SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Protecting Your Sensitive
       Data in the Cloud
                                     Ed Bottini
  Global Cloud Computing Ecosystem Manager
                                      IBM

                                  Jim Zierick
    EVP Strategy and Corporate Development
                                BeyondTrust

                                                 June 26, 2012
                  © 1985-2012 BeyondTrust Software, Inc. All rights reserved
Agenda
• IBM Smart Cloud Offering
• The State of the Cloud
• Cloud Security Best Practices
• BeyondTrust Cloud Security
• Next Steps
• Q&A




                                                                                2

                   © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Enterprises intend for cloud to improve their business capabilities
How Important are the Following Objectives for Adopting Cloud? % of Respondents


      Increased collaboration with external partners                                                                                                   62%

    Competitive/cost advantages thru vertical integration                                                                                        57%

                                 New delivery channels/markets                                                                               56%


                                New/enhanced revenue streams                                                                                54%


             Competitive differentiation thru specialization
                                                                                                                                           51%


                         Rebalanced mix of products/services                                                                       46%

                                            Flexible pricing models                                                             43%

                        Business Capabilities                        Internal Efficiencies                   Important or Very Important


      Source: 2011 IBM/EIU Cloud Survey Results, Q5: How Important are the Following Objectives for Adopting Cloud?, n= 572


                                                                                                                                                               3
                                   Close to half (42%) of organizations surveyed plan to harness
3                                                                                                                                                 © 2012 IBM Corporation
                                   cloud for radical business model innovation within three years
Adoption patterns are emerging for successfully beginning and
progressing cloud initiatives
    Cut IT expense    Accelerate time   Gain immediate       Innovate
    & complexity      to market with    access with          business
    through a cloud   cloud platform    business solutions   models by
    enabled data      services          on cloud             becoming a
    center                                                   cloud service
                                                             provider




4                                                                      © 2012 IBM Corporation
IBM offers clients choice of cloud delivery models…




      FOUNDATION                  SERVICES                  SOLUTIONS

     Private & Hybrid        Managed Services            Business Solutions
      Cloud Enablement       Infrastructure & Platform    Software & Business
        Technologies                as a Service          Process as a Service




             Commitment to open standards and a broad ecosystem
5                                                                        © 2012 IBM Corporation
SERVICES


     Client       Industry     Data and      Workplace    Security    Resilience Enterprise      Partner
    defined       services     analytics      services    services     services applications     services
    services                   services




                                            Application Services




          Application         Application        Application         Application      Integration
           Lifecycle          Resources         Environments         Management




                             Enterprise                          Enterprise+




         Infrastructure       Management            Security         Payment and      Availability and
            Platform          and Support                               Billing        Performance




               Enterprise                        Enterprise                        Enterprise
               data center
                                                                               A                    B



      Managed private cloud                  Hosted private cloud            Shared cloud services


6                                                                                              © 2012 IBM Corporation
Transforming Application Lifecycle Management leveraging Cloud &
    ecosystem partner services




         Project        Requirement       Design        Development    Test        Deployment   Production
         Initiation     Analysis




      Defects loaded in Rational
      Quality Manager and tracked
                                                                                                  Maintain
      through application life cycle
                                          Application Virtualization          Defect Analysis
              Code Analysis & Reporting                          Mobile Device Testing
                                              Performance Testing Services




                                       Workload Portability                 Testing Solutions
     Community of Partners                          Application Virtualization             Testing on Devices


7                                                                                                      © 2012 IBM Corporation
IBM has built and ecosystem to enhance our capabilities and deliver
client value
                           Cloud Application Providers                       Cloud Services Solution Providers




                                    Client    Industry    Data and Workplace Security Resilience Enterprise Partner
                                   defined    services    analytics services services  services applications services
                                   services               services


                                                                   Application Services
                                                                                                                             Cloud Technology
                                                                                                                                 providers
                                        Application      Application      Application    Application        Integration
                                         Lifecycle       Resources       Environments    Management



                                                         Enterprise                      Enterprise+
    Cloud Infrastructure
        Providers
                                       Infrastructure    Management         Security       Payment        Availability and
                                          Platform       and Support                      and Billing      Performance


