SlideShare a Scribd company logo
1 of 15
Alexandra Instituttet Cloud computing Security 6/5/2011
Alexandra Institute Cloud computingSecurity
What Is Cloud Computing?
Cloud Benefits
B2B Scenario
B2B2C Scenario (Business to Business to Customer)
Innovation In Assembly Scenario
Cloud Computing Evolution
Cloud Service Models http://www.katescomment.com/iaas-paas-saas-definition/
Multi-Tenancy
Alexandra Institute Cloud computing Security
14 Specific Cloud Computing Security Challenges* Migrating PII & sensitive data to the cloud ,[object Object]
Exposure of data to foreign government & data
Subpoenas
Data retention & records management issues

More Related Content

What's hot

Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9John Varghese
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory complianceUlf Mattsson
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution BriefJoseph DeFever
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Bitglass
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueVijayananda Mohire
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New HopeBitglass
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...Elasticsearch
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 

What's hot (20)

Dome9 Public Cloud Security
Dome9 Public Cloud SecurityDome9 Public Cloud Security
Dome9 Public Cloud Security
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
A safety design of
A safety design ofA safety design of
A safety design of
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Cloud security
Cloud securityCloud security
Cloud security
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 

Viewers also liked

Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Alexandra Instituttet
 
Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Alexandra Instituttet
 
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"Alexandra Instituttet
 
øLmave eller bare insulinresistent
øLmave   eller bare insulinresistentøLmave   eller bare insulinresistent
øLmave eller bare insulinresistentEdb Huset a/s
 
2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Alexandra Instituttet
 
Customer Experience Maturity Assessment
Customer Experience Maturity AssessmentCustomer Experience Maturity Assessment
Customer Experience Maturity AssessmentMac Wheeler
 
Gartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing ClientsGartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing Clientsfranzel77
 
Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Jesse Gant
 
Top 10 utilities interview questions with answers
Top 10 utilities interview questions with answersTop 10 utilities interview questions with answers
Top 10 utilities interview questions with answerslibbygray000
 
Defining product marketing
Defining product marketingDefining product marketing
Defining product marketingGerardo A Dada
 

Viewers also liked (19)

Mobileappdev fah
Mobileappdev fahMobileappdev fah
Mobileappdev fah
 
Apriori data mining in the cloud
Apriori data mining in the cloudApriori data mining in the cloud
Apriori data mining in the cloud
 
Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012
 
Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"
 
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
 
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
 
Teknologikaravanen - katalog
Teknologikaravanen - katalogTeknologikaravanen - katalog
Teknologikaravanen - katalog
 
Sund Innovation i Randers
Sund Innovation i RandersSund Innovation i Randers
Sund Innovation i Randers
 
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
 
øLmave eller bare insulinresistent
øLmave   eller bare insulinresistentøLmave   eller bare insulinresistent
øLmave eller bare insulinresistent
 
2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"
 
Forretningsudvikling og Innovation
Forretningsudvikling og InnovationForretningsudvikling og Innovation
Forretningsudvikling og Innovation
 
Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"
 
Customer Experience Maturity Assessment
Customer Experience Maturity AssessmentCustomer Experience Maturity Assessment
Customer Experience Maturity Assessment
 
Gartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing ClientsGartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing Clients
 
Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Product and UX - are the roles blurring?
Product and UX - are the roles blurring?
 
Top 10 utilities interview questions with answers
Top 10 utilities interview questions with answersTop 10 utilities interview questions with answers
Top 10 utilities interview questions with answers
 
Defining product marketing
Defining product marketingDefining product marketing
Defining product marketing
 
Strategic Role - Product Management
Strategic Role - Product ManagementStrategic Role - Product Management
Strategic Role - Product Management
 

Similar to Alexandra Institute Cloud Computing Security Challenges

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial servicesMoshe Ferber
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Eyal Estrin
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 

Similar to Alexandra Institute Cloud Computing Security Challenges (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 

More from Alexandra Instituttet

Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Alexandra Instituttet
 
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"Alexandra Instituttet
 
2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"Alexandra Instituttet
 
2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"Alexandra Instituttet
 
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"Alexandra Instituttet
 
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"Alexandra Instituttet
 
Midt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktMidt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktAlexandra Instituttet
 
Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Alexandra Instituttet
 
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet
 
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenKontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenAlexandra Instituttet
 
Find nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGFind nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGAlexandra Instituttet
 
Sund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterSund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterAlexandra Instituttet
 

More from Alexandra Instituttet (16)

Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
 
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
 
2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"
 
2010 Sorø "Ekko af byen"
2010 Sorø "Ekko af byen"2010 Sorø "Ekko af byen"
2010 Sorø "Ekko af byen"
 
2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"
 
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
 
2010 Sorø "Åbning i Sorø"
2010 Sorø "Åbning i Sorø"2010 Sorø "Åbning i Sorø"
2010 Sorø "Åbning i Sorø"
 
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
 
Midt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktMidt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunkt
 
Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling
 
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
 
Massive Data
Massive DataMassive Data
Massive Data
 
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenKontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Find nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGFind nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTING
 
Sund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterSund Innovation i Randers Sundhedscenter
Sund Innovation i Randers Sundhedscenter
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Alexandra Institute Cloud Computing Security Challenges

Editor's Notes

  1. Generally, SaaS provides the most integrated functionality built directly into the offering, with the least consumer extensibility, and a relatively high level of integrated security (at least the provider bears a responsibility for security).PaaS is intended to enable developers to build their own applications on top of the platform. As a result it tends to be more extensible than SaaS, at the expense of customerready features. This tradeoff extends to security features and capabilities, where the built-in capabilities are less complete, but there is more flexibility to layer on additional security.IaaS provides few if any application-like features, but enormous extensibility. This generally means less integrated security capabilities and functionality beyond protecting the infrastructure itself. This model requires that operating systems, applications, and content be managed and secured by the cloud consumer.