How To Secure Cloud Computing
|
|
|
- Horace McDaniel
- 5 years ago
- Views:
Transcription
1 Security and the Cloud: Cloud Trust Brokers Ravi Ganesan* Founder, SafeMashups *This work was performed when Ravi Ganesan was a Research Professor at the Institute for Cyber Security at The University of Texas at San Antonio which incubated SafeMashups Inc. Ravi Sandhu Executive Director and Founder Institute for Cyber Security Endowed Professor of Cyber Securiy University of Texas at San Antonio [email protected] Todd Wolff Assoc. Dir. and Chief Architect Institute for Cyber Security University of Texas at San Antonio [email protected] 1
2 Institute for Cyber Security (ICS) Mission: World leading research with real world impact! Founded June 2007: young and agile in start up style World leading security modeling and analysis research Role Based Access Control (RBAC) Model: Commercially dominant model today Usage Control (UCON) Model: Attribute Based Access Control on Steroids PEI layers: Policy (what), Enforcement (how), Implementation (how exactly) Group Centric Information Sharing: Sharing metaphor of meeting room Security for Social Networks Botnet Analysis, Detection and Mitigation Multilevel Secure Architectures Secure Cloud Computing World leading research infrastructure FlexCloud FlexFarm 2
3 The Big Cyber (Security) Trend EICE Enterprise/Infrastructure-Centric Era (Orange/Rainbow Era, Post-Orange Era) Applications are cyber analogs of previously existing enterprise-centric applications on-line banking brokerage e-retail auctions search engines. payroll inventory control accounting. ATCE Application/Technology-Centric Era Future applications and application layer tecnologies will be fundamentally different????????? 3
4 PEI Layers World View Security and system goals Necessarily informal Policy models Enforcement models/architectures Implementation models/architectures/platforms Concrete System Specified in terms of users, subjects, objects, administrators, labels, roles, groups, etc. in an idealized setting. Security analysis (e.g. security objectives, security properties, etc.) Approximated policy realized using system architecture with trusted servers, secure protocols, etc. in a real-world setting Enforcement level security analysis (e.g. safe approximations with respect to network latency, y,protocol proofs, security yproperties, p etc.) Technologies and standards such as SOA, Cloud, SaaS, TCG/TPM, MILS, X.509, SAML, XACML, Oath, Oauth, etc. Implementation level security analysis (e.g. vulnerability analysis, penetration testing, protocol proofs, security properties, etc.) Layered software stacks executing on Hardware 4
5 Cloud Security: Myths and Reality Myths Same old, same old MULTICS did it all in 1970s It s all new, it s all different Let s re invent all the basics Reality Cloud Technology intrinsically changes existing security problems e.g. What hardware does your system run on?, a typical security evaluation question becomes irrelevant Cloud Technology enables new applications which bring new security challenges e.g. multi party applications running on a multi party platform New fundamental problems arise including How to broker trust across multi party applications running on multi party platforms 5
6 Cloud Computing: The Broader Context Macro Trend: We are moving to a new multi party Internet. Old Paradigm: SSL lock /Green bar gives Alice hints as to authenticity of site New Paradigm: 3 rd Party Trust Broker advises Alice through browser (e.g. McAfee Site Advisor toolbar) as to quality of site Old Paradigm: Everyone is an Identity Provider (IP) and a Relying Party (RP) New Paradigm: Few 3 rd Party Trust Broker IPs, everyone else is an RP. Old Paradigm: User gets service from a single web app, perhaps with behind the scenes collaboration from other services New Paradigm: User s service is a mashup being served from multiple (often cross domain) web apps, provisioned by the digital age end user Virtualization and clouds are themselves an example of this trend Applications and data itself no longer reside in one permanent location but live in multiple locations at different times It s all about multi party applications on multi party platforms engineered onthe fly by innovative twenty somethings. Self service on steroids. 6
7 Cloud Security Alliance Reference Model Provides an excellent reference model dl covering the major cloud services being offered today. But the model does not explicitly identify the multiple parties involved. Lets take a (of course fictitious!) eg: e.g.: I mashup Google Maps with SalesForce.Com to get visual picture of where my customers are. Lets say Google Maps runs nson a Free BSD guest OS running on Vmware ESXi and SalesForce.Com runs on a Linux guest OS running on Amazon s EC2 cloud using XEN. Assume Google uses SUN hardware using the SPARC architecture and SF.com uses INTEL PCs. And Google leases data centers in multiple countries from Savvis and SF.com does the same from Cable and Wireless. 7
8 A day at the office Mr. CSO CIO: The VP of Sales wants to use this cool new mashup between Google Maps and SalesForce.Com. It is going to increase our revenue, and the whole company will benefit. Surely you are OK with it? CSO contemplates: What a fine conundrum! Soon Enough: New multi party applications are popping up via spontaneous innovation by the twenty something generation with no bandwidth for contemplation. Self service on steroids. 8