                                         Enterprise                       Enterprise                    Enterprise
                                         data center                                                A                 B

                                   Managed private cloud                Hosted private          Shared cloud services
                                                                            cloud




                                                                       Cloud Builders

8                                                                                                                                    © 2012 IBM Corporation
#1 Concern When Moving to the Cloud
Security is the #1 concern when moving deployments to the Cloud


                                                                                     Poneman’s Surveys concluded that:
                                                                                     •       79% of respondents believe that being
                                                                                             able to efficiently manage security in the
                                                                                             cloud is critical.


                                                                                     •       42% of respondents indicated they would not
                                                                                             know if their organizations' cloud applications
                                                                                             or data was compromised by a security breach
                                                                                             or data exploit

            IDC Enterprise Panel Survey on Cloud challenges




                                                                                                                                         9

                                            © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Top threats to Cloud Computing

Per Cloud Security Alliance’s “Top Threats to
  Cloud Computing (March 2010)
  – Abuse & Nefarious Use of Cloud Computing
  – Insecure Interfaces and APIs
  – Malicious Insiders
  – Shared Technology Vulnerabilities
  – Data Loss/Leakage
  – Account or Service Hijacking



                                                                              10

                 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
The Evolving Threat Landscape
Boldness and inventiveness of hackers is outrunning
companies’ ability to deal with them. Theft of intellectual
property from U.S. companies is occurring at a rate of
$200B a year.
“Organizations continue to struggle with excessive user
privilege as it remains the primary attack point for data
breaches and unauthorized transactions.”
~ Mark Diodati, Burton/Gartner Group
• Cost of security operations outstripping IT budget growth
• Threat surface increases with every new user and every new technology
    – Acceleration of APT activities
    – BYOD/’Consumerization’ of IT a fact of life now
    – Virtualization and the Private Cloud blur create gaps for attack
• Challenges in distinguishing between ‘potential’ and ‘real’ threats

                                                                                                11

                                   © 1985-2010 BeyondTrust Software, Inc. All rights reserved
The Problem is Broad and Deep

        • The threat from attacks is a statistical
          certainty and businesses of every type
          and size are vulnerable.

        • Organizations are experiencing multiple
          breaches: 59 percent had two or more
          breaches in the past 12 months.

        • Only 11 percent of companies know the
          source of all network security breaches.


                                                                     12

        © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Demystifying Cloud Security

                               You can’t secure ‘The Cloud.’
                               There is no ‘The Cloud.’ If
                               you don’t have a robust
                               security program, cloud
                               computing will make it
                               worse.”
                                        Christopher Hoff – Founding member
                                        and technical advisor to the Cloud
                                        Security Alliance



                                                                             13

        © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Impact of Cloud Computing

Cloud Computing Reality – Public, Hybrid or Private
• Increasing scale – from thousands to tens of thousands servers
• Increasing complexity makes configuration and change management
  challenging
    – Complex directory structures are a major pain point
• Reliability is critical to realizing operational improvement




                                                                                          14

                             © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Rethink Existing Controls for Clouds
What’s the same
   – Many technical controls are the same
What’s different
   – Massively automated, virtualized, multi-tenant
     environment
   – Complex supply chain, multiple-domain security concerns
Necessitates some shifts in security strategy
   – New controls (hypervisor integrity monitoring)
   – Process-related controls (application and data governance)



                                                                                     15

                        © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Best Practice For Cloud Security
Full Life-Cycle Control of Privileged Users
        Requirements:
            Account for All Privileged Users
            Manage Provisioning/De-Provisioning Privileged
             Credentials
            Implement a “Least Privilege” based Control
             System
            Monitor and Reconcile Privileged Activity
            Maintain a High Quality Audit Repository
            Automate Compliance Reporting

                                                                            16

               © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Requirements For Enterprise Grade Cloud Security

 • Scalable, enterprise grade fabric
 • Seamless integrations with on-premise and
   cloud directories
 • Allow admins to manage policies not
   infrastructure
 • Dynamically react to changes in virtual
   environment
 • Quantifiable performance metrics of how
   it’s performing



                                                                                    17

                       © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Cloud Security with BeyondTrust

BeyondTrust allows companies to extend existing
security infrastructure, policies and compliance
reporting to their private, public and hybrid clouds
such that it is
 • Scalable
 • Elastic
 • Easily installed
 • Easily managed


                                                                                   18

                      © 1985-2010 BeyondTrust Software, Inc. All rights reserved
The BeyondTrust Vision
         Security in Context                                                                    Public, Private and Hybrid
Our threat management and policy                                                                Cloud Computing Security
enablement solutions provide zero-gap
visibility and actionable intelligence to reduce                                                Server & Desktop, Physical &
                                                                                               Virtualization Windows, Linux,
risks and close security gaps by integrating                                                                 Unix
providing Security in Context across
vulnerabilities, privilege and data.                                                                    Network
•   Solutions for infrastructure, endpoints,                                                         Device Security
    data and applications
•   Support for physical, virtual, public,                                                            Data Security
    private and hybrid cloud environments                                                           & Leak Prevention
•   Allows IT governance to strengthen
    security, improve productivity, drive                                                           Governance, Risk
    compliance and reduce expense                                                                    & Compliance


                                                                                                                         19

                                  © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Context-Aware Security Intelligence
Complete Risk Management for both
Internal and External Threats
    Discovery of all internal and external
     vulnerabilities and threats
    Prioritization of risk according to threats,
     resources, privileges, etc.
    Threat-aware mitigations and
     preventative measures including Patch
     Management, Least Privilege, DLP and
     Endpoint protection.
    Continuous monitoring and measurement
     of threat posture
    Automated compliance reporting

                                                                                             20

                                © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Context-Aware Security Intelligence
Benefits
Comprehensive preventative intelligence
       BeyondTrust allows you to discover all your security
        weaknesses across vulnerabilities, privilege and data
        and provides you with the security intelligence you
        need to protect business assets from cyber attacks.

Fully automated and integrated; less resource
intensive
       BeyondTrust automates the full spectrum of ongoing
        assets discovery, assessments, policy and compliance
        enforcement for your entire IT infrastructure across
        Desktop, Servers, Mobile, Virtual, Database and
        Cloud.

Flexible and Scalable
       Our solutions support distributed deployment across
        the largest organizations around the globe.


                                                                                                          21

                                             © 1985-2010 BeyondTrust Software, Inc. All rights reserved
BeyondTrust Solutions For Cloud Computing

                 Unix, Linux and Windows Servers
                                                                                                    Policy Based Security

                       Virtualized and
                    cloud environments                                             Flexible Network Configuration


                                                                                                      Highly Scalable
                   Monitor critical databases


                     Activity Directory Bridge                                                  Dynamic Deployment

                              RETINA CS
Purpose built threat assessment and management                                                        Mixed Networks


                                                                                                                            22

                                       © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Comprehensive Hybrid Cloud Model
Systems      Servers Virtualization             Identity
Management                                      Services                                           PowerBroker
                                                                                                   Enterprise Fabric
                                                                                                   Flexible Deployment Across Virtual
                                                                                                   and Physical Infrastructure
                                                                                                   •   Programmable
                                                                                                   •   Policy driven
                                                                                                   •   Dynamically Deployed
                                                                      Application
                                                                                                   •   Context aware and adaptive
                                                                        Database

                                                                  Operating System

                                                                       Hypervisor

                                                                                                   Easily Configured into Separate
                                                                                                   Security Zones to allow Context
                                                                                                   Aware Cloud Security Policies
   PCI       Financial Systems          HR Systems

                                                                                                                                 24

                                      © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Next: Learn More About Secure Cloud
                         Deployments
          BeyondTrust Resources                                                                     IBM Resources

    Free product
      evaluation
                                                                                  Learn more about
Free whitepaper:                                                                    IBM SmartCloud
  Elevating Cloud                                                                Enterprise and Sign
         Security                                                                 Up for an Account
    with Privilege
       Delegation



                     Find both here:                                                                       Visit:
           www.beyondtrust.com/SmartCloud                                                           www.ibm.com/buycloud




                                                                                                                           25

                                       © 1985-2010 BeyondTrust Software, Inc. All rights reserved
Thank You
Join the Conversation!


