITE PAPER: Egenera Cloud Suite ... Introduction Driven by ever-increasing business demand, cloud computing has become part of many organizations IT strategy today. Driving this transition is the need
Realizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
