SlideShare uma empresa Scribd logo
1 de 22
February 2011




Ondrej Valent
Regional Channel Sales Manger
Ondrej.Valent@safenet-inc.com




                                1
2
3
4
Cloud Security Solutions
   February 2011




 Customer Use Case Scenarios




© SafeNet Confidential and Proprietary
Cloud Security Challenges

 User ID and Access: Secure Authentication, Authorization, Logging      Fundamental Trust & Liability Issues
 Data Co-Mingling: Multi-tenant data mixing, leakage, ownership               Data exposure in multi-tenant
 Application Vulnerabilities: Exposed vulnerabilities and response
                                                                              environments

 Insecure Application APIs: Application injection and tampering               Separation of duties from cloud
                                                                              provider insiders
 Data Leakage: Isolating data
                                                                              Transfer of liability by cloud
 Platform Vulnerabilities: Exposed vulnerabilities and response
                                                                              providers to data owners
 Insecure Platform APIs: Instance manipulation and tampering
                                                                        Fundamental New Cloud Risks
 Data Location/ Residency: Geographic regulatory requirements
                                                                              New hypervisor technologies
 Hypervisor Vulnerabilities: Virtualization vulnerabilities
                                                                              and architectures
 Data Retention: Secure deletion of data
                                                                              Redefine trust and attestation
 Application & Service Hijacking: Malicious application usage                 in cloud environments
 Privileged Users: Super-user abuse
                                                                        Regulatory Uncertainty in the Cloud
 Service Outage: Availability
                                                                              Regulations likely to require
 Malicious Insider: Reconnaissance, manipulation, tampering                   strong controls in the cloud
 Logging & Forensics: Incident response, liability limitation
 Perimeter/ Network Security: Secure isolation and access
 Physical Security: Direct tampering and theft
© SafeNet Confidential and Proprietary



                                                                                                                6
Emergence of Encryption as
  Unifying Cloud Security Control

                                            Encryption is a fundamental technology for
                                             realizing cloud security
                                                  Isolate data in multi-tenant environments
                                                  Recognized universally by analysts and
                                                  experts and underlying control for cloud
                                                  data
                                                  Sets a high-water mark for demonstrating
                                                  regulatory compliance adherence for data
                                            Moves from Data Center tactic to Cloud
                                             strategic solution
                                                  Physical controls, underlying trust in
                                                  processes, and isolation mitigated some
                                                  use of encryption
                                                  Mitigating trust factors that don’t exist in
                                                  the cloud.




© SafeNet Confidential and Proprietary



                                                                                                 7
SafeNet Trusted Cloud Fabric
      Maintaining Trust and Control in Virtualized Environments



    Delivering on cloud security needs:
                                                                                Secure Virtual Storage   Secure Cloud Applications

              Control and visibility of users, data,
              applications, and systems when
                                                                                                                               Secure Cloud-Based
              moving into virtualized environments           Secure Virtual Machines                                        Identities and Transactions


              Proven security and compliance
              strategies designed and trusted for
              the enterprise into cloud deployments
                                                                                                                                     Secure Cloud-Based
                                                       Secure Access to SaaS                                                          Communications
              Modular, flexible integration points
              to deploy in any combination of
              private, hybrid, or public cloud
              models —implement what you want,                                                     On-premise

              where you need it, when you need it




           By extending trust and control SafeNet enables customers to seamlessly integrate any
           cloud model into their near-term and long-term technology and security strategies

    © SafeNet Confidential and Proprietary



                                                                                                                                                          8
Solving Today’s Core Cloud Security Barriers
  with SafeNet Trusted Cloud Fabric
       Business Goals (World Leading Bank)                  SafeNet Cloud Solution


          1           Controlling Access to SaaS
                      Applications; Federating Identities
                                                                       Secure Access to SaaS: SafeNet
                                                                       Multi-Factor Authentication

                      Achieving Compliant Isolation and                Secure Virtual Machines:
          2           Separation of Duties in Multi-
                      Tenant Environments
                                                                       SafeNet ProtectV™Instance




          3           Maintaining Trust & Control in
                      Virtual Storage Volumes
                                                                       Secure Virtual Storage:
                                                                       SafeNet ProtectV™Volume

                      Secure Cloud Applications Without                Secure Cloud Applications:
          4           Impacting Performance; Maintain
                      Ownership of Keys
                                                                       SafeNet DataSecure® and
                                                                       ProtectApp