9 4 step enforcement model/architecture 1. Identify the parties using seven tangible layers. Why seven? (homage to OSI stack; also considered a lucky number!). 2. Divide each layer into security units (SUs) with security profile. E.g. each cage in a shared physical data center is an SU or each guest OS on a hypervisor is an SU. The CloudSecurity Alliance document is anexcellent starting point for what information each SU security profile (e.g. XML based) should have. 3. Add agents to each SU which contain all relevant security information (with appropriate certification). 4. When SU s need to interact, they can only do so if an automated Cloud Trust Broker (CTB) controlled by the CSO team permits it and enables it. SU Agent to CTB to SU Agent connection is initiated. If CTB allows connection, it brokers session keys and then steps aside. 9
10 Step 1: Seven Layer Clouds 7. Browser (the MashupOS*) 6. User Desktop 5. Application 4. Guest Operating System 3. Virtualization 2. Hardware 1. Physical facilities *Note: MashupOS is a term created by Microsoft Research (Ref. Howell, et al) Specify the generic capabilities at each layer using a standards based short XML profile. e.g. Which browser? Is app a mashup from different sources? e.g. Is the desktop imaged by an enterprise? Does it have a personal firewall/av built in? e.g. What sort of vulnerability analysis and scanning was done on the application? e.g. Does guest OS have common criteria/niap certification? e.g. Is privileged user access allowed remotely? Are dual controls required. e.g. Do motherboards have TPM/other crypto hardware? Does the SAN use encryption? e.g. Whatis policy for physical security?does network layer 2 have encryption? 10
11 Step 2:Divide into security units (SUs) 7. Browser (the MashupOS*) 6. User Desktop 5. Application 4. Guest Operating System 3. Virtualization 2. Hardware 1. Physical facilities Add/Modify generic layer security profile with SU specific profile. e.g. Different widgets in a mashup might come from sources at different levels of trust. e.g. Different user accounts could have different privileges. e.g. In shared web hosting on common OS the application security profiles will differ. e.g. Obviously could be different OSes, but even same OS could widely differ in security. e.g. Different administrators could have different privileges wrt different hypervisors. e.g. Each blade or server or SAN could be separate SU. e.g. Each cage in shared facilitycouldcould be a separate SU. 11
12 While not always true: Assumptions (especially about Layers 1 5) we in general assume that layer N 1 can generally compromise layer N. we in general assume that N+1 should not be able to compromise layer N. we assume that the Chinese Walls between SUs are not porous. The reliability of all of the three above assumptions should be certified regularly and becomea part of the SU profile. The SU profiles are cumulative upwards, in other words, the Layer 5 SU profile has the profiles for all the layers below. Note: One does not have to wait for lower layers to implement functionality. E.g. a Guest OS can create a profile for the data center, if the data center does not as yet provide one. Obviously in the long run it would be preferable if each layer maintains its own up to date profile. 12
13 Step 3: Embed security agents into each SU Browser (the MashupOS*) User Desktop Application Guest Operating System Virtualization Hardware Physical facilities The agents are used to establish tblih connections between SUs: Either to share SU security profile And, potentially ti as precursor to moving data/apps from one SU to another. They have to have access to unique credentials (private key, cert) for mutual auth and session key exchange. How keys are protected should be part of security profile. Could potentially use TPMs at Layer 2 for key protection, and allow channel from Layer 5 to 2 limited for this purpose. Some layers, especially Layer 1 may not have ability to embed agents. Agent will have to reside on separate locked down computer. 13
14 Step 4: The Cloud Trust Broker Cloud trust broker SU-Agents are never allowed to communicate directly with each other. They have to: Establish trust through a cloud trust broker (CTB) using a multi-party trust protocol. The CTB will validate the security profile and use policy to decide whether to permit the establishment of the connection. It can also compare the security profile presented to it, with its prior knowledge of what the security profile of the SU was. In most cases after setting up the connection, the CTB gets out of the way. 14
15 Two new ingredients are needed A multi party trust protocol that can run at any layer. Preferably a single standard and demonstrably secure protocol. A Cloud Trust Broker Could be hosted by enterprise Could be a SaaS offering Could be a public trust broker. Eventually Cloud Trust Brokers may need to talk to each other. 15
