Enviar pesquisa
Carregar
Safe Net: Cloud Security Solutions
•
3 gostaram
•
1,191 visualizações
ASBIS SK
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 22
Recomendados
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
Cloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
KVH Co. Ltd.
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
SafeNet
Trend micro v2
Trend micro v2
JD Sherry
Trend micro deep security
Trend micro deep security
Trend Micro
Data Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
From Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security
Recomendados
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
Cloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
KVH Co. Ltd.
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
SafeNet
Trend micro v2
Trend micro v2
JD Sherry
Trend micro deep security
Trend micro deep security
Trend Micro
Data Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
Introduction - Trend Micro Deep Security
Introduction - Trend Micro Deep Security
Andrew Wong
From Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
Cloud Security
Cloud Security
Hi-Tech College
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
Cloud computing
Cloud computing
akanksha botke
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Cloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Trend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
SAP Security
SAP Security
Conferencias FIST
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
Trend Micro - 13martie2012
Trend Micro - 13martie2012
Agora Group
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
TrendMicro
TrendMicro
1CloudRoad.com
Resarch paper i cloud computing
Resarch paper i cloud computing
Bharat Gupta
Rik Ferguson
Rik Ferguson
CloudExpoEurope
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
David Spinks
Safenet Authentication Service, SAS
Safenet Authentication Service, SAS
robbuddingh
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
Sectricity
Mais conteúdo relacionado
Mais procurados
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
tovmug
Cloud Security
Cloud Security
Hi-Tech College
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
1CloudRoad.com
Cloud computing
Cloud computing
akanksha botke
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Amazon Web Services
Cloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Amazon Web Services
Trend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
Dana Gardner
SAP Security
SAP Security
Conferencias FIST
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Ingram Micro Cloud
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Acrodex
Trend Micro - 13martie2012
Trend Micro - 13martie2012
Agora Group
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
Symantec
TrendMicro
TrendMicro
1CloudRoad.com
Resarch paper i cloud computing
Resarch paper i cloud computing
Bharat Gupta
Rik Ferguson
Rik Ferguson
CloudExpoEurope
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
David Spinks
Mais procurados
(20)
Trend Micro Dec 6 Toronto VMUG
Trend Micro Dec 6 Toronto VMUG
Cloud Security
Cloud Security
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
Cloud computing
Cloud computing
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
Cloud security and security architecture
Cloud security and security architecture
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
Trend micro real time threat management press presentation
Trend micro real time threat management press presentation
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
SAP Security
SAP Security
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Trend Micro - 13martie2012
Trend Micro - 13martie2012
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
TrendMicro
TrendMicro
Resarch paper i cloud computing
Resarch paper i cloud computing
Rik Ferguson
Rik Ferguson
Csirs Trabsport Security September 2011 V 3.6
Csirs Trabsport Security September 2011 V 3.6
Destaque
Safenet Authentication Service, SAS
Safenet Authentication Service, SAS
robbuddingh
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
Sectricity
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
James Wu
5 security risks of cloud computing
5 security risks of cloud computing
Tyrone Systems
Difference between DSS & ESS
Difference between DSS & ESS
deepak sharma
Computer based information system
Computer based information system
shoaibzaheer1
Encryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
Dss vs expert system
Dss vs expert system
Anita Johri
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
VR Talsaniya
Types Of Information Systems
Types Of Information Systems
Manuel Ardales
Destaque
(10)
Safenet Authentication Service, SAS
Safenet Authentication Service, SAS
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
Jrsys secure mobile solutions 2014
Jrsys secure mobile solutions 2014
5 security risks of cloud computing
5 security risks of cloud computing
Difference between DSS & ESS
Difference between DSS & ESS
Computer based information system
Computer based information system
Encryption and Key Management in AWS
Encryption and Key Management in AWS
Dss vs expert system
Dss vs expert system
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
Types Of Information Systems
Types Of Information Systems
Semelhante a Safe Net: Cloud Security Solutions
Enterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
L S Subramanian
Who owns security in the cloud
Who owns security in the cloud
Trend Micro
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
Cloud securityperspectives cmg
Cloud securityperspectives cmg
Neha Dhawan
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
Protecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
CloudPassage Overview
CloudPassage Overview
CloudPassage
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Khazret Sapenov
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
n|u - The Open Security Community
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
IndicThreads
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
UNIT4 IT Solutions
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
Microsoft TechNet - Belgium and Luxembourg
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
cyberprosocial
Cloud Computing
Cloud Computing
Nazish Mohammed
cloud Raid
cloud Raid
gsmenon1
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
Abdul Rasheed Feroz Khan
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
cyberprosocial
Semelhante a Safe Net: Cloud Security Solutions
(20)
Enterprise Security in Cloud
Enterprise Security in Cloud
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
Who owns security in the cloud
Who owns security in the cloud
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Cloud securityperspectives cmg
Cloud securityperspectives cmg
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Protecting Data in the Cloud
Protecting Data in the Cloud
CloudPassage Overview
CloudPassage Overview
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Cloud security - The Cloud is as Secure as you want it to be! - Indicthreads ...
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Fortifying the Digital Sky Exploring the Application of Cybersecurity for Clo...
Cloud Computing
Cloud Computing
cloud Raid
cloud Raid
Smart cloud - single to multi cloud
Smart cloud - single to multi cloud
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Fortifying the Digital Sky: Exploring the Application of Cybersecurity for Cl...
Mais de ASBIS SK
ICT služby ASBIS-u
ICT služby ASBIS-u
ASBIS SK
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
ASBIS SK
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
ASBIS SK
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
ASBIS SK
SafeNet - Data Protection Company
SafeNet - Data Protection Company
ASBIS SK
VMware world news
VMware world news
ASBIS SK
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
ASBIS SK
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
ASBIS SK
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
ASBIS SK
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
ASBIS SK
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
ASBIS SK
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
ASBIS SK
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
ASBIS SK
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
ASBIS SK
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
ASBIS SK
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
ASBIS SK
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
ASBIS SK
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
ASBIS SK
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
ASBIS SK
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
ASBIS SK
Mais de ASBIS SK
(20)
ICT služby ASBIS-u
ICT služby ASBIS-u
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
SafeNet - Data Protection Company
SafeNet - Data Protection Company
VMware world news
VMware world news
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
Último
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Sri Ambati
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Último
(20)
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Safe Net: Cloud Security Solutions
1.
February 2011 Ondrej Valent Regional
Channel Sales Manger Ondrej.Valent@safenet-inc.com 1
2.
2
3.
3
4.
4
5.
Cloud Security Solutions
February 2011 Customer Use Case Scenarios © SafeNet Confidential and Proprietary
6.
Cloud Security Challenges
User ID and Access: Secure Authentication, Authorization, Logging Fundamental Trust & Liability Issues Data Co-Mingling: Multi-tenant data mixing, leakage, ownership Data exposure in multi-tenant Application Vulnerabilities: Exposed vulnerabilities and response environments Insecure Application APIs: Application injection and tampering Separation of duties from cloud provider insiders Data Leakage: Isolating data Transfer of liability by cloud Platform Vulnerabilities: Exposed vulnerabilities and response providers to data owners Insecure Platform APIs: Instance manipulation and tampering Fundamental New Cloud Risks Data Location/ Residency: Geographic regulatory requirements New hypervisor technologies Hypervisor Vulnerabilities: Virtualization vulnerabilities and architectures Data Retention: Secure deletion of data Redefine trust and attestation Application & Service Hijacking: Malicious application usage in cloud environments Privileged Users: Super-user abuse Regulatory Uncertainty in the Cloud Service Outage: Availability Regulations likely to require Malicious Insider: Reconnaissance, manipulation, tampering strong controls in the cloud Logging & Forensics: Incident response, liability limitation Perimeter/ Network Security: Secure isolation and access Physical Security: Direct tampering and theft © SafeNet Confidential and Proprietary 6
7.
Emergence of Encryption
as Unifying Cloud Security Control Encryption is a fundamental technology for realizing cloud security Isolate data in multi-tenant environments Recognized universally by analysts and experts and underlying control for cloud data Sets a high-water mark for demonstrating regulatory compliance adherence for data Moves from Data Center tactic to Cloud strategic solution Physical controls, underlying trust in processes, and isolation mitigated some use of encryption Mitigating trust factors that don’t exist in the cloud. © SafeNet Confidential and Proprietary 7
8.
SafeNet Trusted Cloud
Fabric Maintaining Trust and Control in Virtualized Environments Delivering on cloud security needs: Secure Virtual Storage Secure Cloud Applications Control and visibility of users, data, applications, and systems when Secure Cloud-Based moving into virtualized environments Secure Virtual Machines Identities and Transactions Proven security and compliance strategies designed and trusted for the enterprise into cloud deployments Secure Cloud-Based Secure Access to SaaS Communications Modular, flexible integration points to deploy in any combination of private, hybrid, or public cloud models —implement what you want, On-premise where you need it, when you need it By extending trust and control SafeNet enables customers to seamlessly integrate any cloud model into their near-term and long-term technology and security strategies © SafeNet Confidential and Proprietary 8
9.