          5           Secure Digital Signing and
                      PKI in the Cloud
                                                                       Secure Cloud-Based Identities
                                                                       and Transactions: SafeNet HSM




          6           Connect Securely to
                      Private Clouds
                                                                       Secure Cloud-Based
                                                                       Communications: SafeNet HSE

© SafeNet Confidential and Proprietary



                                                                                                        9
PROBLEM



    Controlling Access to SaaS and Cloud Applications
    Keeping data secure when you don’t own the system


    Enforcing Authentication Strategy in the Cloud                                     KEY POINTS
           Multi-Factor authentication required for any apps                            •   Single Sign On Access
              Cloud or Physical                                                         •   Federated Identities

           Likely even more critical for cloud-based applications                       •   Seamless Integration
                                                                                        •   Rapid Provisioning
              Lower level of trust, invocation of additional regulatory requirements
    Authentication Sprawl
           Separate authentication systems for each cloud provider
              Operationally un-scalable
              Typical user password/authentication fatigue and weak passwords
   Preserving Flexibility
           Likely to use multiple cloud providers simultaneously
           Desire rapid re-provisioning to try new services
           Preserve options in chaotic cloud market
              The cloud market will consolidate- not if, but when
    © SafeNet Confidential and Proprietary



                                                                                                                    10
SOLUTION



Secure Access to SaaS: SafeNet Multi-Factor Authentication
Protect access to cloud-based applications via centrally managed authentication



                                                                   SaaS Apps                          Cloud Applications

                                                                                     Salesforce.com


                                             Federated SSO
                                             to the cloud


                                                                                                             Goggle Apps


   Security Features
        Single authentication solution for both
        on-premise and cloud based applications         User authenticates
                                                        using enterprise
        Federate identities between on-premise          identity
        solution to cloud based solutions using
        SAML 2.0 protocol
        Solution is form-factor agnostic: support
        for HW OTP tokens, SW solutions and                                  SafeNet Authentication
        Out of Band                                                          Manager (SAM)
        Google Apps and salesForce.com are
        supported out-of-the-box
© SafeNet Confidential and Proprietary



                                                                                                                           11
PROBLEM



    Securing Uncontrolled Virtual Instances
    Achieving compliant isolation and separation of duties in multi-tenant environments



    Unlimited Copying of Instances                                               KEY POINTS
          Instances could be copied without awareness                            •   Data Isolation
                                                                                 •   Separation of Duties
               No visibility to instance location, no audit trail                •   Cloud Compliance
                                                                                 •   Pre-Launch Authentication
          Instances used by competitors and malicious users
                                                                                 •   Multi-Tenant Protection
          Enables unlimited brute force attacking
               Return to original copy for next iteration of password guessing

   Unsecured Container of Confidential Data
          Identical to lost or stolen laptop, except the instance
          is often a server
          Virtual nature of makes the potential surface area
          much larger
               Not just a single entity lost, potentially unlimited number


    © SafeNet Confidential and Proprietary



                                                                                                                 12
SOLUTION



Secure Virtual Machines: SafeNet ProtectV Instance                                      TM



Control virtual machines in the cloud with secure instance encryption and authentication


                                         Virtual Machines


                                                                                               TM
                 On-premise                                                             ProtectV    Instance




                                                                                                     Hypervisor

                                                                                                   Virtual Server




                                                                 Security Features
SafeNet DataSecure (Supplemental Security Option):                 FIPS level pre-launch instance encryption
• Manages encrypted instances    • Security policy enforcement
                                                                   Secure login interface (HTTPS)
• Lifecycle key management       • Access control
                                                                   Password, one time password, and
                                                                   certificate based authentication options
                                                                   Event logging and activation notification

© SafeNet Confidential and Proprietary



                                                                                                                    13
PROBLEM



    Maintain Trust & Control in Virtual Storage Volumes
    Loss of ownership in a shared storage environments


    Issue of Data Leakage
                                                                   KEY POINTS
           Requires trust in meta-tagging or data isolation
           strategy of cloud provider                              •   Data Isolation
                                                                   •   Cloud Compliance
           Risks from misconfiguration and cloud administrators
                                                                   •   Multi-Tenant Protection
           Regulatory evidence of privacy and integrity controls
   Trust and Control Issues
      If cloud provider offers encryption:
           Proper Key Handling
                NIST Lifecycle compliance
                Strength, uniqueness, rotation, etc.
           NIST approved algorithms
     Administration trust
           Separation of Duties