16 SafeMashups Cloud Trust Broker SfM SafeMashups is a company that was incubated at the Institute for CyberSecurity at the University of Texas at San Antonio and is currently being spun out. (see It invented the concept of MashSSL, which is a way to make SSL a multi party protocol that can be run at any layer, including over (not under) HTTP. MashSSL is in the process of being made an open standard as part of an Alliance that includes almost every major Certificate Authority, and a variety of other security companies and universities, etc. It allows for establishment of multi party trust through 3 rd parties such as a cloud trust broker (or for two web apps communicating through an untrusted user). 16
17 SafeMashups Cloud Trust Broker Virtual CSO Cloud Trust Broker Provides Benefits of Cloud Trust Broker Brokers session (using MashSSL) from one service and establishes temporary shared secret (the familiar SSL master secret). Will only allow connection establishment if the policy permits the services to interact. Once it establishes session, it gets out of the way allowing services to communicate directly. Enterprise retains control of flow of data/processes. E.g. only allow data and processes to migrate from less secure to more secure environments. Perfect point to enforce governance, regulations and compliance. Secure audit trail. 17
18 Security and the Cloud Summary Cloud Technology intrinsically changes existing security problems Cloud Technology enables new applications which bring new security challenges It s all about multi party t applications on multi party t platforms ltf engineered on the fly by innovative twenty somethings. Self service on steroids. New fundamental problems arise including How to broker trust across multi party applications running on multi party platforms At a technical level this poses several challenges for which we propose the following solutions A seven layer security enforcement architecture comprising Security Units at each layer with Security Agents that can communicate as brokered and enabled/prohibited by Cloud Trust Brokers A demonstrably secure standard three party protocol to achieve this goal SafeMashups, a spin out from UTSA s Institute for Cyber Security has Invented MashSSL the necessary three party protocol which is in process of becoming an open standard d Implemented its first generation of Cloud Trust Brokers and is developing the next generation 18
Cyber Security: Past, Present and Future
Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August 2009 [email protected] www.profsandhu.com
The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It?
Institute for Cyber Security The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, 2011 [email protected]
The Future of Cyber Security
Institute for Cyber Security The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair [email protected] www.profsandhu.com www.ics.utsa.edu Ravi Sandhu 1 Cyber Security Status
Cyber Security: What You Need to Know
Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security University of Texas at San Antonio October 2009 [email protected] www.profsandhu.com
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
The Science, Engineering, and Business of Cyber Security
Institute for Cyber Security The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security COS
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-0056. Volume: 02 Issue: 05 Aug-2015 www.irjet.net p-issn: 2395-0072
Fear of Cloud Vinnakota Saran Chaitanya 1, G. Harshavardhan Reddy 2 1 UG Final year student, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Andhra Pradesh, India 2
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
The Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
The Cloud as a Computing Platform: Options for the Enterprise
The Cloud as a Computing Platform: Options for the Enterprise Anthony Lewandowski, Ph.D. Solutions Architect Implicate Order Consulting Group LLC 571-606-4734 [email protected] The origins
New Data Center architecture
New Data Center architecture DigitPA Conference 2010, Rome, Italy Silvano Gai Consulting Professor Stanford University Fellow Cisco Systems 1 Cloud Computing The current buzzword ;-) Your computing is
Security Models: Past, Present and Future
Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 [email protected] www.profsandhu.com
Building Blocks of the Private Cloud
www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014
Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS
Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
Data Centers and Cloud Computing
Data Centers and Cloud Computing CS377 Guest Lecture Tian Guo 1 Data Centers and Cloud Computing Intro. to Data centers Virtualization Basics Intro. to Cloud Computing Case Study: Amazon EC2 2 Data Centers
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers
The Business Case Migration to Windows Server 2012 R2 with Lenovo Servers New levels of integration and capabilities provide the foundation for building more successful businesses with this new infrastructure
SECURE CLOUD COMPUTING
Outline SECURE CLOUD COMPUTING Introduction (of many buzz words) References What is Cloud Computing Cloud Computing Infrastructure Security Cloud Storage and Data Security Identity Management in the Cloud
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
My Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
DIY Device Cloud Documentation
DIY Device Cloud Documentation Release 1.0 Tony DiCola May 11, 2014 Contents 1 Overview 3 1.1 What is a device cloud?......................................... 3 1.2 Why do you want a device cloud?....................................
