APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION

Similar documents
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Cloud and Data Center Security

Securing Your Journey to the Cloud. Thomas J. Miller Executive Vice President

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

How To Protect Your Cloud From Attack

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

OVERVIEW. Enterprise Security Solutions

Cloud Security Survey Global Executive Summary

Sicurezza Data Center 22 giugno Fabio Paravani Regional Account Manager

Proactively Secure Your Cloud Computing Platform

Agentless Security for VMware Virtual Data Centers and Cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Netzwerkvirtualisierung? Aber mit Sicherheit!

OVERVIEW. Enterprise Security Solutions

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI DSS 3.0 Compliance

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Trend Micro Deep Security

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Security Introduction and Overview

Total Cloud Protection

Delivering Managed Services Using Next Generation Branch Architectures

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Effective End-to-End Cloud Security

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

SOFTWARE DEFINED NETWORKING

overview Enterprise Security Solutions

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Architecting Security for the Private Cloud. Todd Thiemann

Trend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)

Covering my IaaS: Security and Extending the Datacenter. Brian Bourne Tadd Axon

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Private Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Automated Protection on UCS with Trend Micro Deep Security

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD POWERED BY VMWARE

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Windows Server 2003 End of Support. What does it mean? What are my options?

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

Business Values of Network and Security Virtualization

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Trend Micro. Advanced Security Built for the Cloud

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Agenda. Company Platform Customers Partners Competitive Analysis

Don t Forget Your Security Umbrella in the Cloud

Security in the Software Defined Data Center

Corporate Presentation

ICT priorities in Canada

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Virtualization Journey Stages

Bitdefender GravityZone Sales Presentation

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

Object Storage: A Growing Opportunity for Service Providers. White Paper. Prepared for: 2012 Neovise, LLC. All Rights Reserved.

Cloud Leader Report. A Comparison of Cloud Vendors in Germany. Executive Summary of the Cloud Vendor Benchmark 2013 for TREND MICRO Deutschland GmbH

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Building High Growth Services on the Microsoft Cloud Platform. Rich Cannon Senior Director, US Partner Hosting and Cloud Services

Microsoft Private Cloud

Cloud Data Security. Sol Cates

Enterprise Cloud Services from Dimension Data. KB Rajendran Head IDC & Cloud Services

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Conquering PCI DSS Compliance

Trend Micro Cloud Security for Citrix CloudPlatform

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Comprehensive security platform for physical, virtual, and cloud servers

From servervirtualization. to private cloud. Chandan Mehta

Cloud Security and Managing Use Risks

Cloud Models and Platforms

Managed Cloud Services

Cloud Security. Are you on the train or the tracks? ISSA CISO Executive Forum April 18, Brian Grayek CISSP, CCSK, ITILv3

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Best Practices For Public Cloud Security Part Three Of A Three-Part Series On Public Cloud Security

How To Monitor Hybrid It From A Hybrid Environment

Data center fo the future software defined DC

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction

ICSA Labs Risk and Privacy Cloud Computing Series Part I : Balancing Risks and Benefits of Public Cloud Services for SMBs

SESSION 703 Wednesday, November 4, 9:00am - 10:00am Track: Advancing ITSM

The Virtualization Practice

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

TRANSFORMING TO NEXT-GEN APP DELIVERY FOR COMPETITIVE DIFFERENTIATION

Cloud Computing Security. Belmont Chia Data Center Solutions Architect

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Keyword: Cloud computing, service model, deployment model, network layer security.

ICT Priorities in Pharmaceuticals

THE FORECAST FOR CLOUD IS SUNNY Sudeshna Bhadury

AVLOR SERVER CLOUD RECOVERY

Secure Cloud Computing

Management for the Mobile-Cloud Era

PCI DSS and the A10 Solution

The Network Alone Can t Protect Your Data

Transcription:

APAC OF POSSIBILITIES: TIPS FOR INCREASING CLOUD SECURITY AND ADOPTION Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance Session ID: CLD-W03 Session Classification: Intermediate

Clouds Everywhere Above 2

One Cloud.. 3

Trend Micro Overview Take advantage of the cloud Largest pure-play security provider Secures your journey to the cloud Deliver top ranked security solutions Market leader in Server, Virtualization, and Cloud security Source: IDC (2011), Technavio (2011 & 2012) 5

Global Alliances 6

Global Alliances 7

Global Alliances 8

Cloud Security in Asia Pacific

Source: 2013 BSA Global Cloud Computing Scorecard 10

Source: 2013 BSA Global Cloud Computing Scorecard 11

Source: Cloud Readiness Index 2012, Asia Cloud Computing Association 12

Cloud-related job growth in Asia Pacific Predicted national cloud-related job growth figures from 2012-2015: Japan 155% Australia: 129% Singapore: 109% Malaysia: 107% Indonesia: 103% India: 99% Source: IDC 13