    © SafeNet Confidential and Proprietary



                                                                                                 14
SOLUTION



Secure Virtual Storage: SafeNet ProtectV Volume                                       TM



Maintain data privacy in shared storage environments with encrypted data isolation




                 On-premise
                                                                                                     Data


                                                                                                      TM
                                                                                               ProtectV    Volume




                                                                                                 Storage


                                         Virtual Server

                                                                 Security Features
SafeNet DataSecure (Supplemental Security Option):                 Multiple cloud storage options:
• Manages encrypted instances    • Security policy enforcement               TM
                                                                     ProtectV     Volume for storage servers
• Lifecycle key management       • Access control
                                                                     NetApp storage support
                                                                     ProtectFile customer-based encryption
                                                                 FIPS 140-2 Level 2 Security Certified Solution
                                                                  Centralized Policy and NIST 800-57 Key
© SafeNet Confidential and Proprietary                           Lifecycle Management

                                                                                                                    15
PROBLEM



    Secure Cloud Applications Without Impacting Performance
    Maintain Root of Trust in Multi-Tenant Cloud Applications

    A Matter of Trust                                                                  KEY POINTS
            Trust transferred to cloud provider                                        • Maintain Ownership of
                                                                                         Keys
            Lack of transparency in cloud security                                     • Virtually No Performance
                                                                                         Degradation
                SAS 70 not useful
                                                                                       • Achieves Cloud Efficiency
   Risk and Liability                                                                   Gains
                                                                                       • Centralized Control &
            Cloud provider never accepts risk                                            Management

                Written in customer agreements                                         • Transparent Application
                                                                                         Integration
            How do you assess risk?
                No established framework for assessing risk
   Regulatory Uncertainty
            No regulation address cloud directly
                Auditors looking for demonstrable security controls, higher standard

    © SafeNet Confidential and Proprietary



                                                                                                                     16
SOLUTION



Secure Cloud Applications: SafeNet DataSecure
and ProtectApp Volume
Enforce data protection in multi-tenant cloud deployed applications



                                            Database                                         Application
            On-premise                                    ProtectDB             ProtectApp

                                                                      Tokenization


                                                                                                     Local crypto and key caching




                                         Security Features
                                           Multiple Cloud Storage Options:
                       DataSecure
                                            ProtectApp for Cloud application level encryption
                                            ProtectDB for cloud database encryption
                                            Tokenization Manager for cloud data tokenization
                                           FIPS 140-2 Level Security Certified Solution
                                           Secure Policy Enforcement and NIST 800-57 Key Lifecycle Management
© SafeNet Confidential and Proprietary



                                                                                                                                    17
PROBLEM



    Loss of Digital Ownership and Control
    Secure Digital Signing and PKI in the Cloud

    Proving you are you
           Where is root of trust in Digital Signing and PKI when it’s all virtual?
           The challenge of attesting to ownership in a virtual world
           Current focus of virtualization research                                KEY POINTS
   Maintaining Keys in clouds                                                     •   Broad cloud-based
                                                                                       platform integration
            When your cloud provider handles keys
                                                                                   •   Application and data
                Appropriate key material                                               separation
                                                                                   •   High performing virtual
                Proper lifecycle and policy handling                                   transactions
                Privileged user abuse
   The Cryptography and Entropy Problem
           Difficult to get true randomness in highly replicated and automated cloud
           Flaws in cryptographic functions have huge consequences
                September 2010 .NET encrypted cookie problem affects 25% of Internet servers.
    © SafeNet Confidential and Proprietary



                                                                                                                 18
SOLUTION



Secure Cloud-Based Identities and Transactions:
SafeNet Hardware Security Options
Establish digital ownership and root of trust in virtual environments


Private

                                                                                                 Public
                                         On-premise




                                                           Security Features
                                                             Anchored root of trust for digital identities and transactions
                                                             FIPS 140-2 Level 2 security Certified Solution
Hybrid                                                       Multi-host partitioning 20 – 100 per HSM
                                            Hardware
                                         Security Module     Virtual platform support (Xen/Hyper-V/ESX-i)
                                                             3rd party partner application support, and integration
                                                             guides on virtual platforms
                                                             Broad cloud-based platform integration
                                                             Application and data separation