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Top 10 Cloud Risks That Will Keep You Awake at Night
Top 10 Cloud Risks That Will Keep You Awake at Night Shankar Babu Chebrolu Ph.D., Vinay Bansal, Pankaj Telang Photo Source flickr.com .. Amazon EC2 (Cloud) to host Eng. Lab testing. We want to use SalesForce.com
Geoff Raines Cloud Engineer
Geoff Raines Cloud Engineer Approved for Public Release; Distribution Unlimited. 13-2170 2013 The MITRE Corporation. All rights reserved. Why are P & I important for DoD cloud services? Improves the end-to-end
Terms and Conditions
- 1 - Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent
Secure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
IT Infrastructure and Emerging Technologies
IT Infrastructure and Emerging Technologies Content IT Infrastructure Infrastructure Components Contemporary Hardware Platform Trends Contemporary Software Platform Trends Management Issues 2 IT infrastructure
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Toolbox.com Live Chat
Toolbox.com Live Chat Live Chat: Infrastructure-Wide Virtualization and Service Management for the Data Center Transcript of original session on May 4 th, 2010 Sponsored by: About the Live Chat Infrastructure-wide
Mark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
CLOUD COMPUTING. Keywords: Cloud Computing, Data Centers, Utility Computing, Virtualization, IAAS, PAAS, SAAS.
CLOUD COMPUTING Mr. Dhananjay Kakade CSIT, CHINCHWAD, Mr Giridhar Gundre CSIT College Chinchwad Abstract: Cloud computing is a technology that uses the internet and central remote servers to maintain data
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Publishing Enterprise Mobile Services
Information Systems Strategy Publishing Enterprise Mobile Services Anand Patel, Enterprise Architect, 23 rd May About Network Rail We are a Private Company of 35,500 People Revenue of around 6 billion
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Cloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
Cloud Computing Characteristics Are Key
White Paper by Christopher Olive Chief Architect www.gpworldwide.com 2011 What is cloud computing? Cloud computing remains the buzzword winner of the current technology paradigm. The National Institute
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud
Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud What You Will Learn The adoption of cloud-based computing and applications promises to improve the agility, efficiency,
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Introduction What is the cloud
Overview/Description: Discussion on the benefits of hosting the campus card system in the cloud. Topic will cover a general overview of what the cloud is; how the cloud hosted solution can benefit the
TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
Realizing the Value Proposition of Cloud Computing
Realizing the Value Proposition of Cloud Computing CIO s Enterprise IT Strategy for Cloud Jitendra Pal Thethi Abstract Cloud Computing is a model for provisioning and consuming IT capabilities on a need
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Solving the Desktop Dilemma
Solving the Desktop Dilemma Enterprise Desktop Solutions Raymond Sleiman DL Groupe GMG [email protected] Mobile :079 200 81 03 Agenda What is VMware View 3 What s new with VMware View 3 Architecture RTO
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
InstaFile. Complete Document management System
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Lessons from the DHS Cyber Test Bed Project
Lessons from the DHS Cyber Test Bed Project Theresa Payton President/CEO Fortalice, LLC Presented by: Kemal O. Piskin Senior Cyber Security Engineer Applied Research Associates, Inc. What We ll Discuss
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Securing your Virtual Datacenter. Part 1: Preventing, Mitigating Privilege Escalation
Securing your Virtual Datacenter Part 1: Preventing, Mitigating Privilege Escalation Before We Start... Today's discussion is by no means an exhaustive discussion of the security implications of virtualization
McAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
