What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.



Similar documents
Commercial Software Licensing

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

Clinical Trials in the Cloud: A New Paradigm?

Cloud Computing; What is it, How long has it been here, and Where is it going?

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

CLOUD COMPUTING. A Primer

IBM EXAM QUESTIONS & ANSWERS

Cloud Computing and Records Management

Session 2. The economics of Cloud Computing

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Why You Should Consider Cloud- Based Archiving. A whitepaper by The Radicati Group, Inc.

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

Security at Your Fingertips.

Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com

Bring Your Own Device (BYOD) and Mobile Device Management.

Communications in the Cloud: Why It Makes Sense for Today s Business

Module 1: Facilitated e-learning

WHITE PAPER. 5 Ways Your Organization is Missing Out on Massive Opportunities By Not Using Cloud Software

Privacy + Security + Integrity

Cloud Vendor Evaluation

How On-Premise ERP Deployment Compares to a Cloud (SaaS) Deployment of Microsoft Dynamics NAV

Cloud Services Overview

Bring Your Own Device (BYOD) and Mobile Device Management

Cloud Computing for SCADA

Processing invoices in the cloud or on premises pros and cons

( and how to fix them )

Security Issues in Cloud Computing

Inside the Business VoIP Revolution. The Rise of Cloud-based Phone Systems Over Traditional Service

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

What Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen

The benefits of Cloud Computing

FTP-Stream Data Sheet

How We Deployed BYOD Using Mobile Device Management

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

The cloud - ULTIMATE GAME CHANGER ===========================================

AskAvanade: Answering the Burning Questions around Cloud Computing

How to Turn the Promise of the Cloud into an Operational Reality

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

On-premises vs. cloud

The Key Components of a Cloud-Based Unified Communications Offering

Data Protection Act Guidance on the use of cloud computing

PRACTICAL USE CASES BPA-AS-A-SERVICE: The value of BPA

Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools

HARNESSING THE POWER OF THE CLOUD

The Cloud Revolution - A Case Study

12 Security Camera System Best Practices - Cyber Safe

Blue Jeans Network Security Features

Technology & Business Overview of Cloud Computing

Third Party Cloud Services Its Adoption in the New Age

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Deploying VSaaS and Hosted Solutions Using CompleteView

CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS

Security Considerations for Public Mobile Cloud Computing

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cloud computing. Advantages and disadvantages

WHY YOU SHOULD CONSIDER CLOUD BASED ARCHIVING.

MOVING TO THE CLOUD: Understanding the Total Cost of Ownership

The Key Components of a Cloud-Based UC Offering

A Survey on Cloud Computing

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Communications in the Cloud Why It Makes Sense for Today s Business

Cloud Security Introduction and Overview

Encryption as a Cloud Service provides the lowest TCO

THE BLUENOSE SECURITY FRAMEWORK

Electronic Records Storage Options and Overview

How To Evaluate Saas And Cloud Solutions

White Paper: Introduction to Cloud Computing

Server Virtualization Cloud Partner Training Series

NAREIM Session: Dangers and challenges of The Cloud. President, NiceNets Consulting, LLC

Managed Services. Business Intelligence Solutions

Cloud Computing Safe Harbor or Wild West?

Qbt Consulting File Server & Server Based Software, Options for Deployment

FAQ Answers to frequently asked questions relating to the security, protection and redundancy of images stored in the Eclipse Data Center

Time to Value: Successful Cloud Software Implementation

Cloud Computing and Security

Cloud Computing - Architecture, Applications and Advantages

Five Drivers of the Cloud in Asset Management

International Research Journal of Engineering and Technology (IRJET) e-issn: Volume: 02 Issue: 05 Aug p-issn:

EXIN Cloud Computing Foundation

Transcription:

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

What is Cloud-Based Security? Cloud computing is: IT services via the internet from an external service provider the most important recent trend in IT technology

What is Cloud-Based Security? With Cloud Computing, you can eliminate investments in: Servers and other network equipment, Software installed on in-house computers In-house IT staff Business Software Version 3.2

What is Cloud-Based Security? In the same way, Cloud-Based Security Solutions: Provide security users with security management services using an internet connection Do not require users to invest in onsite equipment such as dedicated servers network video recorders or other infrastructure. Security Management Software Version 4.0

Cloud computing: an analogy Cloud computing acts a central utility for IT services, Tenant providing software, storage, data management and infrastructure services to multiple users, or tenants Tenant Central Service Provider Tenant Tenant Tenant

Cloud computing: an analogy So cloud computing is similar to receiving electricity from a central provider via the grid

Cloud computing versus SaaS

In other words:

Access Control as a Service (ACaaS) Overview: All access management activity, data and applications are managed on external storage and server facilities. With ACaaS, security end users can access all system activity via a browser from any location without requiring any software installation on their own devices or onsite servers

Video Surveillance as a Service (VSaaS) Typical set up 1: An external service provider stores all system data at their own facilities. Using this method, video data can be streamed to the end users from the external provider s site.

Video Surveillance as a Service (VSaaS) Typical set up 2: Digital video recorders are linked via an internet connection and all video is data available to end users anywhere via a web browser. This method allows end users to manage data conveniently without having to entrust management sensitive video footage to an external provider.

Benefit 1 Initial setup costs are much lower than traditional systems End users do not need to make large equipment purchases for cloud-based solutions, as the infrastructure that they require already exists at the service provider s site. This makes cloud-based security a cost effective solution for many smaller organizations.

Benefit 2 Payment model reduces total cost of ownership (in theory) Because initial costs are reduced significantly and because cloud computing resources are shared by multiple users who pay only for what they use through a flat subscription fee, Security as a Service theoretically brings down the cost of ownership considerably for end users. (Though this depends on the actual price of the subscription).

Benefit 3 Cloud-based solutions can be deployed (and decommissioned) much more quickly Cloud-based security solutions are much lighter than traditional server-based security systems as they do not require software installations or complex server setups. Site 2 Site 1 Site 3 This makes them easier and quicker to install. It also means cloud-based solutions can be scaled back equally easily. Site 4

Benefit 4 Data security is increased in several ways Security data stored on the cloud is backed up on multiple, geographically-dispersed sites making them less vulnerable to equipment failure, natural disasters or security breaches on the premises. Data is also protected by strict encryption protocols.

Current Concerns Very difficult to delete data on the cloud, including sensitive private company data Upgrades are controlled by service provider - users have less control about how services are upgraded to suit requirements Security of users data highly dependent on the viability of the cloud security service provider

Due diligence checklist Questions to ask prospective cloud security vendors: How does the vendor guarantee data security and data privacy? What data encryption standards are in place? Where are servers located? If servers are in a different geographical region, is the vendor in compliance with all relevant regulations for security and legal compliance data? Who is accountable for any security breaches? What are the service agreement arrangements for security failure scenarios? Who is responsible for managing security incident responses? How is data stored?

Due diligence checklist Questions to ask prospective cloud security vendors: Is the data for multiple users stored separately or pooled together? Does the vendor use the facilities of another external party? How do they ensure that this vendor is reliable? What opportunities for system integration are available? What kind of service level agreement does the vendor offer? What options for solution customization are there? Does the vendor have demonstrated performance with similar organizations?