National differences in cloud security Trend Micro s annual survey of 1400 IT decision makers from the U.S., UK, Germany, India, Canada, Japan and Brazil found significant regional differences in cloud security. India had the highest incidence (67 percent) of data security lapse or issue, a full 12% higher than the next highest country, Brazil (55 percent.) India also had the highest 12 percent -- increase of security lapse or issue from 2011 Japan had a 7 percent increase in security lapse or issue, about the same as Canada at 6 percent Japan is less likely to adopt cloud computing than all the other countries surveyed. Japan also has the lowest usage level for VDI, public cloud and private cloud. Source: Trend Micro 14

Tips for increasing cloud security and adoption

Cloud Marketing Fairytales: Who Owns Security Private Hybrid Public You Shared Shared 16

AWS Domain Customer Domain The AWS Shared Responsibility Model Partner Eco-System Operating Systems Application Security Groups OS Firewalls Anti-Virus Account Management Storage Encryption Enterprise Applications Enterprise Operating Systems Facilities Physical Security Physical Infrastructure Virtualized Infrastructure 17 17

PCI DSS Cloud Computing Guidelines CSP is responsible for the compliance of what they manage Customer is responsible for what s not addressed by CSP Customer is responsible for monitoring CSP s compliance 18

Security and availability are inseparable What s holding back cloud adoption? (Trend Micro survey) 54% - security of data or cloud infrastructure 50% - performance / availability of cloud 19

Where Does Cloud Security Come From? Domain Few years ago Now Technical Operations You Cloud Service Provider Security Tools Hardware & Software Software & Cloud Security Knowledge Threat Research Big Data & Research 20

Using The Cloud For Security Knowledge THREAT DATA Multiple data centers 1.15B Threat Samples Daily Identifies 90K malicious threats daily Living data Multiple threat vectors 200M Threats blocked daily Massive scale THREAT INTELLIGENCE CUSTOMERS 21

Industry Implications Cloud providers need non-cloud security data Security companies need really good clouds Cloud providers better choose security partners carefully Security providers better choose cloud partners carefully 22

Where Does Cloud Security Come From? Domain Few years ago Now Operations You Cloud Service Provider Tools Hardware & Software Software & Cloud Knowledge Threat Research Big Data & Research 23

Industry Implications Foundational cloud components are pluggable Security is not (mostly) Security industry software and VM model is not CSP ready CSPs want carrier-grade security tools, not server-grade 24

Why Software and VMs Won t Satisfy CSPs Cloud security tools need native multitenancy Software release cycle mismatch: software vs cloud Security performance hit costs CSPs real margin Time to rethink cloud security so it works better with CSPs Time to move security consoles to the cloud 25

Upgrade Your Cloud Security in 3 Easy Steps! Performance Multi-tenancy Management 26

Upgrading Cloud Security Performance Agentless for virtual, private, and public cloud environments Integrated single agent available when required SaaS based console and management for agility 27

Upgrading Cloud Security Multitenancy Multitenant architecture Delegation and self-service for cloud tenants Automated deployments of components for elastic scaling Common cloud API integration (AWS, vcloud, etc.) Shared security profiles across all deployments 28

Upgrading Cloud Security Management Shared security profiles across all deployments Common cloud API integration (AWS, vcloud, etc.) Single management pane-of-glass for private, VPC, public Hierarchical policy management Cloud-resident, SaaS-based security consoles 29

Future of Cloud Security: Shared Dependency Domain Now Future Operations Cloud Service Provider Cloud Service Provider Security tools Software & Cloud Cloud resident Cloud aware Cloud managed Cloud release cycles Knowledge Big Data & Research Realtime data Cloud & non-cloud Research 30

Securing Your Journey To The Cloud

Employees Partners Customers Finance HR Productivity CRM Supply Chain Commerce Customer Support Business App Owners Data Center Ops

Data Center Finance HR Productivity CRM Supply Chain Commerce Customer Support Data Center Ops

Data Center Physical Virtual Private Cloud Public Cloud Server and VM integrity Appropriate policy enforcement Data protection, especially in the cloud Performance and manageability Security Data Center Ops

Integrated Cloud Security Data Center Physical Virtual Private Cloud Public Cloud Anti-Malware Firewall IPS & Virtual Patching Integrity Monitoring Log Inspection Encryption Cloud and Data Center Security

Cloud Security Tips for Now Help cloud providers address the top barrier to cloud adoption security. Cloud providers in APAC need to clarify their offerings, policies, technology, service-level agreements and how they manage cloud security, privacy and security incidents. The Cloud Security Alliance offers free cloud security self-reporting frameworks for cloud providers to address enterprise concerns about security in the cloud. Partner with virtualization aware security vendors to create compelling secure cloud service offerings for enterprises e.g. agentless virtualisation security like Trend Micro s Deep Security. Creating safe clouds in APAC will help regional economies grow quickly, powered by the growth of the cloud.

20-21 August 2013, 8am 6pm Raffles City Convention Centre, Singapore Register: www.cloudsec.co/sg

Thank You Ken Low Director of Enterprise Security, Asia Pacific, Trend Micro Chairman, Asia Pacific Executive Council, Cloud Security Alliance http://sg.linkedin.com/in/kenlow