SlideShare uma empresa Scribd logo
1 de 8
Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits  Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor

Mais conteúdo relacionado

Destaque

Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
FRIZZT1
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
giladpn
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
x
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
679
 

Destaque (15)

Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical Dossiers
 
Responsiblity To Act Writing Benchmark
Responsiblity To Act Writing BenchmarkResponsiblity To Act Writing Benchmark
Responsiblity To Act Writing Benchmark
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
 
Community needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handoutCommunity needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handout
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerez
 
Job Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview SkillsJob Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview Skills
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
Stuffed animals 2010
Stuffed animals 2010Stuffed animals 2010
Stuffed animals 2010
 
Stuffed Animal Sleepover
Stuffed Animal SleepoverStuffed Animal Sleepover
Stuffed Animal Sleepover
 
Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015
 
Job Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look ForJob Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look For
 
Melting Pot or Salad Bowl
Melting Pot or Salad BowlMelting Pot or Salad Bowl
Melting Pot or Salad Bowl
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
 

Semelhante a 20100602 porticor at igt short

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
100656472mercier
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
MeshDynamics
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
CJ Boguszewski
 

Semelhante a 20100602 porticor at igt short (20)

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
LTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationsLTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer Applications
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

20100602 porticor at igt short

  • 1. Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 2. Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 3. Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
  • 4. How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 5. Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
  • 6. Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
  • 7. Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
  • 8. Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor