Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!
|
|
|
- Jasper Moody
- 10 years ago
- Views:
Transcription
1 Securing the Microsoft Cloud Infrastructure Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!
2
3 Certification & Security Reliance Microsoft s cloud environment Application Software as a Service (SaaS) Consumer and small business services Enterprise services Third-party hosted services Microsoft Cloud Customers IaaS PaaS Physical Cloud Infrastructure and Operations Datacenters Operations Global Network Security 3
4 Cloud security challenges 4
5 Specific concerns we hear from customers Why should I trust Microsoft? What industry audits and security certifications cover Microsoft s Cloud Infrastructure? If I run my service in your cloud, can I meet my compliance needs? How should an enterprise evaluate cloud providers when it comes to security, privacy and compliance? 5
6 Why should I trust the Microsoft cloud? Proven Track Record History of meeting obligations associated with the delivery of over 200 cloud services Scale Spreading cost of robust security and compliance across large number of customers provides a trusted cloud at lower cost Security at our Foundation Years of experience through our Trustworthy Computing Initiative 6
7 Trustworthy foundation Compliance built on Microsoft experience and innovation First Microsoft Datacenter Active Directory Trustworthy Computing Initiative Malware Protection Center SAS 70 SOC 1 UK G-Cloud Level 2 SOC 2 Operations Security Assurance Microsoft Security Response Center Windows Update PCI DSS (infrastructure) Security Development Lifecycle Digital Crimes Unit FISMA P-ATO HIPAA/ HITECH FedRAMP ATO Azure PCI DSS Level 1 ISO/IEC 27001:2005 E.U. Data Protection Directive 7
8 Why should I trust the Microsoft cloud? Proven Track Record History of meeting obligations associated with the delivery of over 200 cloud services Scale Spreading cost of robust security and compliance across large number of customers provides a trusted cloud at lower cost Security at our Foundation Years of experience through our Trustworthy Computing Initiative 8
9 7+ billion worldwide queries each month 50+ billion minutes of connections handled each month 250+ million active users 85% Fortune 500 users 2.4+ million s per day 30+ trillion objects stored 3.5+ million subscribers 48+ million users in 41 markets 50+ million active users 400+ million active users 18+ billion Active Directory authentications per week 200+ Cloud Services 90+ markets worldwide 9
10 Evolving services to hyper-scale Delivering hyper-scale services requires a radical restructuring of technology, processes, and people Enterprise IT Hyper-Scale Enterprise IT Hyper-Scale Seats Talent Data Quality Data Access Assessment Supply Chain Budget Architecture Application integration Infrastructure Reach 10,000 Custodians Directional Pull Physical Process Fixed Cost Siloed Loose Overhead Regional 1,000,000,000 Designers Foundational Push Statistical Strategic Rates Integrated Tight Enabler Global Hardware Deployment Availability Operability Reliability Security Network downtime Network availability Design Deployment time System admin Custom Manual Infrastructure MTBF Hardware Audit Impacting % Primary/Backup Weeks UI Commodity Automated Service MTTR Software Intrinsic Irrelevant 99.9% Active/Active Minutes API 10
11 Microsoft s datacenter evolution Generation 1 Generation 2 Generation 3 Generation 4 Generation PUE PUE PUE PUE PUE Colocation Density Containment Modular SW-Defined Server Capacity 20 year Technology Rack Density & Deployment Minimized Resource Impact Containers, PODs Scalability & Sustainability Air & Water Economization Differentiated SLAs ITPACs & Colocations Reduced Carbon Right-Sized Faster Time-to-Market Outside Air Cooled Fully Integrated Resilient Software Common Infrastructure Operational Simplicity Flexible & Scalable 11
12 Where is my data? Where is data stored? Azure customers may specify the region where data is stored Y(Europe, US, Asia) Who accesses and what is accessed? How to get notified and what do we share? Core customer data accessed only for troubleshooting and malware prevention We notify you of changes in data map information We notify you about new subcontractors We make available a summary of our audit reports upon request 12
13 Microsoft s global datacenter footprint Microsoft Internet connectivity global Azure datacenter by country regions footprint Microsoft s network is one of the two largest in the world Internet users 500,000, ,000, ,999,999 50,000,000 99,999,999 25,000,000 49,999,999 5,000,000 24,999, ,000 4,999,999 50, , ,999 *Operated by 21Vianet 1 million+ servers 100+ Datacenters in over 40 countries
14 Driving operational excellence Investments $15B+ investment in cloud Infrastructure State-of-the-art datacenters One of largest networks globally Geo-replicated customer data Office 365 Windows Azure People 2,000+ people in cloud infrastructure engineering and operations 30,000+ software engineers involved in Cloud-based activities Carbon Footprint Reduction Power Usage Effectiveness (PUE)
15 Microsoft Operations Center (MOC) Organization overview 24x7 incident management teams Examples: Redmond, California, India Globally redundant Follow the Sun staffing model Key MOC programs Crisis management Automation and event management Infrastructure operations Service health monitoring Positioned to bridge interactions and workflows between our operation centers, service owners, and business groups 15
16 Growing Microsoft s networks to hyper-scale Geo-Redundant Service/Application Design All nodes active Network Device Count Growth FY09 FY10 FY11 FY12 FY13 FY14 FY15 Top 2 Most Connected Networks in the World DC-to-Internet Backbone DC-to-DC Backbone Dark Fiber Cache Node Edge Nodes Peer with over 3000 ISPs globally Multiple terabits Over 70 points of presence globally Global backbone connecting MS Datacenter to the Internet Multiple Terabits of Capacity Dark fiber based DC-DC backbone to enable high bandwidth between Datacenters 1.4 million+ route kilometers of 10G and 100G DWDM capacity deployed Backbone consists of over 100,000 route miles of fiber Hosting Services collocated at User location (metro) Multiple Terabits of Edge Interconnect capacity Interconnect over 1600 unique networks around the globe Decoupled DCs Separation of CPU s Storage, SQL Services IT Capacity Unit DC Capacity Unit or Workload Appliance 16
17 Why should I trust the Microsoft cloud? Proven Track Record History of meeting obligations associated with the delivery of over 200 cloud services Scale Spreading cost of robust security and compliance across large number of customers provides a trusted cloud at lower cost Security at our Foundation Years of experience through our Trustworthy Computing Initiative 17
18 Security at our foundation Product team coordination Teams work with all Microsoft Cloud Services to review their security posture Threat models review Teams analyze the product teams threat models to verify that they are complete and current Security bugs review All security bugs are reviewed and addressed using standard bug bars Tools use validation Teams ensure that product teams have correctly and appropriately made use of the tools, documented code, and available patterns and practices Training Requirements Design Implementation Verification Release Response 18
19 Taking the fight directly to cybercriminals We aggressively fight cybercrime and advocate extensively for enhancing cybersecurity / Big data Investigations Legal action Malware disruption IP protection Protection of vulnerable populations Making an impact Disrupting malware and taking down botnets, in partnership with government and commercial organizations, to clean and protect tens of millions of devices Improving products by embedding collected data and intelligence into our platform and services Disrupting and dismantling cybercriminal operations that promote a range of illegal goods and services Developed PhotoDNA to protect children from online exploitation 19
20 Information Security Management System Information Security Management System Predictable audit schedule Information security management forum Risk management program Information security policy program Compliance framework Test and Audit ISO / IEC 27001:2013 certification SSAE 16/ISAE 3402 SOC 1 AT101 SOC 2 and 3 PCI DSS certification FedRAMP P-ATO, FISMA certification and accreditation And more 20
21 Defense-in-depth: infrastructure security Physical Network Host Security Application Data Identity and access management Configuration and vulnerability scanning 24x7x365 Incident response 21
22 Data encryption points Protects user from interception of their communication and helps ensure transaction integrity Protects from bulk interception of data Protects from removal of physical media Protects from interception or loss of data in transit between users 22
23 Microsoft Azure incident response DevOps Engaged Event Detected Security Team Engaged Event Start Incident Assessment Security Event Confirmed Customer Notification Customer Process Step 1 Determine Affected Customers Determine Customer Impact Azure Customer Notification In-depth 9-step incident response process Focus on containment and recovery Makes contractual commitments regarding customer notification 23
24 Microsoft Cloud Compliance Certifications and Attestations as of 01/15/15
25
26 Microsoft cloud resources Microsoft Datacenters Website microsoft.com/datacenters Microsoft Cloud Infrastructure & Operations Blog blogs.technet.com/msdatacenters Microsoft Azure Trust Center azure.microsoft.com/support/trust-center Office 365 Trust Center trustoffice365.com Dynamics CRM Trust Center microsoft.com/dynamics/crm-trust-center Microsoft Intune Trust Center microsoft.com/intune-trust-center 26
27 2015 Microsoft Corporation. All rights reserved. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 27
Cloud-Scale Datacenters. Tarmo Tikerpäe DC SSP Microsoft Corporation
Cloud-Scale Datacenters Tarmo Tikerpäe DC SSP Microsoft Corporation 1 5.8+ billion worldwide queries each month 250+ million active users 400+ million Active accounts 2.4+ million emails per day 8.6+ trillion
Cloud Infrastructure Operational Excellence & Reliability
Cloud Infrastructure Operational Excellence & Reliability Page 1 Operational Excellence & Reliability Microsoft has invested over $15 billion in building one of the world s largest global cloud infrastructures.
Optimizing IT costs with Cloud. Tarmo Tikerpäe Datacenter SSP Microsoft Corporation
Optimizing IT costs with Cloud Tarmo Tikerpäe Datacenter SSP Microsoft Corporation BENEFITS Speed Scale Economics Cloud Trend: 70% 2 weeks to deliver new services vs. 6-12 months with traditional solution
Five steps to Cloud Adoption. Laurent De Grauwe Sales Manager Datacenter
Five steps to Cloud Adoption Laurent De Grauwe Sales Manager Datacenter 1 How Microsoft defines cloud Microsoft You One consistent experience Service provider Why Microsoft and the cloud? Cloud services
Cloud Operations Excellence & Reliability
Cloud Operations Excellence & Reliability Cloud Operations Excellence & Reliability Page 1 Cloud Operations Excellence & Reliability Microsoft has invested over $15 billion in building a highly scalable,
Microsoft s Datacenter Best Practices. Darryl Chantry Datacenter Solutions Architect Worldwide Datacenter Center of Excellence
Microsoft s Datacenter Best Practices Darryl Chantry Datacenter Solutions Architect Worldwide Datacenter Center of Excellence We Are Unique in Our Comprehensive Approach Interactive entertainment Search/
Hans Bos Microsoft Nederland. [email protected]
Hans Bos Microsoft Nederland Email: Twitter: [email protected] @hansbos Microsoft s Cloud Environment Consumer and Small Business Services Software as a Service (SaaS) Enterprise Services Third-party
Securing the Microsoft Cloud
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
How To Get A Cloud Security System To Work For You
Trust in the Cloud Ovidiu Pismac MCSE Security, CISSP, MCSE Private Cloud / Server & Desktop infrastructure, MCTS Forefront Microsoft Romania [email protected] Technology trends: driving cloud adoption
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Securing the Microsoft Cloud
Securing the Microsoft Cloud Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and consumers to fully embrace and benefit from
Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?
Privacy Transparency What does privacy at Microsoft mean? Are you using my data to build advertising products? Where is my data? Who has access to my data? Compliance What certifications and capabilities
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Securing the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Microsoft Azure. Microsoft Azure Security, Privacy, & Compliance
Security, Privacy, & Compliance Technology trends: driving cloud adoption BENEFITS Speed Scale Economics Cloud Trend: 70% 2 weeks to deliver new services vs. 6-12 months with traditional solution Scale
Microsoft s Cloud Networks
Microsoft s Cloud Networks Page 1 Microsoft s Cloud Networks Microsoft s customers depend on fast and reliable connectivity to our cloud services. To ensure superior connectivity, Microsoft combines globally
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs.
Appendix D-1 to Aproove Saas Contract : Security and solution hosting provider specs. The hosting company retained by Aproove is Microsoft Corporation, One Microsoft Way, Redmond, Washington 98052 USA.
Protecting Data and Privacy in the Cloud
Protecting Data and Privacy in the Cloud Contents 1 3 6 9 12 13 Protecting Data and Privacy in the Cloud an Introduction Building Services to Protect Data Protecting Data in Service Operations Empowering
Transform your Datacenter
Transform your Datacenter Enterprise Media Solutions in the Cloud Guadalupe Casuso, Microsoft Marian Figueiras, Microsoft Olga Karpman, Microsoft Jose Luis Kryuff, Deltatre Alexis Castañares, Microsoft
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs
Cloud Computing In a Post Snowden World Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs Guy Wiggins Director of Practice Management Kelley Drye & Warren
Transform the datacenter. Henk Den Baes Technology Advisor Datacenter
Transform the datacenter Henk Den Baes Technology Advisor Datacenter Things + devices Applications Data Infrastructure $1.9T Gartner estimates the total economic value-add from the Internet of Things across
How Microsoft Designs its Cloud-Scale Servers
How Microsoft Designs its Cloud-Scale Servers How Microsoft Designs its Cloud-Scale Servers Page 1 How Microsoft Designs its Cloud-Scale Servers How is cloud infrastructure server hardware design different
Microsoft Azure. Rich Lilly Project Leadership Associates
Microsoft Azure Rich Lilly Project Leadership Associates http://www.linkedin.com/in/rich04 [email protected] [email protected] 8.5 trillion stored objects 900K request/sec on average (2.3+
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Windows Azure Platform
Windows Azure Platform Giordano Tamburrelli, PhD [email protected] Academic Developer Evangelist Slides by David Chou You manage You manage You manage Types of Clouds Private (On-Premise) Infrastructure
Solutions as a Service N.Konstantinidis Technical Director - MNG
Med Nautilus Greece Connected World April 10, 2014 Solutions as a Service N.Konstantinidis Technical Director - MNG MedNautilus Greece Solutions as a Service 2014 SINCE 2002 Data Center Physical Colocation
Microsoft s Open CloudServer
Microsoft s Open CloudServer Page 1 Microsoft s Open CloudServer How is our cloud infrastructure server design different from traditional IT servers? It begins with scale. From the number of customers
SysAid Cloud Architecture Including Security and Disaster Recovery Plan
SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan
vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved.
vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved. Cloud Computing! Exciting! But wait 2009 2014 98% 94% 2% 6% VMs in Public Cloud VMs On-Premises
Datacenter Efficiency
EXECUTIVE STRATEGY BRIEF Operating highly-efficient datacenters is imperative as more consumers and companies move to a cloud computing environment. With high energy costs and pressure to reduce carbon
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Information Security Management System for Microsoft s Cloud Infrastructure
Information Security Management System for Microsoft s Cloud Infrastructure Online Services Security and Compliance Executive summary Contents Executive summary 1 Information Security Management System
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak
Cloud Standardization, Compliance and Certification Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak Todays Agenda IT Resourcing with Cloud Computing and related challenges Landscape
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
I believe. Satya Nadella CEO, Microsoft. History of making big bets
I believe over the next decade computing will become even more ubiquitous and intelligence will become ambient. The coevolution of software and new hardware form factors will intermediate and digitize
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
Planning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Microsoft Azure. The cloud platform built for business. Tarmo Tikerpäe DC SSP Microsoft
Microsoft Azure The cloud platform built for business Tarmo Tikerpäe DC SSP Microsoft The next strategic opportunity is here Cloud Mobile Social How do you use technology innovation Big data? to architect
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range
Cloud-based web hosting consolidation with an IBM Drupal solution
Cloud-based web hosting consolidation with an IBM Drupal solution Cut costs and strengthen enterprise web capabilities with a new cloud-enabled platform as a service (PaaS) Highlights Delivers proven enterprise
Cloud Services. More agility. More freedom. More choice.
Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014
Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information
50x 2020 40 Zettabytes*
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
10 Considerations for a Cloud Procurement. Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015
10 Considerations for a Cloud Procurement Anthony Kelly Erick Trombley David DeBrandt Carina Veksler January 2015 www.lbmctech.com [email protected] Purpose: Cloud computing provides public sector organizations
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING
CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Microsoft Private Cloud
Microsoft Private Cloud Lorenz Wolf, Solution Specialist Datacenter, Microsoft SoftwareOne @ Au Premier Zürich - 22.03.2011 What is PRIVATE CLOUD Private Public Public Cloud Private Cloud shared resources.
Frequently Asked Questions
Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
Compliance and the Cloud. Guiding principles and architecture for addressing Life Science compliance in the cloud
Compliance and the Cloud Guiding principles and architecture for addressing Life Science compliance in the cloud Life Sciences Industry Unit Microsoft Corporation June 2012 ii Legal Disclaimers The information
PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability
PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers Delivering consistent quality of service, scalability and service level assurance When it comes to cloud-based online
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Microsoft Azure. White Paper Security, Privacy, and Compliance in
White Paper Security, Privacy, and Compliance in Security, Privacy, and Compliance in Executive Summary The adoption of cloud services worldwide continues to accelerate, yet many organizations are wary
Microsoft Private Cloud Fast Track
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
Whitepaper. The ABC of Private Clouds. A viable option or another cloud gimmick?
Whitepaper The ABC of Private Clouds A viable option or another cloud gimmick? Although many organizations have adopted the cloud and are reaping the benefits of a cloud computing platform, there are still
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Cloud Services Overview
Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
Microsoft s. Cloud Server Specification Design. Kushagra Vaid General Manager, Cloud Infrastructure Server Engineering Microsoft
Microsoft s Cloud Server Specification Design Kushagra Vaid General Manager, Cloud Infrastructure Server Engineering Microsoft 5.8+ billion worldwide queries each month 250+ million active users 400+ million
Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32
Security, Compliance & Risk Management for Cloud Relationships Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32 Introductions & Poll Organization is leveraging the Cloud? Organization
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
Improving the Microsoft enterprise. network for public cloud connectivity
Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness
Orchestrating the New Paradigm Cloud Assurance
Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems
Securing Government Clouds Preparing for the Rainy Days
Securing Government Clouds Preparing for the Rainy Days Majed Saadi Director, Cloud Computing Practice Agenda 1. The Cloud: Opportunities and Challenges 2. Cloud s Potential for Providing Government Services
Deploying ArcGIS for Server Using Esri Managed Services
Federal GIS Conference 2014 February 10 11, 2014 Washington DC Deploying ArcGIS for Server Using Esri Managed Services Andrew Sakowicz Erin Ross Cloud Overview Deploying ArcGIS for Server What is Cloud:
All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME
THE NEED FOR HIGH AVAILABILITY AND UPTIME 1 THE NEED FOR HIGH AVAILABILITY AND UPTIME All Clouds Are Not Created Equal INTRODUCTION Companies increasingly are looking to the cloud to help deliver IT services.
Trend Micro Cloud Security for Citrix CloudPlatform
Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing
Demystifying the Cloud Computing 02.22.2012
Demystifying the Cloud Computing 02.22.2012 Speaker Introduction Victor Lang Enterprise Technology Consulting Services Victor Lang joined Smartbridge in early 2003 as the company s third employee and currently
