SlideShare uma empresa Scribd logo
1 de 13
Secured SaaS AcceleratorExecutive Briefing name,  title,  Date
Page 2 Cloud computingis an approach that enables organizations to leverage scalable, elastic and secure resources as services with the expected results of simplified operations, significant savings in cost and nearly instant provisioning. The key attributes “usually” associated with Cloud Computing Multi-tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion   Elastic and Scalable – resources can expand and contract as needed Metered/Rented – some manner of “pay for only what you use” Self-Provisioned – “self check-in” at least to some degree Internet based – accessible using internet technology, usually over the public Internet  X as a Service – the details/concerns of implementation are abstracted for the customer The seventh attribute sets Secure cloud computing apart Secure– an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process. Our Definition of Cloud Computing?
Page 3 The Financial Benefits of Cloud Computing for your Customers Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008
Page 4 How Cloud is Typically Used Today Cloud Traditional HIGH DocumentManagement Conventional business applications with: ,[object Object]
Employee Information
Financial Information
Customer Information
Government Mail and Collaboration Financials and Planning Mission Critical/OLTP Analytics and Reporting DR SecurityRequirements Web SoftwareDevelopment/Test LOW Routine Applications Critical Applications Business Applications This is relative, not definitive positioning
Page 5 © 2009 Unisys Corporation. All rights reserved. What’s Driving The Growth of SaaS?  Market Forces ,[object Object]
Broadband Access
Excess Capacity
Simplification
Windows OS

Mais conteúdo relacionado

Mais procurados

Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceCitrix
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseKristof Breesch
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsKathy (Kat) Mandelstein
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computingvncson
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 

Mais procurados (19)

Redefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer ExperienceRedefining Business Mobility and Customer Experience
Redefining Business Mobility and Customer Experience
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Microsoft Private Cloud Computing
Microsoft Private Cloud ComputingMicrosoft Private Cloud Computing
Microsoft Private Cloud Computing
 
Meghdoot noida cloud data center
Meghdoot noida cloud data centerMeghdoot noida cloud data center
Meghdoot noida cloud data center
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Happiest Minds
Happiest MindsHappiest Minds
Happiest Minds
 
Why build sap on cloud
Why build sap on cloudWhy build sap on cloud
Why build sap on cloud
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 

Semelhante a Accelerated Saa S Exec Briefing V2

2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic SimonClub Alliances
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Cyrus Sorab
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saasRahul Parmar
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saaskavinalli
 
Cloud
CloudCloud
CloudNone
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation christina0310
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCygnet Infotech
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Private Cloud
 

Semelhante a Accelerated Saa S Exec Briefing V2 (20)

Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Financial Services in the Cloud
Financial Services in the CloudFinancial Services in the Cloud
Financial Services in the Cloud
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
LeadMaster Cloud Computing Presentation
LeadMaster Cloud Computing PresentationLeadMaster Cloud Computing Presentation
LeadMaster Cloud Computing Presentation
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud computing and_saas
Cloud computing and_saasCloud computing and_saas
Cloud computing and_saas
 
Cloud
CloudCloud
Cloud
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
PowerPoint Presentation
PowerPoint Presentation PowerPoint Presentation
PowerPoint Presentation
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
 

Accelerated Saa S Exec Briefing V2

  • 1. Secured SaaS AcceleratorExecutive Briefing name, title, Date
  • 2. Page 2 Cloud computingis an approach that enables organizations to leverage scalable, elastic and secure resources as services with the expected results of simplified operations, significant savings in cost and nearly instant provisioning. The key attributes “usually” associated with Cloud Computing Multi-tenant – the ability to process the needs of multiple users with shared resources in a dynamic and transparent fashion Elastic and Scalable – resources can expand and contract as needed Metered/Rented – some manner of “pay for only what you use” Self-Provisioned – “self check-in” at least to some degree Internet based – accessible using internet technology, usually over the public Internet X as a Service – the details/concerns of implementation are abstracted for the customer The seventh attribute sets Secure cloud computing apart Secure– an overall decrease in risk due to greater security protocols and tools from the cloud provider for data in motion, data at rest and data in process. Our Definition of Cloud Computing?
  • 3. Page 3 The Financial Benefits of Cloud Computing for your Customers Source: Forrester Research, “Talking To Your CFO About Cloud Computing”, October 29, 2008
  • 4.
  • 8. Government Mail and Collaboration Financials and Planning Mission Critical/OLTP Analytics and Reporting DR SecurityRequirements Web SoftwareDevelopment/Test LOW Routine Applications Critical Applications Business Applications This is relative, not definitive positioning
  • 9.
  • 14.
  • 15. Focus IT on Core Business
  • 18.
  • 19. Capital outlay to create a services infrastructure & timing of market adoption
  • 20. Costs to modify applications and maintain two different software business models
  • 21.
  • 22.
  • 23. The cloud provider’s ability to help you meet your regulatory and compliance requirements?Compliance Why Security is the Top ConcernDo you worry about… What if these concerns were eliminated and your cloud was really secure?
  • 24. Page 8 Unisys Extreme Security Enables You to Confidently Operate in the Cloud Patent-pending Stealth technology that instantiates private communities of interest based on FIPS 140-2, 256-bit AES* encryption and cloaks the data with proprietary “bit splitting”. The Unisys Difference Layered multi-vendor approach to security with Intrusion Detection and Prevention Services (IDPS), firewall management, 24x7 security monitoring, advanced correlation and analytics, auditable logs… Security Best Practices Secure Cloud services team operates ISO 20000-certified delivery processes that are ITIL V3-compliant. Operational Maturity Independently Certified Security Program Secure Cloud services are provided from ISO 27001-certified delivery centers. Independently Audited and Certified Services Centers SAS-70 Type II-certified data centers. *Advanced Encryption Standard
  • 25.
  • 29.
  • 33. Government Financials and Planning Mail and Collaboration Mail and Collaboration Financials and Planning Mission Critical/OLTP Mission Critical/OLTP Analytics and Reporting Analytics and Reporting DR DR SecurityRequirements SecurityRequirements Web Web SoftwareDevelopment/Test SoftwareDevelopment/Test LOW LOW Routine Applications Critical Applications Routine Applications Critical Applications Business Applications Business Applications This is relative, not definitive positioning
  • 34.
  • 37. My Secure AaaSExternal Cloud Internal Cloud 4 Cloud security powered by Unisys Stealth 3 Optimized on + off premises Hybrid Cloud Combining the best of Internal and External Cloud for maximum agility, elasticity and security, at minimum cost 2010
  • 38.
  • 39. Security Advisory (Application & Infrastructure)
  • 41.
  • 44. Flexible capacity – pay for what you use
  • 46.
  • 50.
  • 52. Image &Patch Management
  • 56.
  • 57. Where we go from here? Page 13