SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Kyle Falkenhagen, CSC
Erik Winebrenner, CSC
October 2015
SEC321
AWS for the Enterprise
Implementing Policy, Governance, and
Security for Enterprise Workloads
What to Expect from the Session
• Demonstrate enterprise policy, governance, and security capabilities
that support the deployment and management of enterprise and
industry applications on AWS using CSC’s Agility Platform
• Demonstrate the value of blueprinting enterprise applications and
environments
• Demonstrate secure and managed connectivity to AWS
• Present how CSC provides agile and consumption-based endpoint
security for workloads in AWS providing enterprise management and
24x7 monitoring of workload compliance, vulnerabilities, and potential
threats
The Market Is Embracing an Application-Centric, Hybrid Cloud Model
Business execs demand greater IT
agility and innovation
This is fostering greater adoption of
hybrid cloud models
71% say their
organizations need to
embrace new technology or
lose market share
47% of businesses
are making technology and
cloud decisions without getting
the IT department involved
… and sidestepping enterprise governance
controls when central IT doesn’t deliver
… and a shift to cloud platforms and
apps, not just infrastructure
Projected allocation of cloud spend
2013 – 2015
Hybrid
43% Private
25%Public
32%
Forward-Thinking IT Organizations Are Adopting Hybrid Cloud Operating
Models to Provide IT as a Service
Virtualize Automation Hybrid Clouds IT as a Service
Improve
asset
utilization and
ROI
Defer data
center build-
outs
Launch initial
private cloud
Self-service access
and on-demand
provisioning
Policy-driven
cloud
governance
Compressed
SDLC and tool
chain
automation
IaaS and PaaS
standardization
Fully
transparent and
auditable
service usage
Broadly adopt utility
cost model with
chargeback
Redundant service
options with low
switching costs
Optimize
variable-to-
fixed costs by
project
Transparent linkage
of demand,
capacity, and costs
• Accelerate AWS benefits to the enterprise, while ensuring compliance with IT
standards, governance, and security requirements
• Expand cloud service portfolios to enterprise platforms and apps (not just
IaaS), available on a self-service, on-demand basis directly to the end users that
need them
• Rapidly obtain the benefits of hybrid environments using a pay-as-you-go OPEX
model and CSC managed services, rather than attempt to build internally with scarce
skills/capital
+Amazon is the undisputed public
cloud market share leader and is
innovating faster than anyone else in
public cloud.
CSC has the market-leading cloud
management and orchestration platform
and strong expertise in enterprise
application migration to cloud.
CSC Enterprise Cloud Services For AWS
The AWS and CSC Partnership
INCLUDED:
BizCloud
BizCloud HC
INCLUDED:
Public
Clouds
Private
Clouds
Dev Test Prod
IaaS
Platforms
Apps
Store SDLC Tools
CSC Agility Platform as a Service For AWS
Manage/Govern Enterprise IT Services Across Hybrid Environments
• Pay-as-you-go model
• CSC Agility Platform provided as-a-Service
• CSC-managed services including
consolidated billing, helpdesk, and OS-
level services
• Integrated hybrid cyber-security model
• Extensible policy engine for cloud
governance
• Cloud-portable blueprints for applications
and platforms
• Additional public and private cloud
adapters available
CLOUD-PORTABLE
BLUEPRINTS
POLICY-DRIVEN
GOVERNANCE
APPLICATION RELEASE
AUTOMATION (ARA)
Put platforms and apps in
“cloud-portable blueprints.”
Embed IT standards
Use policies to automate
governance/compliance,
right sizing, right placement, etc.
Consume cloud IT services
not just from storefronts, but
directly from SDLC tooling
Accelerating Benefits Using CSC Agility Platform
Others…
BroadCloud
Support
CSC
CSC Managed Hybrid Cloud Service
The CSC Managed Hybrid Cloud service provides secure dedicated access between on-premises
infrastructure and the AWS Cloud. IT organizations easily migrate workloads and take advantage of cost
savings when allocating resources for dynamic projects. The CSC Managed Hybrid Cloud service