    800-234-9072
    818-575-4000
     www.beyondtrust.com

     © 1985-2012 BeyondTrust Software, Inc. All rights reserved

Mais conteúdo relacionado

Mais procurados

IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...
IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...
IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...Kathy (Kat) Mandelstein
 
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...Kathy (Kat) Mandelstein
 
Presentationer ipt uc mobilitet 2010
Presentationer ipt uc mobilitet 2010Presentationer ipt uc mobilitet 2010
Presentationer ipt uc mobilitet 2010midfieldmedia
 
Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...IBM Rational software
 
IDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of SaIDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of Sawtaylor2408
 
Smarter products for_a_smarter_p_lanet-neeraj_chandra
Smarter products for_a_smarter_p_lanet-neeraj_chandraSmarter products for_a_smarter_p_lanet-neeraj_chandra
Smarter products for_a_smarter_p_lanet-neeraj_chandraIBM
 
Innovation and Business Platforms
Innovation and Business PlatformsInnovation and Business Platforms
Innovation and Business PlatformsJeremy Caine
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdeliveryKelly Emo
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Sverige
 
Real insights real_results-steve_robinson
Real insights real_results-steve_robinsonReal insights real_results-steve_robinson
Real insights real_results-steve_robinsonIBM
 
Infosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfraVision
 
Derek Wiggill, CEO, Argility
Derek Wiggill, CEO, Argility Derek Wiggill, CEO, Argility
Derek Wiggill, CEO, Argility OpenText Cordys
 
Making a Strong Business Case for Multiagent Technology
Making a Strong Business Case for Multiagent TechnologyMaking a Strong Business Case for Multiagent Technology
Making a Strong Business Case for Multiagent Technologydgalanti
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012abhedk
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolIBM Danmark
 
NHS Connecting for Health- Cisco
NHS Connecting for Health- CiscoNHS Connecting for Health- Cisco
NHS Connecting for Health- CiscoCisco Case Studies
 

Mais procurados (19)

IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...
IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...
IBM Rational Software Conference 2009: Modeling, Architecture & Construction ...
 
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...
IBM Rational Software Conference 2009: Enterprise Architecture Management Tra...
 
GXS Strategy
GXS StrategyGXS Strategy
GXS Strategy
 
Software Quality Df
Software Quality DfSoftware Quality Df
Software Quality Df
 
Presentationer ipt uc mobilitet 2010
Presentationer ipt uc mobilitet 2010Presentationer ipt uc mobilitet 2010
Presentationer ipt uc mobilitet 2010
 
Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...Enterprise modernization: improving the economics of mainframe and multi-plat...
Enterprise modernization: improving the economics of mainframe and multi-plat...
 
IDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of SaIDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of Sa
 
Smarter products for_a_smarter_p_lanet-neeraj_chandra
Smarter products for_a_smarter_p_lanet-neeraj_chandraSmarter products for_a_smarter_p_lanet-neeraj_chandra
Smarter products for_a_smarter_p_lanet-neeraj_chandra
 
Innovation and Business Platforms
Innovation and Business PlatformsInnovation and Business Platforms
Innovation and Business Platforms
 
Timelytrendsin appdelivery
Timelytrendsin appdeliveryTimelytrendsin appdelivery
Timelytrendsin appdelivery
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Real insights real_results-steve_robinson
Real insights real_results-steve_robinsonReal insights real_results-steve_robinson
Real insights real_results-steve_robinson
 
Infosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForceInfosheet InfraVision and RemedyForce
Infosheet InfraVision and RemedyForce
 
Derek Wiggill, CEO, Argility
Derek Wiggill, CEO, Argility Derek Wiggill, CEO, Argility
Derek Wiggill, CEO, Argility
 
Making a Strong Business Case for Multiagent Technology
Making a Strong Business Case for Multiagent TechnologyMaking a Strong Business Case for Multiagent Technology
Making a Strong Business Case for Multiagent Technology
 
Ibm puresystems deck for tcs abhed_11102012
Ibm puresystems  deck for tcs abhed_11102012Ibm puresystems  deck for tcs abhed_11102012
Ibm puresystems deck for tcs abhed_11102012
 
PCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian CagnolPCTY 2012, How Mobile changes the World v. Christian Cagnol
PCTY 2012, How Mobile changes the World v. Christian Cagnol
 
NHS Connecting for Health- Cisco
NHS Connecting for Health- CiscoNHS Connecting for Health- Cisco
NHS Connecting for Health- Cisco
 
Les outils de Devops IBM
Les outils de Devops IBMLes outils de Devops IBM
Les outils de Devops IBM
 

Destaque

Destaque (20)

Masat (2)
Masat (2)Masat (2)
Masat (2)
 
Feb pml
Feb pmlFeb pml
Feb pml
 
Vantage Point Consulting, Inc.
Vantage Point Consulting, Inc.Vantage Point Consulting, Inc.
Vantage Point Consulting, Inc.
 
Actividades Colegio Cervantes
Actividades Colegio Cervantes Actividades Colegio Cervantes
Actividades Colegio Cervantes
 
October gml
October gmlOctober gml
October gml
 
July GML
July GMLJuly GML
July GML
 
Rotary club of Dhone Oct 2012 pml
Rotary club of Dhone Oct 2012 pmlRotary club of Dhone Oct 2012 pml
Rotary club of Dhone Oct 2012 pml
 
Nov gml
Nov gml Nov gml
Nov gml
 
November gml
November gmlNovember gml
November gml
 
Cover girl
Cover girlCover girl
Cover girl
 
Rotaract certificate final print
Rotaract certificate final   printRotaract certificate final   print
Rotaract certificate final print
 
Stop the Evil, Protect the Endpoint
Stop the Evil, Protect the EndpointStop the Evil, Protect the Endpoint
Stop the Evil, Protect the Endpoint
 
April pml r.c. dhone
April pml r.c. dhoneApril pml r.c. dhone
April pml r.c. dhone
 
December pml R.C Dhone
December pml R.C DhoneDecember pml R.C Dhone
December pml R.C Dhone
 
Modulo 2
Modulo 2Modulo 2
Modulo 2
 
IT3196 final presentation
IT3196 final presentationIT3196 final presentation
IT3196 final presentation
 
Rotary club of Dhone souviner 2012 - 13
Rotary club of Dhone souviner 2012 - 13Rotary club of Dhone souviner 2012 - 13
Rotary club of Dhone souviner 2012 - 13
 
Pic
PicPic
Pic
 
Davis a directorsnotebook
Davis a directorsnotebookDavis a directorsnotebook
Davis a directorsnotebook
 
How to create facebook ads
How to create facebook adsHow to create facebook ads
How to create facebook ads
 

Semelhante a IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud

Intel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntelAPAC
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntelAPAC
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011IBM Sverige
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
CBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingCBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingHenrik Hasselbalch
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationMegan Irvine
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelOpen Data Center Alliance
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Jennifer Stevenson
 
Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01chickana
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Open Data Center Alliance
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCapgemini
 
Salesforce Solution For Software Industry
Salesforce Solution For Software IndustrySalesforce Solution For Software Industry
Salesforce Solution For Software Industrykdwangxi
 
Plan for success: Getting to grips with the strategic planning issues of clou...
Plan for success: Getting to grips with the strategic planning issues of clou...Plan for success: Getting to grips with the strategic planning issues of clou...
Plan for success: Getting to grips with the strategic planning issues of clou...Capgemini
 

Semelhante a IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud (20)

Intel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentationIntel Cloud Summit ODCA - NAB Customer presentation
Intel Cloud Summit ODCA - NAB Customer presentation
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NAB
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011Service Availability and Performance Management - PCTY 2011
Service Availability and Performance Management - PCTY 2011
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
CBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcingCBS February 2013 Cloud Computing in the context of outsourcing
CBS February 2013 Cloud Computing in the context of outsourcing
 
C bu06 planning_your_cloud_education
C bu06 planning_your_cloud_educationC bu06 planning_your_cloud_education
C bu06 planning_your_cloud_education
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Accelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, IntelAccelerating the Speed of Innovation - Jason Waxman, Intel
Accelerating the Speed of Innovation - Jason Waxman, Intel
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
Grow your Business: Webcast Wednesday Presentation Series Microsoft Partner O...
 
Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01Cloudv1 12762457899275-phpapp01
Cloudv1 12762457899275-phpapp01
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach Private cloud at BMW Group – An open approach
Private cloud at BMW Group – An open approach
 
Cloud Computing at UTM Shillong
Cloud Computing at UTM ShillongCloud Computing at UTM Shillong
Cloud Computing at UTM Shillong
 
Salesforce Solution For Software Industry
Salesforce Solution For Software IndustrySalesforce Solution For Software Industry
Salesforce Solution For Software Industry
 
Plan for success: Getting to grips with the strategic planning issues of clou...
Plan for success: Getting to grips with the strategic planning issues of clou...Plan for success: Getting to grips with the strategic planning issues of clou...
Plan for success: Getting to grips with the strategic planning issues of clou...
 

Mais de BeyondTrust

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access ManagementBeyondTrust
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...BeyondTrust
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)BeyondTrust
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseBeyondTrust
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementBeyondTrust
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?BeyondTrust
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutBeyondTrust
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)BeyondTrust
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsBeyondTrust
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...BeyondTrust
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsBeyondTrust
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksBeyondTrust
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?BeyondTrust
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
 

Mais de BeyondTrust (20)

The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
Sudo Mode (part 2): How Privilege Mistakes could Dismantle your Entire Enterp...
 
5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)5 Steps to Privilege Readiness (infographic)
5 Steps to Privilege Readiness (infographic)
 
Unearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your EnterpriseUnearth Active Directory Threats Before They Bury Your Enterprise
Unearth Active Directory Threats Before They Bury Your Enterprise
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
Active Directory Auditing Tools: Building Blocks or just a Handful of Dust?
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares AboutUnix / Linux Privilege Management: What a Financial Services CISO Cares About
Unix / Linux Privilege Management: What a Financial Services CISO Cares About
 
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
Why Federal Systems are Immune from Ransomware...& other Grim Fairy Tales)
 
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT SystemsMitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...Hacker techniques for bypassing existing antivirus solutions & how to build a...
Hacker techniques for bypassing existing antivirus solutions & how to build a...
 
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged AccountsHow Federal Agencies Can Build a Layered Defense for Privileged Accounts
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