© SafeNet Confidential and Proprietary
                                                             High performing virtual transactions


                                                                                                                         19
PROBLEM




    Large Sensitive Data Transfers
    Sending sensitive data in cloud bursting and storage


    High Capacity, Highly Sensitive Data                   KEY POINTS
           Transferring very sensitive data across         •   Data redundancy
          trust boundaries                                 •   Real time data
                                                               transmission
               Data Center to Private Cloud
                                                           •   Continuous, encrypted
                                                               data transmission
          Entire servers and bulk storage
          May invoke encryption requirements (PCI)

   Need for speed and efficiency
           Multi-Gigabit links

          Low latency requirements

               VMotion and similar technologies

               Streaming media and VoIP protocols
    © SafeNet Confidential and Proprietary



                                                                                       20
SOLUTION



Secure Cloud-Based Communications:
SafeNet High Speed Encryptors
Transfer encrypted data communications at high-speed from enterprise to the cloud




              On-premise
                                                                                             Private




                                         High Speed
                                         Encryption
                                                      Security Features
                                                        Multi-Gigabit L2 Low-Latency Encryption
                                                        Best-in-class FIPS 140-2 Level 3 Security Certified
                                                        Central policy management and seamless integration
                                                        Data redundancy
                                                        Real time data transmission
                                                        Continuous, Encrypted data transmission
© SafeNet Confidential and Proprietary



                                                                                                              21
SafeNet Trusted Cloud Fabric
  A practical blueprint for extending trust and control when moving
  users, data, systems, and applications to virtualized environments

 Solution Areas                                                                       Secure Virtual
                                                                                         Storage
                                                                                                           Secure Cloud
                                                                                                           Applications

     1. Strong Authentication for Cloud Services                      Secure Virtual                                     Secure Cloud-Based
                                                                        Machines                                      Identities and Transactions
           SafeNet Authentication Manger
           SafeNet Token, Software, and Mobile Authentication
     2. Secure Virtual Machines                             Secure Access to SaaS
                                                                                                                              Secure Cloud-Based
                                                                                                                               Communications


           SafeNet ProtectV Instance
           Add DataSecure for Lifecycle Key Management                                              On-premise


     3. Secure Virtual Storage
           SafeNet ProtectV Volume
           Add DataSecure for KM and ProtectFile for Unstructured Data Protection
     4. Securing Cloud Application Data
           SafeNet DataSecure, ProtectApp and ProtectDB
           Add Tokenization Manager to Reduce Audit Scope
     5. Trust Anchor for Cloud Identities and Transactions
           SafeNet Hardware Security Modules
     6. Secure Cloud Communications
           SafeNet High Speed Encryptors
© SafeNet Confidential and Proprietary



                                                                                                                                                    22

Mais conteúdo relacionado

Mais procurados

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGtovmug
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance 1CloudRoad.com
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6David Spinks
 

Mais procurados (20)

Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUGTrend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
SAP Security
SAP SecuritySAP Security
SAP Security
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
 

Destaque

Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSectricity
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 James Wu
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computingTyrone Systems
 
Difference between DSS & ESS
Difference between DSS & ESSDifference between DSS & ESS
Difference between DSS & ESSdeepak sharma
 
Computer based information system
Computer based information systemComputer based information system
Computer based information systemshoaibzaheer1
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS Amazon Web Services
 
Dss vs expert system
Dss vs expert systemDss vs expert system
Dss vs expert systemAnita Johri
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information SystemsManuel Ardales
 

Destaque (10)

Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014 Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
 
 5 security risks of cloud computing
 5 security risks of cloud computing 5 security risks of cloud computing
 5 security risks of cloud computing
 
Difference between DSS & ESS
Difference between DSS & ESSDifference between DSS & ESS
Difference between DSS & ESS
 
Computer based information system
Computer based information systemComputer based information system
Computer based information system
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Dss vs expert system
Dss vs expert systemDss vs expert system
Dss vs expert system
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Types Of Information Systems
Types Of Information SystemsTypes Of Information Systems
Types Of Information Systems
 

Semelhante a Safe Net: Cloud Security Solutions

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...IndicThreads
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...cyberprosocial
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaWise Pacific Venture
 
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...cyberprosocial
 

Semelhante a Safe Net: Cloud Security Solutions (20)

Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
 

Mais de ASBIS SK

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachASBIS SK
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.ASBIS SK
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateASBIS SK
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
VMware world news
VMware world newsVMware world news
VMware world newsASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamASBIS SK
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachASBIS SK
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZASBIS SK
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureASBIS SK
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xASBIS SK
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouASBIS SK
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...ASBIS SK
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...ASBIS SK
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudASBIS SK
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...ASBIS SK
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 

Mais de ASBIS SK (20)

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
VMware world news
VMware world newsVMware world news
VMware world news
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 

Último

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Safe Net: Cloud Security Solutions

  • 1. February 2011 Ondrej Valent Regional Channel Sales Manger Ondrej.Valent@safenet-inc.com 1
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. Cloud Security Solutions February 2011 Customer Use Case Scenarios © SafeNet Confidential and Proprietary
  • 6. Cloud Security Challenges User ID and Access: Secure Authentication, Authorization, Logging  Fundamental Trust & Liability Issues Data Co-Mingling: Multi-tenant data mixing, leakage, ownership Data exposure in multi-tenant Application Vulnerabilities: Exposed vulnerabilities and response environments Insecure Application APIs: Application injection and tampering Separation of duties from cloud provider insiders Data Leakage: Isolating data Transfer of liability by cloud Platform Vulnerabilities: Exposed vulnerabilities and response providers to data owners Insecure Platform APIs: Instance manipulation and tampering  Fundamental New Cloud Risks Data Location/ Residency: Geographic regulatory requirements New hypervisor technologies Hypervisor Vulnerabilities: Virtualization vulnerabilities and architectures Data Retention: Secure deletion of data Redefine trust and attestation Application & Service Hijacking: Malicious application usage in cloud environments Privileged Users: Super-user abuse  Regulatory Uncertainty in the Cloud Service Outage: Availability Regulations likely to require Malicious Insider: Reconnaissance, manipulation, tampering strong controls in the cloud Logging & Forensics: Incident response, liability limitation Perimeter/ Network Security: Secure isolation and access Physical Security: Direct tampering and theft © SafeNet Confidential and Proprietary 6
  • 7. Emergence of Encryption as Unifying Cloud Security Control  Encryption is a fundamental technology for realizing cloud security Isolate data in multi-tenant environments Recognized universally by analysts and experts and underlying control for cloud data Sets a high-water mark for demonstrating regulatory compliance adherence for data  Moves from Data Center tactic to Cloud strategic solution Physical controls, underlying trust in processes, and isolation mitigated some use of encryption Mitigating trust factors that don’t exist in the cloud. © SafeNet Confidential and Proprietary 7
  • 8. SafeNet Trusted Cloud Fabric Maintaining Trust and Control in Virtualized Environments  Delivering on cloud security needs: Secure Virtual Storage Secure Cloud Applications Control and visibility of users, data, applications, and systems when Secure Cloud-Based moving into virtualized environments Secure Virtual Machines Identities and Transactions Proven security and compliance strategies designed and trusted for the enterprise into cloud deployments Secure Cloud-Based Secure Access to SaaS Communications Modular, flexible integration points to deploy in any combination of private, hybrid, or public cloud models —implement what you want, On-premise where you need it, when you need it By extending trust and control SafeNet enables customers to seamlessly integrate any cloud model into their near-term and long-term technology and security strategies © SafeNet Confidential and Proprietary 8