integrates technology from AWS, Brocade, AT&T, and Intel:
• AWS: Customers use AWS DirectConnect to establish private connectivity between AWS and data
centers, offices, or colocation environments.
• Brocade vRouter and the Brocade vADC: Provides additional secure access, reliability, advanced
networking, and application performance across on-premises infrastructure into an AWS VPC using
IPsec, vRouting, and application load balancing. Brocade leverages Data Plane Development Kit
(DPDK) to deliver performance, boosting packet processing and throughput.
• AT&T Netbond: Allows direct provisioning of 1G and 10G high-speed connections to an AWS VPC
within the AWS cloud infrastructure and global availability zones.
• Intel® Xeon® E5 processor: Enables Amazon EC2 to increase networking capabilities.
CSC Hybrid Cloud Service – A Cloud
Networking Strategy Foundation
• Low-latency, on-net, fully
redundant
• Any-to-any, instant-on
connectivity
• Eliminate data center hairpin
PERFORMANCE
• Private IP address space avoids
Internet/DDoS threats
SECURITY
• API controlled for on-demand
adds and bandwidth changes
AGILITY
• Scales dynamically with cloud
usage; elasticity creates added
pricing value
ELASTICITY
• Save as much as 60% on
networking
• Cost model aligns with cloud
usage
COST-EFFECTIVENESS
A network-enabled cloud solution with performance and security
Big Data Platform as a Service
APP 3
Flexible Deployment
OptionsPublic
Cloud
Virtual
Private Cloud
Dedicated
Cluster
Enterprise
Private Cloud
CSC Big Data Platform as a Service
APP 1
APP 2
REAL
TIMEBATCH
AD HOC
Fully Managed as a Service
Comprehensive, proactive infrastructure, and software
management eliminates the most frustrating reason open source
big data solutions fail: operational complexity.
Big Data Expertise and Experience
We have been working with Hadoop, Cassandra, and Mongo since
2011 and have implemented and managed more than 150 big data
clusters.
The Only PCI & HIPAA Compliance Certified SI Solution
CSC is the first and only solutions integrator to meet stringent PCI
and HIPAA certification standards with an open big data solution.
Integrated Audit Monitoring and Comprehensive Security
Every solution has comprehensive security activity and audit
capabilities out of the box, and can be fully configured with the
latest security features, from infrastructure to application.
Real-Time, Streaming, and In-Memory Capabilities
We have the broadest set of capabilities in the market, including
deep expertise in installing, managing, and developing big and fast
data analytics.
Demo
CSC Cybersecurity
On-Demand Workload Protection
Powered by CloudPassage
Top Challenges Facing Cloud Customers:
Why Should CSC’s Customers Care?
• Increased scrutiny and responsibility following
high-profile cloud breaches
• New regulatory demands to better protect
cloud-hosted data
• Existing regulations increasingly applied to cloud
environments
• Require consistent security across workloads in
an agile environment
• Increased criminal attention on cloud assets due
to their increased adoption
• Greater threat to intellectual property as
enterprises host off-premises
• “Need to protect my cloud workloads at same
level as my traditional systems”
• Costs growing as internal IT security
infrastructure expands
• Expanding skilled resources required to manage
security of cloud assets
OPERATIONS
ADVANCED
THREATS
RISK AND COMPLIANCE
NEXT-GEN TECHNOLOGIES
• Require visibility of all assets, regardless of
location or cloud provider
• Cloud expected to be cheaper than traditional —
in reality, security bogs down cost, eliminates
savings
• Growing risk exposure as virtual workloads
increase
SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days)
PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Client Cost Implications in As-Is Model
Cost of traditional cybersecurity solution relative to overall workload cost
COST OF SECURITY
IS OVERWHELMING
PAY 100%
REGARDLESS OF USAGE
PAY FOR MULTIPLE
SECURITY CONTROLS
Self-Managed Cloud Workload Security
Company A
Public
Private
HR Payroll
HIPAA
Big Data Germany
Production
Dev/Test
