Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges
|
|
|
- Eunice Sanders
- 10 years ago
- Views:
Transcription
1 Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges Steve Pate CTO, High Cloud Security Tushar Tambay Architect, High Cloud Security
2 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2
3 Abstract Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges Moving to "The Cloud" is viewed as a path that most companies believe they will head down over the next several years. However, concern around security is the number one barrier to cloud adoption. Encryption and Key Management are important technologies that can help secure applications and data in the cloud. Companies considering moving to a cloud based infrastructure need to understand various aspects of encryption and key management - regulations guiding their use, the impact of key expiration and rotation on application performance and backup / restore / archiving, hardware versus software key management and retaining control of keys when applications and data are with a Cloud Service Provider. We will discuss industry best practices around encryption and key management, look at how various existing solutions fare on these considerations, and look at emerging solutions in this space. 3
4 Key Management Is Hard! Key management is the hardest part of cryptography and often the Achilles' heel of an otherwise secure system. Bruce Schneier Preface to Applied Cryptography Second Edition 4
5 Agenda Virtualization, Cloud and how they relate Some basics on Virtualization and Cloud security Talking about encryption and key management What are the standards groups doing in these areas? Will the standards help us in the Cloud? What do customers want in terms of encryption and key management? Are there models in place that allow customers and providers to work together? It looks a little scary - is there hope? Where can I get more information? 5
6 The Cloud Depends On Virtualization Basic Costs multi-tenancy Example websites hosted by Media Temple are VMs How many VMs can I run on a single server? 10 or so on older servers, 25 on newer servers Some deployments have 100s of VMs / host But really it s about flexibility Heavily virtualized companies have great flexibility in their virtualized environments but can t get that flexibility in the public Cloud VM mobility is key VM and data need to stay together Customers need control over VMs in public clouds Cloud bursting - just all talk? The dynamic deployment of a VM that runs on internal organizational compute resources to a public cloud to address a spike in demand. How do I move that much data in and out of the cloud dynamically? 6
7 Virtualization Has New Challenges Many different areas we re focusing on data security The idea of machine theft becomes a reality USB key... My memory image is now in a file (paging, snapshots, suspending,...). Protection in the guest has new issues Some problems existed in the physical world VMs are more easily exploited Encryption keys used in memory can be found in files on disk! Running AD as a VM? Lots of usernames/password on disk in the clear VMs needs to be wrapped when moving in and out of the cloud SSL/TLS not enough Have all defense in depth mechanisms work together. Security needs to follow VMs in the infrastructure. VMware CEO Maritz - VMworld
8 And So Does The Cloud Many areas of concern - the main issue is around data and protecting the data! I sign up for on-line services - taxes, Wiki,... On-line Wikis ACLs don t prevent admins from reading data New security startup - wants to use cloud services, concerned about putting source code in the cloud, wants easy to use tools, My data gets backed up but... where does it go? Disk-to-disk, to tape, this country, somewhere else,? Move from CSP to another: How can they delete the data? Can they find all of those tapes? For data backed up on tape, can one customer s data be shredded? 8
9 And So Does The Cloud cont Is Multi-Tenancy really a problem? VM guest to guest attacks A VM takes over the hypervisor - how real is this? We separate data either through logical or physical means Does this really help? Isn t it all still on disk side by side? It s all about people We can put best security tools and best practices in place but in a recent survey: 33 percent of IT professionals were most concerned about data being lost or stolen through USB devices. 39 percent of IT professionals worldwide were more concerned about the threat from their own employees than the threat from outside hackers. 27 percent of IT professionals admitted that they did not know the trends of data loss incidents over the past few years. 9
10 So where do we stand? Only 34% of Servers are virtualized... the #1 restriction sited to further virtualization was security CDW % of respondents rated Security Challenges as the #1 issue ascribed to the Cloud model. IDC Enterprise Panel percent said security was the primary obstacle to their adopting cloud computing, followed by compliance (54 percent) and portability and ownership of data (48 percent). Most said they were worried about stopping unauthorized access to their company data in the cloud, and 42 percent said security worries have stopped their organizations from going to the cloud. PhoneFactor survey "By 2015, security will shift from being the No. 1 inhibitor of cloud to one of the top enablers Forrester Research 10
11 How Can Encryption Help? Industry leaders and organizations recognize that encryption is a critical component of secure cloud environments The key to this is key management Encryption will not be widely deployed unless it is easy to use Think back to the Bruce Shneier quote Leading think tanks are putting together new guidelines But technology is lagging Industry wide initiatives needed to address: Standards Best practices The human factor How technology fits into the new world 11
12 But Isn t Encryption Slow? How much hardware to throw at the problem: Similar to the multi-tenant cloud analogy How much memory do I have? Am I CPU bound or I/O bound? Multiple hardware options available Instructions built into the CPU libraries available in public domain Numerous hardware cards available Many cards offer more than just encryption (key generation and storage, tamper proof capabilities) Will see some hardware options become commonplace over next several years 12
13 Industry Forums / Leaders? Standards are still in their infancy CSA Cloud Security Alliance A non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. ENISA European Network and Information Security Agency ENISA is the EU s response to security issues of the European Union. As such, it is the 'pace-setter' for Information Security in Europe. Jericho Forum part of the Open Group The leading international IT security thought-leadership association dedicated to advancing secure business in a global open-network environment. NIST, OASIS, SNIA, Open Group, OCC, DMTF, 13
14 Some Guidelines Available CSA Cloud Security Alliance: Top Threats to Cloud Computing V1.0 March 2010 (14 pages) Security Guidance for Critical Areas of Focus in Cloud Computing Prepared by the Cloud Security Alliance - April 2009 (83 pages) Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 December 2009 (76 pages) CSA Cloud Controls Matrix v1.1 December 2010 (Excel spreadsheet) ENISA Cloud Computing Benefits, risks and recommendations for information security - November 09 (125 pages) 14
15 What About The Data? Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 CSA - December
16 Encryption and Key Management Check out these SNIA Tutorials: Cryptography Deciphered Michael Willett, Spring 2011 An Inside Look at Imminent Key Management Standards - Matthew Ball, Spring 2010 An Introduction to Key Management for Secure Storage Walt Hubis Spring 2010 Visit the Cloud Storage Hands-On Lab: 16
17 Encryption and Key Management What do the standards recommend? NIST (National Institute of Standards and Technology) provides recommendations on algorithms and encryption modes Need to be aware of FIPS (Federal Information Processing Standards) certification, Common Criteria and similar standards in other countries Is this enough in a distributed cloud-based world? No not really different countries have different requirements In some countries encryption is heavily regulated Export compliance issues to be resolved Need an architecture that supports multiple encryption algorithms or has a pluggable architecture that allows for new algorithms Key management standards are not sufficient. 17
18 Encryption / Key Management Issues Key generation and key application - Two different areas often confused Key Management Application of keys at the endpoint Administrative roles No good if one person has access to everything Key Lifecycle Key states: Pre-activation, Active, Suspended, Revoked, Deactivated, Destroyed, Compromised, Destroyed Compromised Key state transitions Roles and responsibilities Key meta data, storage, transport, escrow, backup, recovery, revocation, suspension, renewal, compromise, A Framework for Designing Cryptographic Key Management Systems NIST special publication (84 pages) 18
19 Key Management Issues What do we care about? Key generation and key application Protection of the keys - Key encryption / Master key How to protect the master key High availability and disaster recovery scenarios Key expiration / rotation what happens to the data? Key shredding / switching to other states (read only) There is poor integration between key management systems, the application of encryption and the data lifecycle This is why many of today s key management techniques don t work Many encryption solutions tend to be home grown Key management should be hidden within a policy framework 19
20 Key Management Server Example n of m backup Master Key Wraps Key Store Key Master Key Wraps Key Store Key Key Store Key Key Server A Key Store Key Store Key Key Server B Key Store Encrypted Backup Encrypted Backup 20
21 Key Management Standards IEEE Disbanded in Dec 2010 OASIS KMIP Publicly announced in February 2009 KMIP V1.0 was approved in September (152 pages) Looks like companies are moving ahead to implement KMIP within their frameworks Other groups: ISO/IEC ISO NIST SP IETF Keyprov (RFC 6030, RFC 6031, RFC 6063) 21
22 Encryption At Rest An Example A key is generated The key is securely passed to the encryption agent A filesystem in this case. At this layer we have better visibility into applications, users etc and have greater access controls. Encryption is performed on the data Are we done? Not even close! Filesystem Agent Server Key Manager 22