Solving Today’s Core
Cloud Security Barriers with SafeNet Trusted Cloud Fabric Business Goals (World Leading Bank) SafeNet Cloud Solution 1 Controlling Access to SaaS Applications; Federating Identities Secure Access to SaaS: SafeNet Multi-Factor Authentication Achieving Compliant Isolation and Secure Virtual Machines: 2 Separation of Duties in Multi- Tenant Environments SafeNet ProtectV™Instance 3 Maintaining Trust & Control in Virtual Storage Volumes Secure Virtual Storage: SafeNet ProtectV™Volume Secure Cloud Applications Without Secure Cloud Applications: 4 Impacting Performance; Maintain Ownership of Keys SafeNet DataSecure® and ProtectApp 5 Secure Digital Signing and PKI in the Cloud Secure Cloud-Based Identities and Transactions: SafeNet HSM 6 Connect Securely to Private Clouds Secure Cloud-Based Communications: SafeNet HSE © SafeNet Confidential and Proprietary 9
10.
PROBLEM
Controlling Access to SaaS and Cloud Applications Keeping data secure when you don’t own the system Enforcing Authentication Strategy in the Cloud KEY POINTS Multi-Factor authentication required for any apps • Single Sign On Access Cloud or Physical • Federated Identities Likely even more critical for cloud-based applications • Seamless Integration • Rapid Provisioning Lower level of trust, invocation of additional regulatory requirements Authentication Sprawl Separate authentication systems for each cloud provider Operationally un-scalable Typical user password/authentication fatigue and weak passwords Preserving Flexibility Likely to use multiple cloud providers simultaneously Desire rapid re-provisioning to try new services Preserve options in chaotic cloud market The cloud market will consolidate- not if, but when © SafeNet Confidential and Proprietary 10
11.
SOLUTION Secure Access to
SaaS: SafeNet Multi-Factor Authentication Protect access to cloud-based applications via centrally managed authentication SaaS Apps Cloud Applications Salesforce.com Federated SSO to the cloud Goggle Apps Security Features Single authentication solution for both on-premise and cloud based applications User authenticates using enterprise Federate identities between on-premise identity solution to cloud based solutions using SAML 2.0 protocol Solution is form-factor agnostic: support for HW OTP tokens, SW solutions and SafeNet Authentication Out of Band Manager (SAM) Google Apps and salesForce.com are supported out-of-the-box © SafeNet Confidential and Proprietary 11
12.
PROBLEM
Securing Uncontrolled Virtual Instances Achieving compliant isolation and separation of duties in multi-tenant environments Unlimited Copying of Instances KEY POINTS Instances could be copied without awareness • Data Isolation • Separation of Duties No visibility to instance location, no audit trail • Cloud Compliance • Pre-Launch Authentication Instances used by competitors and malicious users • Multi-Tenant Protection Enables unlimited brute force attacking Return to original copy for next iteration of password guessing Unsecured Container of Confidential Data Identical to lost or stolen laptop, except the instance is often a server Virtual nature of makes the potential surface area much larger Not just a single entity lost, potentially unlimited number © SafeNet Confidential and Proprietary 12
13.
SOLUTION Secure Virtual Machines:
SafeNet ProtectV Instance TM Control virtual machines in the cloud with secure instance encryption and authentication Virtual Machines TM On-premise ProtectV Instance Hypervisor Virtual Server Security Features SafeNet DataSecure (Supplemental Security Option): FIPS level pre-launch instance encryption • Manages encrypted instances • Security policy enforcement Secure login interface (HTTPS) • Lifecycle key management • Access control Password, one time password, and certificate based authentication options Event logging and activation notification © SafeNet Confidential and Proprietary 13
14.
PROBLEM
Maintain Trust & Control in Virtual Storage Volumes Loss of ownership in a shared storage environments Issue of Data Leakage KEY POINTS Requires trust in meta-tagging or data isolation strategy of cloud provider • Data Isolation • Cloud Compliance Risks from misconfiguration and cloud administrators • Multi-Tenant Protection Regulatory evidence of privacy and integrity controls Trust and Control Issues If cloud provider offers encryption: Proper Key Handling NIST Lifecycle compliance Strength, uniqueness, rotation, etc. NIST approved algorithms Administration trust Separation of Duties © SafeNet Confidential and Proprietary 14
15.
SOLUTION Secure Virtual Storage:
SafeNet ProtectV Volume TM Maintain data privacy in shared storage environments with encrypted data isolation On-premise Data TM ProtectV Volume Storage Virtual Server Security Features SafeNet DataSecure (Supplemental Security Option): Multiple cloud storage options: • Manages encrypted instances • Security policy enforcement TM ProtectV Volume for storage servers • Lifecycle key management • Access control NetApp storage support ProtectFile customer-based encryption FIPS 140-2 Level 2 Security Certified Solution Centralized Policy and NIST 800-57 Key © SafeNet Confidential and Proprietary Lifecycle Management 15
16.