Production PCI
Amazon Web Services
Traditional IT
Endpoint
Security
SIEM
Vuln.
Scanning
Payroll
HR
HIPAASales
Dev/Test
Managed
Workloads
Rogue
Systems
Security
Policies
CSC Cloud Security Services
On-Demand Workload Protection—Powered by CloudPassage
Security Information and Event Management (SIEM)
Pulse Advanced Reporting
Policy Creation, Configuration, and Management
Email-Based Alerting
Account Setup and Management
Complete Management of Cloud Workload Security
Monitored
(Optional)
Consulting
(Optional)
Managed
CSC CLOUD SECURITY SERVICES
Configuration
Security Monitoring
Software
Vulnerability
Assessment
Log-Based Intrusion
Detection
Workload Firewall
Management
System Account
Management
File Integrity
Monitoring
Meet All Critical Control Objectives
Gain visibility into enterprise and individual asset security posture
Uncover and manage vulnerabilities and configuration issues
Get immediate reports showing open issues against CIS benchmarks
Do this across an entire account or department, or by type of system
Data Protection
Compromise
Management
Operational
Automation
Visibility
Strong Access
Control
Vulnerability
Management
Ultra-
lightweight
SaaS Based
Workload-Level
Security
Micro-
segmentation
Instant On
BENEFITS
FEATURES
Consumption-Based Pricing Lowers Operating Costs
Cost of traditional cybersecurity solution relative to overall workload cost
SUN MON TUE WED THU FRI SAT
Hosted Intrusion Detection
(HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Vulnerability Mgmt. Costs
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Tech. Compliance
(7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
SUN MON TUE WED THU FRI SAT
On-Demand Workload
Protection (3 days)
OFF OFF OFF
PROTECT PROTECT PROTECT
OFF
Customer Workload Costs
(3 days)
OFF OFF OFF WED THU FRI OFF
Cost of On-Demand Workload Protection (OWP)
ConsolidationbyOWP
CSC-Managed Cloud Workload Security with OWP
CSC Proprietary Pulse
Portal
Company A
CSC Risk Management Center (RMC)
Managed
Workloads
Rogue
Systems
Security
Policies
Public
Private
PayrollHR
Dev / Test
Germany
PCI
HIPAA
Production
Big Data Nodes
Digital Trust: Your Future State
CSC ON-DEMAND WORKLOAD
PROTECTION
Reduce cost and complexity
Enable secure adoption of
virtual technologies
Evaluate compliance with
regulatory requirements
Provide full visibility across
cloud workloads
Securely harness cloud’s flexibility
and consumption-based model
Monitor and respond to threats
24x7x365
Why CSC for On-Demand Workload Protection
Global scale
Threat intelligence
24x7 Global SOCs
1,000s of experts
CSC named a Leader in IDC MarketScape
Asia/Pacific Managed Security Services 2015
Vendor Assessment
Consumption-based pricing —
not just in technology, but for services
Enterprise-grade management
and scalability
Customer/App/Regulation-specific
policies
24x7x365 SIEM — monitoring
and investigation
Pulse Customer Portal
We Understand Cybersecurity
GLOBAL CYBERSECURITY
PROFESSIONALS
2,000+
INTEGRATED
GLOBAL RISK
MANAGEMENT
CENTERS
5+
YEARS PROVIDING
CYBERSECURITY
SERVICES
35+
GLOBAL ALLIANCE
PARTNERS PROVIDING
SECURITY EXPERTISE
15+
PUBLIC &
PRIVATE
SECTOR
EXPERTISE
Nearly 40 years of experience in delivering
secure, managed enterprise services
Successfully supporting the world’s most security-
conscious clients, including aerospace and
defense, and banking and financial institutions
worldwide
Helping 250+ clients manage risk and overcome
the most extreme threats
Integrated global Risk Management Centers
IT security experts with in-depth experience
End-to-end visibility of customer’s enterprise
governance and compliance posture
UK
Noida
Kuala
Lumpur
Sydney
Newark
CSC Proprietary Pulse Portal
 24x7x365 visibility
 Immediate access to detailed logs and
incident data
 Executive-oriented dashboard
 Performance metrics
 Simple user-querying methods
 Correlation of incident and vulnerability
data to provide enterprise-wide
“Situational Awareness”
EXAMPLE VIEWSPORTAL FEATURES
Thank You!
Stop by the CSC Booth (424)
Remember to complete
your evaluations!
Thank you!
For longer demos please visit the CSC
(Booth 424) on the expo floor