  • 9. Solving Today’s Core Cloud Security Barriers with SafeNet Trusted Cloud Fabric Business Goals (World Leading Bank) SafeNet Cloud Solution 1 Controlling Access to SaaS Applications; Federating Identities Secure Access to SaaS: SafeNet Multi-Factor Authentication Achieving Compliant Isolation and Secure Virtual Machines: 2 Separation of Duties in Multi- Tenant Environments SafeNet ProtectV™Instance 3 Maintaining Trust & Control in Virtual Storage Volumes Secure Virtual Storage: SafeNet ProtectV™Volume Secure Cloud Applications Without Secure Cloud Applications: 4 Impacting Performance; Maintain Ownership of Keys SafeNet DataSecure® and ProtectApp 5 Secure Digital Signing and PKI in the Cloud Secure Cloud-Based Identities and Transactions: SafeNet HSM 6 Connect Securely to Private Clouds Secure Cloud-Based Communications: SafeNet HSE © SafeNet Confidential and Proprietary 9
  • 10. PROBLEM Controlling Access to SaaS and Cloud Applications Keeping data secure when you don’t own the system Enforcing Authentication Strategy in the Cloud KEY POINTS Multi-Factor authentication required for any apps • Single Sign On Access Cloud or Physical • Federated Identities Likely even more critical for cloud-based applications • Seamless Integration • Rapid Provisioning Lower level of trust, invocation of additional regulatory requirements Authentication Sprawl Separate authentication systems for each cloud provider Operationally un-scalable Typical user password/authentication fatigue and weak passwords  Preserving Flexibility Likely to use multiple cloud providers simultaneously Desire rapid re-provisioning to try new services Preserve options in chaotic cloud market The cloud market will consolidate- not if, but when © SafeNet Confidential and Proprietary 10
  • 11. SOLUTION Secure Access to SaaS: SafeNet Multi-Factor Authentication Protect access to cloud-based applications via centrally managed authentication SaaS Apps Cloud Applications Salesforce.com Federated SSO to the cloud Goggle Apps Security Features Single authentication solution for both on-premise and cloud based applications User authenticates using enterprise Federate identities between on-premise identity solution to cloud based solutions using SAML 2.0 protocol Solution is form-factor agnostic: support for HW OTP tokens, SW solutions and SafeNet Authentication Out of Band Manager (SAM) Google Apps and salesForce.com are supported out-of-the-box © SafeNet Confidential and Proprietary 11
  • 12. PROBLEM Securing Uncontrolled Virtual Instances Achieving compliant isolation and separation of duties in multi-tenant environments Unlimited Copying of Instances KEY POINTS Instances could be copied without awareness • Data Isolation • Separation of Duties No visibility to instance location, no audit trail • Cloud Compliance • Pre-Launch Authentication Instances used by competitors and malicious users • Multi-Tenant Protection Enables unlimited brute force attacking Return to original copy for next iteration of password guessing  Unsecured Container of Confidential Data Identical to lost or stolen laptop, except the instance is often a server Virtual nature of makes the potential surface area much larger Not just a single entity lost, potentially unlimited number © SafeNet Confidential and Proprietary 12
  • 13. SOLUTION Secure Virtual Machines: SafeNet ProtectV Instance TM Control virtual machines in the cloud with secure instance encryption and authentication Virtual Machines TM On-premise ProtectV Instance Hypervisor Virtual Server Security Features SafeNet DataSecure (Supplemental Security Option): FIPS level pre-launch instance encryption • Manages encrypted instances • Security policy enforcement Secure login interface (HTTPS) • Lifecycle key management • Access control Password, one time password, and certificate based authentication options Event logging and activation notification © SafeNet Confidential and Proprietary 13
  • 14. PROBLEM Maintain Trust & Control in Virtual Storage Volumes Loss of ownership in a shared storage environments Issue of Data Leakage KEY POINTS Requires trust in meta-tagging or data isolation strategy of cloud provider • Data Isolation • Cloud Compliance Risks from misconfiguration and cloud administrators • Multi-Tenant Protection Regulatory evidence of privacy and integrity controls  Trust and Control Issues If cloud provider offers encryption: Proper Key Handling NIST Lifecycle compliance Strength, uniqueness, rotation, etc. NIST approved algorithms  Administration trust Separation of Duties © SafeNet Confidential and Proprietary 14
  • 15. SOLUTION Secure Virtual Storage: SafeNet ProtectV Volume TM Maintain data privacy in shared storage environments with encrypted data isolation On-premise Data TM ProtectV Volume Storage Virtual Server Security Features SafeNet DataSecure (Supplemental Security Option): Multiple cloud storage options: • Manages encrypted instances • Security policy enforcement TM ProtectV Volume for storage servers • Lifecycle key management • Access control NetApp storage support ProtectFile customer-based encryption FIPS 140-2 Level 2 Security Certified Solution Centralized Policy and NIST 800-57 Key © SafeNet Confidential and Proprietary Lifecycle Management 15