IBM and BeyondTrust Presents: Protecting Your Sensitive Data in the Cloud

  • 1. Protecting Your Sensitive Data in the Cloud Ed Bottini Global Cloud Computing Ecosystem Manager IBM Jim Zierick EVP Strategy and Corporate Development BeyondTrust June 26, 2012 © 1985-2012 BeyondTrust Software, Inc. All rights reserved
  • 2. Agenda • IBM Smart Cloud Offering • The State of the Cloud • Cloud Security Best Practices • BeyondTrust Cloud Security • Next Steps • Q&A 2 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 3. Enterprises intend for cloud to improve their business capabilities How Important are the Following Objectives for Adopting Cloud? % of Respondents Increased collaboration with external partners 62% Competitive/cost advantages thru vertical integration 57% New delivery channels/markets 56% New/enhanced revenue streams 54% Competitive differentiation thru specialization 51% Rebalanced mix of products/services 46% Flexible pricing models 43% Business Capabilities Internal Efficiencies Important or Very Important Source: 2011 IBM/EIU Cloud Survey Results, Q5: How Important are the Following Objectives for Adopting Cloud?, n= 572 3 Close to half (42%) of organizations surveyed plan to harness 3 © 2012 IBM Corporation cloud for radical business model innovation within three years
  • 4. Adoption patterns are emerging for successfully beginning and progressing cloud initiatives Cut IT expense Accelerate time Gain immediate Innovate & complexity to market with access with business through a cloud cloud platform business solutions models by enabled data services on cloud becoming a center cloud service provider 4 © 2012 IBM Corporation
  • 5. IBM offers clients choice of cloud delivery models… FOUNDATION SERVICES SOLUTIONS Private & Hybrid Managed Services Business Solutions Cloud Enablement Infrastructure & Platform Software & Business Technologies as a Service Process as a Service Commitment to open standards and a broad ecosystem 5 © 2012 IBM Corporation
  • 6. SERVICES Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Infrastructure Management Security Payment and Availability and Platform and Support Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private cloud Shared cloud services 6 © 2012 IBM Corporation
  • 7. Transforming Application Lifecycle Management leveraging Cloud & ecosystem partner services Project Requirement Design Development Test Deployment Production Initiation Analysis Defects loaded in Rational Quality Manager and tracked Maintain through application life cycle Application Virtualization Defect Analysis Code Analysis & Reporting Mobile Device Testing Performance Testing Services Workload Portability Testing Solutions Community of Partners Application Virtualization Testing on Devices 7 © 2012 IBM Corporation
  • 8. IBM has built and ecosystem to enhance our capabilities and deliver client value Cloud Application Providers Cloud Services Solution Providers Client Industry Data and Workplace Security Resilience Enterprise Partner defined services analytics services services services applications services services services Application Services Cloud Technology providers Application Application Application Application Integration Lifecycle Resources Environments Management Enterprise Enterprise+ Cloud Infrastructure Providers Infrastructure Management Security Payment Availability and Platform and Support and Billing Performance Enterprise Enterprise Enterprise data center A B Managed private cloud Hosted private Shared cloud services cloud Cloud Builders 8 © 2012 IBM Corporation
  • 9. #1 Concern When Moving to the Cloud Security is the #1 concern when moving deployments to the Cloud Poneman’s Surveys concluded that: • 79% of respondents believe that being able to efficiently manage security in the cloud is critical. • 42% of respondents indicated they would not know if their organizations' cloud applications or data was compromised by a security breach or data exploit IDC Enterprise Panel Survey on Cloud challenges 9 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 10. Top threats to Cloud Computing Per Cloud Security Alliance’s “Top Threats to Cloud Computing (March 2010) – Abuse & Nefarious Use of Cloud Computing – Insecure Interfaces and APIs – Malicious Insiders – Shared Technology Vulnerabilities – Data Loss/Leakage – Account or Service Hijacking 10 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 11. The Evolving Threat Landscape Boldness and inventiveness of hackers is outrunning companies’ ability to deal with them. Theft of intellectual property from U.S. companies is occurring at a rate of $200B a year. “Organizations continue to struggle with excessive user privilege as it remains the primary attack point for data breaches and unauthorized transactions.” ~ Mark Diodati, Burton/Gartner Group • Cost of security operations outstripping IT budget growth • Threat surface increases with every new user and every new technology – Acceleration of APT activities – BYOD/’Consumerization’ of IT a fact of life now – Virtualization and the Private Cloud blur create gaps for attack • Challenges in distinguishing between ‘potential’ and ‘real’ threats 11 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 12. The Problem is Broad and Deep • The threat from attacks is a statistical certainty and businesses of every type and size are vulnerable. • Organizations are experiencing multiple breaches: 59 percent had two or more breaches in the past 12 months. • Only 11 percent of companies know the source of all network security breaches. 12 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 13. Demystifying Cloud Security You can’t secure ‘The Cloud.’ There is no ‘The Cloud.’ If you don’t have a robust security program, cloud computing will make it worse.” Christopher Hoff – Founding member and technical advisor to the Cloud Security Alliance 13 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 14. Impact of Cloud Computing Cloud Computing Reality – Public, Hybrid or Private • Increasing scale – from thousands to tens of thousands servers • Increasing complexity makes configuration and change management challenging – Complex directory structures are a major pain point • Reliability is critical to realizing operational improvement 14 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 15. Rethink Existing Controls for Clouds What’s the same – Many technical controls are the same What’s different – Massively automated, virtualized, multi-tenant environment – Complex supply chain, multiple-domain security concerns Necessitates some shifts in security strategy – New controls (hypervisor integrity monitoring) – Process-related controls (application and data governance) 15 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 16. Best Practice For Cloud Security Full Life-Cycle Control of Privileged Users Requirements:  Account for All Privileged Users  Manage Provisioning/De-Provisioning Privileged Credentials  Implement a “Least Privilege” based Control System  Monitor and Reconcile Privileged Activity  Maintain a High Quality Audit Repository  Automate Compliance Reporting 16 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 17. Requirements For Enterprise Grade Cloud Security • Scalable, enterprise grade fabric • Seamless integrations with on-premise and cloud directories • Allow admins to manage policies not infrastructure • Dynamically react to changes in virtual environment • Quantifiable performance metrics of how it’s performing 17 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 18. Cloud Security with BeyondTrust BeyondTrust allows companies to extend existing security infrastructure, policies and compliance reporting to their private, public and hybrid clouds such that it is • Scalable • Elastic • Easily installed • Easily managed 18 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 19. The BeyondTrust Vision Security in Context Public, Private and Hybrid Our threat management and policy Cloud Computing Security enablement solutions provide zero-gap visibility and actionable intelligence to reduce Server & Desktop, Physical & Virtualization Windows, Linux, risks and close security gaps by integrating Unix providing Security in Context across vulnerabilities, privilege and data. Network • Solutions for infrastructure, endpoints, Device Security data and applications • Support for physical, virtual, public, Data Security private and hybrid cloud environments & Leak Prevention • Allows IT governance to strengthen security, improve productivity, drive Governance, Risk compliance and reduce expense & Compliance 19 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 20. Context-Aware Security Intelligence Complete Risk Management for both Internal and External Threats  Discovery of all internal and external vulnerabilities and threats  Prioritization of risk according to threats, resources, privileges, etc.  Threat-aware mitigations and preventative measures including Patch Management, Least Privilege, DLP and Endpoint protection.  Continuous monitoring and measurement of threat posture  Automated compliance reporting 20 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 21. Context-Aware Security Intelligence Benefits Comprehensive preventative intelligence  BeyondTrust allows you to discover all your security weaknesses across vulnerabilities, privilege and data and provides you with the security intelligence you need to protect business assets from cyber attacks. Fully automated and integrated; less resource intensive  BeyondTrust automates the full spectrum of ongoing assets discovery, assessments, policy and compliance enforcement for your entire IT infrastructure across Desktop, Servers, Mobile, Virtual, Database and Cloud. Flexible and Scalable  Our solutions support distributed deployment across the largest organizations around the globe. 21 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 22. BeyondTrust Solutions For Cloud Computing Unix, Linux and Windows Servers Policy Based Security Virtualized and cloud environments Flexible Network Configuration Highly Scalable Monitor critical databases Activity Directory Bridge Dynamic Deployment RETINA CS Purpose built threat assessment and management Mixed Networks 22 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 23. Comprehensive Hybrid Cloud Model Systems Servers Virtualization Identity Management Services PowerBroker Enterprise Fabric Flexible Deployment Across Virtual and Physical Infrastructure • Programmable • Policy driven • Dynamically Deployed Application • Context aware and adaptive Database Operating System Hypervisor Easily Configured into Separate Security Zones to allow Context Aware Cloud Security Policies PCI Financial Systems HR Systems 24 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 24. Next: Learn More About Secure Cloud Deployments BeyondTrust Resources IBM Resources Free product evaluation Learn more about Free whitepaper: IBM SmartCloud Elevating Cloud Enterprise and Sign Security Up for an Account with Privilege Delegation Find both here: Visit: www.beyondtrust.com/SmartCloud www.ibm.com/buycloud 25 © 1985-2010 BeyondTrust Software, Inc. All rights reserved
  • 25. Thank You Join the Conversation! 800-234-9072 818-575-4000 www.beyondtrust.com © 1985-2012 BeyondTrust Software, Inc. All rights reserved