PROBLEM
Secure Cloud Applications Without Impacting Performance Maintain Root of Trust in Multi-Tenant Cloud Applications A Matter of Trust KEY POINTS Trust transferred to cloud provider • Maintain Ownership of Keys Lack of transparency in cloud security • Virtually No Performance Degradation SAS 70 not useful • Achieves Cloud Efficiency Risk and Liability Gains • Centralized Control & Cloud provider never accepts risk Management Written in customer agreements • Transparent Application Integration How do you assess risk? No established framework for assessing risk Regulatory Uncertainty No regulation address cloud directly Auditors looking for demonstrable security controls, higher standard © SafeNet Confidential and Proprietary 16
17.
SOLUTION Secure Cloud Applications:
SafeNet DataSecure and ProtectApp Volume Enforce data protection in multi-tenant cloud deployed applications Database Application On-premise ProtectDB ProtectApp Tokenization Local crypto and key caching Security Features Multiple Cloud Storage Options: DataSecure ProtectApp for Cloud application level encryption ProtectDB for cloud database encryption Tokenization Manager for cloud data tokenization FIPS 140-2 Level Security Certified Solution Secure Policy Enforcement and NIST 800-57 Key Lifecycle Management © SafeNet Confidential and Proprietary 17
18.
PROBLEM
Loss of Digital Ownership and Control Secure Digital Signing and PKI in the Cloud Proving you are you Where is root of trust in Digital Signing and PKI when it’s all virtual? The challenge of attesting to ownership in a virtual world Current focus of virtualization research KEY POINTS Maintaining Keys in clouds • Broad cloud-based platform integration When your cloud provider handles keys • Application and data Appropriate key material separation • High performing virtual Proper lifecycle and policy handling transactions Privileged user abuse The Cryptography and Entropy Problem Difficult to get true randomness in highly replicated and automated cloud Flaws in cryptographic functions have huge consequences September 2010 .NET encrypted cookie problem affects 25% of Internet servers. © SafeNet Confidential and Proprietary 18
19.
SOLUTION Secure Cloud-Based Identities
and Transactions: SafeNet Hardware Security Options Establish digital ownership and root of trust in virtual environments Private Public On-premise Security Features Anchored root of trust for digital identities and transactions FIPS 140-2 Level 2 security Certified Solution Hybrid Multi-host partitioning 20 – 100 per HSM Hardware Security Module Virtual platform support (Xen/Hyper-V/ESX-i) 3rd party partner application support, and integration guides on virtual platforms Broad cloud-based platform integration Application and data separation © SafeNet Confidential and Proprietary High performing virtual transactions 19
20.
PROBLEM
Large Sensitive Data Transfers Sending sensitive data in cloud bursting and storage High Capacity, Highly Sensitive Data KEY POINTS Transferring very sensitive data across • Data redundancy trust boundaries • Real time data transmission Data Center to Private Cloud • Continuous, encrypted data transmission Entire servers and bulk storage May invoke encryption requirements (PCI) Need for speed and efficiency Multi-Gigabit links Low latency requirements VMotion and similar technologies Streaming media and VoIP protocols © SafeNet Confidential and Proprietary 20
21.
SOLUTION Secure Cloud-Based Communications: SafeNet
High Speed Encryptors Transfer encrypted data communications at high-speed from enterprise to the cloud On-premise Private High Speed Encryption Security Features Multi-Gigabit L2 Low-Latency Encryption Best-in-class FIPS 140-2 Level 3 Security Certified Central policy management and seamless integration Data redundancy Real time data transmission Continuous, Encrypted data transmission © SafeNet Confidential and Proprietary 21
22.
SafeNet Trusted Cloud
Fabric A practical blueprint for extending trust and control when moving users, data, systems, and applications to virtualized environments Solution Areas Secure Virtual Storage Secure Cloud Applications 1. Strong Authentication for Cloud Services Secure Virtual Secure Cloud-Based Machines Identities and Transactions SafeNet Authentication Manger SafeNet Token, Software, and Mobile Authentication 2. Secure Virtual Machines Secure Access to SaaS Secure Cloud-Based Communications SafeNet ProtectV Instance Add DataSecure for Lifecycle Key Management On-premise 3. Secure Virtual Storage SafeNet ProtectV Volume Add DataSecure for KM and ProtectFile for Unstructured Data Protection 4. Securing Cloud Application Data SafeNet DataSecure, ProtectApp and ProtectDB Add Tokenization Manager to Reduce Audit Scope 5. Trust Anchor for Cloud Identities and Transactions SafeNet Hardware Security Modules 6. Secure Cloud Communications SafeNet High Speed Encryptors © SafeNet Confidential and Proprietary 22