23 Encryption At Rest Issues Does the key manager have context? What happens when the endpoint reboots? Association of meta-data that references the key What happens when data is backed up? Can we store meta-data with the data on backup? No so easy What happens when the data is restored? Can we still find the keys? How do we perform key rotation? Does the server need to be off-line? In Short: A great solution requires knowledge within the KM about how the keys will be used. The encryption endpoint requires integration with a number of different technologies to be effective. 23
24 Now We have Virtual Machines! 24
25 Encryption Everywhere? Due to VM mobility: Encryption needs to be applied in multiple places The encryption endpoint moves! In the data center Between data centers Between private and public clouds We re protecting more than just application data We re dealing with new security issues Where are all my VMs? I should not be concerned about this. Security policies need to travel with the VM The relationship between a key manager and the endpoint has gotten more complicated 25
26 Can We Encrypt Everything? VM sprawl increases the amount of data We need deduplication to help solve the data explosion issue 6.8 exabytes generated every 2 days 2 years ago - $1 on virtualization, $3 on storage Today - $1 on virtualization, $5 on storage Some people are saying that it s more like $7 But dedup and encryption don t always work well together Need to understand dedup needs and options Dedup first then encrypt? Interesting multi-tenancy issues Storage in the virtual world is not the same as the physical We need to think different about how we manage this imbalance Especially considering everything moves as a container 26
27 Stop Thinking In Terms Of Keys! Key Management should be hidden within a policy framework Rather than thinking: Give me a key Encrypt the data Wrap the key in a password Store the password somewhere. We need to think in terms of policy: I want to create some VMs and run them in my private cloud My auditor wants keys rotated every 6 months I now want them to move to the public cloud I only want them to run Mon-Fri At the end of the quarter I don t want them to run at all At that point I want them gone no trace left! 27
28 Key Management Cloud Options 28
29 Why Is It So Hard? The technology is so broad: Operating systems Storage Encryption and Key Management Virtualization and VM mobility Cloud Few companies have the ability to span all But encryption is the solution to protect data Key Management solutions need to be broader We have the technologies today We need to bring them all together 29
30 Holding The Keys To Your Kingdom How will the transition to public cloud work? Virtualize internally build out private cloud Be confident that this environment is secure Move to the public cloud as required Companies secure their virtualized data center Build out private cloud Solve key management needs for the private cloud Once security needs can be met, can public clouds just be an extension? Service Providers secure their data centers Service Provider secures their virtualized environment Either CSP manages keys or customer manages keys Different companies will have different requirements / needs 30
31 For More Information ENISA Cloud Security Alliance NIST Encryption / Key Management Links OASIS KMIP Virtualization Practice great podcast Trend Micro Cloud Blog SNIA Resources (search for encryption and key management ) 31
32 Q&A / Feedback Please send any questions or comments on this presentation to SNIA: [email protected] Steve Pate Tushar Tambay Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee 32
Trends in Application Recovery. Andreas Schwegmann, HP
Andreas Schwegmann, HP SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Interoperable Cloud Storage with the CDMI Standard
Interoperable Cloud Storage with the CDMI Standard Storage and Data Management in a post-filesystem World Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG and Initiative Author: Mark Carlson,
Encrypt Your Cloud. Davi Ottenheimer flyingpenguin. Session Classification: Advanced
Encrypt Your Cloud Davi Ottenheimer flyingpenguin Session ID: DAS-210 Session Classification: Advanced AGENDA Introduction Cryptography Keys in Clouds Examples Introduction 3 FLYINGPENGUIN flying \fly"ing\,
Restoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
Top 10 encryption myths
Top 10 encryption myths White Paper Table of Contents 3 Executive overview 3 Myth #1 Encryption will degrade my system performance 4 Myth #2 Encryption terminology is too hard to understand 4 Myth #3 Managing
High Performance Computing OpenStack Options. September 22, 2015
High Performance Computing OpenStack PRESENTATION TITLE GOES HERE Options September 22, 2015 Today s Presenters Glyn Bowden, SNIA Cloud Storage Initiative Board HP Helion Professional Services Alex McDonald,
Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel
Creating a Catalog for ILM Services Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted
UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON
UNDERSTANDING DATA DEDUPLICATION Thomas Rivera SEPATON SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
Storage Clouds. Karthik Ramarao. Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Karthik Ramarao Director of Strategy and Technology and CTO Asia Pacific, NetApp Board Director SNIA South Asia SNIA Legal
Deploying Public, Private, and Hybrid Storage Clouds. Marty Stogsdill, Oracle
Deploying Public, Private, and Hybrid Storage Clouds Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.