  • 16. PROBLEM Secure Cloud Applications Without Impacting Performance Maintain Root of Trust in Multi-Tenant Cloud Applications A Matter of Trust KEY POINTS Trust transferred to cloud provider • Maintain Ownership of Keys Lack of transparency in cloud security • Virtually No Performance Degradation SAS 70 not useful • Achieves Cloud Efficiency  Risk and Liability Gains • Centralized Control & Cloud provider never accepts risk Management Written in customer agreements • Transparent Application Integration How do you assess risk? No established framework for assessing risk  Regulatory Uncertainty No regulation address cloud directly Auditors looking for demonstrable security controls, higher standard © SafeNet Confidential and Proprietary 16
  • 17. SOLUTION Secure Cloud Applications: SafeNet DataSecure and ProtectApp Volume Enforce data protection in multi-tenant cloud deployed applications Database Application On-premise ProtectDB ProtectApp Tokenization Local crypto and key caching Security Features Multiple Cloud Storage Options: DataSecure ProtectApp for Cloud application level encryption ProtectDB for cloud database encryption Tokenization Manager for cloud data tokenization FIPS 140-2 Level Security Certified Solution Secure Policy Enforcement and NIST 800-57 Key Lifecycle Management © SafeNet Confidential and Proprietary 17
  • 18. PROBLEM Loss of Digital Ownership and Control Secure Digital Signing and PKI in the Cloud Proving you are you Where is root of trust in Digital Signing and PKI when it’s all virtual? The challenge of attesting to ownership in a virtual world Current focus of virtualization research KEY POINTS  Maintaining Keys in clouds • Broad cloud-based platform integration When your cloud provider handles keys • Application and data Appropriate key material separation • High performing virtual Proper lifecycle and policy handling transactions Privileged user abuse  The Cryptography and Entropy Problem Difficult to get true randomness in highly replicated and automated cloud Flaws in cryptographic functions have huge consequences September 2010 .NET encrypted cookie problem affects 25% of Internet servers. © SafeNet Confidential and Proprietary 18
  • 19. SOLUTION Secure Cloud-Based Identities and Transactions: SafeNet Hardware Security Options Establish digital ownership and root of trust in virtual environments Private Public On-premise Security Features Anchored root of trust for digital identities and transactions FIPS 140-2 Level 2 security Certified Solution Hybrid Multi-host partitioning 20 – 100 per HSM Hardware Security Module Virtual platform support (Xen/Hyper-V/ESX-i) 3rd party partner application support, and integration guides on virtual platforms Broad cloud-based platform integration Application and data separation © SafeNet Confidential and Proprietary High performing virtual transactions 19
  • 20. PROBLEM Large Sensitive Data Transfers Sending sensitive data in cloud bursting and storage High Capacity, Highly Sensitive Data KEY POINTS Transferring very sensitive data across • Data redundancy trust boundaries • Real time data transmission Data Center to Private Cloud • Continuous, encrypted data transmission Entire servers and bulk storage May invoke encryption requirements (PCI)  Need for speed and efficiency Multi-Gigabit links Low latency requirements VMotion and similar technologies Streaming media and VoIP protocols © SafeNet Confidential and Proprietary 20
  • 21. SOLUTION Secure Cloud-Based Communications: SafeNet High Speed Encryptors Transfer encrypted data communications at high-speed from enterprise to the cloud On-premise Private High Speed Encryption Security Features Multi-Gigabit L2 Low-Latency Encryption Best-in-class FIPS 140-2 Level 3 Security Certified Central policy management and seamless integration Data redundancy Real time data transmission Continuous, Encrypted data transmission © SafeNet Confidential and Proprietary 21
  • 22. SafeNet Trusted Cloud Fabric A practical blueprint for extending trust and control when moving users, data, systems, and applications to virtualized environments Solution Areas Secure Virtual Storage Secure Cloud Applications 1. Strong Authentication for Cloud Services Secure Virtual Secure Cloud-Based Machines Identities and Transactions SafeNet Authentication Manger SafeNet Token, Software, and Mobile Authentication 2. Secure Virtual Machines Secure Access to SaaS Secure Cloud-Based Communications SafeNet ProtectV Instance Add DataSecure for Lifecycle Key Management On-premise 3. Secure Virtual Storage SafeNet ProtectV Volume Add DataSecure for KM and ProtectFile for Unstructured Data Protection 4. Securing Cloud Application Data SafeNet DataSecure, ProtectApp and ProtectDB Add Tokenization Manager to Reduce Audit Scope 5. Trust Anchor for Cloud Identities and Transactions SafeNet Hardware Security Modules 6. Secure Cloud Communications SafeNet High Speed Encryptors © SafeNet Confidential and Proprietary 22