UNDERSTANDING DATA DEDUPLICATION Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard
UNDERSTANDING DATA DEDUPLICATION Tom Sas Hewlett-Packard SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature
Storage Cloud Environments. Alex McDonald NetApp
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Cloud Environments Alex McDonald NetApp Webcast Presenter Alex McDonald joined NetApp in 2005, after more than 30 years in a variety
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Cloud File Services: October 1, 2014
Cloud File Services: SMB/CIFS and TITLE NFS in the Cloud PRESENTATION GOES HERE October 1, 2014 Webcast Presenters David Fair, SNIA ESF Business Development Chair - Intel John Reed Product Manager, Windows
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions
ADVANCED DEDUPLICATION CONCEPTS Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and
Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter) SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
Visions for Ethernet Connected Drives. Vice President, Dell Oro Group [email protected] March 25, 2015
Visions for Ethernet Connected Drives PRESENTATION TITLE GOES HERE Chris DePuy, Vice President, Dell Oro Group [email protected] March 25, 2015 Webcast Presenters David Fair, SNIA ESF Chair Intel Vice
How To Create A Cloud Backup Service
Cloud Backup Recovery and Restore Requirements Ashar Baig, Asigra Chairman, SNIA Cloud Backup Recovery and Restore (BURR) Special Interest Group (SIG) SNIA Legal Notice The material contained in this tutorial
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Securing The Cloud. Russ Fellows, Managing Partner - Evaluator Group Inc.
Securing The Cloud Russ Fellows, Managing Partner - Evaluator Group Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may
Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use
Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption
Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,
Cloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
Understanding Enterprise NAS
Anjan Dave, Principal Storage Engineer LSI Corporation Author: Anjan Dave, Principal Storage Engineer, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Key Management Interoperability Protocol (KMIP)
www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, [email protected] Chair, Storage Security Industry Forum 1 2009 Insert Copyright
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Data Breaches and the Encryption Safe Harbor Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted.
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
IT Security Automation Conference 2009. Endpoint Data Protection (EDP) In The Cloud
IT Security Automation Conference 2009 Endpoint Data Protection (EDP) In The Cloud Gary Sumner Founder & CTO Datacastle Corporation [email protected] 1 Top 10 8 Lessons Learned #1 Means to an end,
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation
Introduction to Data Protection: Backup to Tape, Disk and Beyond Michael Fishman, EMC Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin
Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin Best Practices for Security in the Cloud John Essner, Director
Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Cloud Data Management Interface (CDMI) The Cloud Storage Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG
Cloud Data Management Interface (CDMI) The Cloud Storage Standard Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG SNIA Legal Notice The material contained in this tutorial is copyrighted
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Storage Considerations for Database Archiving. Julie Lockner, Vice President Solix Technologies, Inc.
Storage Considerations for Database Archiving Julie Lockner, Vice President Solix Technologies, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
How To Understand And Understand The Risks Of Configuration Drift
How to: Eliminate Configuration Drift Risk Gil Hecht, CEO Continuity Software SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
How To Migrate To A Network (Wan) From A Server To A Server (Wlan)
The Role of WAN Optimization in Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use
VDI Optimization Real World Learnings. Russ Fellows, Evaluator Group
Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material
A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY
Eric A. Hibbard, CISSP, CISA, ISSAP, ISSMP, ISSEP, SCSE Hitachi Data Systems A HYPE-FREE STROLL THROUGH CLOUD STORAGE SECURITY Subhash Sankuratripati NetApp SNIA Legal Notice The material contained in
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Server and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
SSD and Deduplication The End of Disk?
SSD and Deduplication The End of Disk? Jered Floyd, CTO, Permabit Technology Corp. Author: Jered Floyd, CTO, Permabit Technology Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted
Cloud-integrated Storage What & Why
Cloud-integrated Storage What & Why Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5
Enterprise Architecture and the Cloud. Marty Stogsdill, Oracle
Marty Stogsdill, Oracle SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Storage Clouds. Enterprise Architecture and the Cloud. Author and Presenter: Marty Stogsdill, Oracle
Deploying PRESENTATION Public, TITLE Private, GOES HERE and Hybrid Storage Clouds Enterprise Architecture and the Cloud Author and Presenter: Marty Stogsdill, Oracle SNIA Legal Notice The material contained
Protecting Virtual Servers with Acronis True Image
Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection
Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
SERVER VIRTUALIZATION AND STORAGE DISASTER RECOVERY. Ray Lucchesi, Silverton Consulting [email protected]
SERVER VIRTUALIZATION AND STORAGE DISASTER RECOVERY Ray Lucchesi, Silverton Consulting [email protected] SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.
Virtual Machine Protection with Symantec NetBackup 7
Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing to embrace the promise of virtualization for
WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed
WAN Optimization and Thin Client: Complementary or Competitive Application Delivery Methods? Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
EMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