Mais conteúdo relacionado

Mais procurados

(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
Getting Started with Amazon WorkSpaces
 Getting Started with Amazon WorkSpaces Getting Started with Amazon WorkSpaces
Getting Started with Amazon WorkSpacesAmazon Web Services
 
Dev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoDev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoAmazon Web Services
 
WKS407 Wild Rydes Takes Off – The Dawn of a New Unicorn
WKS407 Wild Rydes Takes Off – The Dawn of a New UnicornWKS407 Wild Rydes Takes Off – The Dawn of a New Unicorn
WKS407 Wild Rydes Takes Off – The Dawn of a New UnicornAmazon Web Services
 
ENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesAmazon Web Services
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the CloudAmazon Web Services
 
Being Well Architected in the Cloud
Being Well Architected in the CloudBeing Well Architected in the Cloud
Being Well Architected in the CloudAdrian Hornsby
 
Maximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWSMaximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWSAmazon Web Services
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...Amazon Web Services
 
Vancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakVancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakAmazon Web Services
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...Amazon Web Services
 
Build a Serverless Web Application in One Day
Build a Serverless Web Application in One DayBuild a Serverless Web Application in One Day
Build a Serverless Web Application in One DayAmazon Web Services
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 

Mais procurados (20)

(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Getting Started with Amazon WorkSpaces
 Getting Started with Amazon WorkSpaces Getting Started with Amazon WorkSpaces
Getting Started with Amazon WorkSpaces
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Dev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - TorontoDev ops on aws deep dive on continuous delivery - Toronto
Dev ops on aws deep dive on continuous delivery - Toronto
 
WKS407 Wild Rydes Takes Off – The Dawn of a New Unicorn
WKS407 Wild Rydes Takes Off – The Dawn of a New UnicornWKS407 Wild Rydes Takes Off – The Dawn of a New Unicorn
WKS407 Wild Rydes Takes Off – The Dawn of a New Unicorn
 
Protecting Our Data on AWS
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
 
ENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New Launches
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
 
Being Well Architected in the Cloud
Being Well Architected in the CloudBeing Well Architected in the Cloud
Being Well Architected in the Cloud
 
Protecting Your Data in AWS
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
The Best of re:invent 2016
The Best of re:invent 2016The Best of re:invent 2016
The Best of re:invent 2016
 
Maximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWSMaximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWS
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
 
Vancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakVancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam Elmalak
 
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
AWS re:Invent 2016: Automating Security Event Response, from Idea to Code to ...
 
Build a Serverless Web Application in One Day
Build a Serverless Web Application in One DayBuild a Serverless Web Application in One Day
Build a Serverless Web Application in One Day
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 

Destaque

(SEC324) NEW! Introducing Amazon Inspector
(SEC324) NEW! Introducing Amazon Inspector(SEC324) NEW! Introducing Amazon Inspector
(SEC324) NEW! Introducing Amazon InspectorAmazon Web Services
 
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...European SharePoint Conference
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessAmazon Web Services
 
(BDT402) Delivering Business Agility Using AWS
(BDT402) Delivering Business Agility Using AWS(BDT402) Delivering Business Agility Using AWS
(BDT402) Delivering Business Agility Using AWSAmazon Web Services
 
Best Practices for Protecting Cloud Workloads - November 2016 Webinar Series
Best Practices for Protecting Cloud Workloads - November 2016 Webinar SeriesBest Practices for Protecting Cloud Workloads - November 2016 Webinar Series
Best Practices for Protecting Cloud Workloads - November 2016 Webinar SeriesAmazon Web Services
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Jürgen Ambrosi
 
Mini curso - Ionic Framework
Mini curso - Ionic FrameworkMini curso - Ionic Framework
Mini curso - Ionic Frameworkjuniorschroder
 
Introduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportIntroduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportAmazon Web Services
 
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAmazon Web Services
 
Getting Started with Amazon Inspector - AWS June 2016 Webinar Series
Getting Started with Amazon Inspector - AWS June 2016 Webinar SeriesGetting Started with Amazon Inspector - AWS June 2016 Webinar Series
Getting Started with Amazon Inspector - AWS June 2016 Webinar SeriesAmazon Web Services
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionTom Laszewski
 
Planning the Migration to the Cloud - AWS India Summit 2012
Planning the Migration to the Cloud - AWS India Summit 2012Planning the Migration to the Cloud - AWS India Summit 2012
Planning the Migration to the Cloud - AWS India Summit 2012Amazon Web Services
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)Amazon Web Services
 
Why are agencies struggling to drive digital business strategy?
Why are agencies struggling to drive digital business strategy?Why are agencies struggling to drive digital business strategy?
Why are agencies struggling to drive digital business strategy?Ian Crocombe
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Sam Lakkundi
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)Amazon Web Services
 
Alessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet GovernanceAlessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet GovernanceAndrea Rossetti
 

Destaque (20)

(SEC324) NEW! Introducing Amazon Inspector
(SEC324) NEW! Introducing Amazon Inspector(SEC324) NEW! Introducing Amazon Inspector
(SEC324) NEW! Introducing Amazon Inspector
 
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
(BDT402) Delivering Business Agility Using AWS
(BDT402) Delivering Business Agility Using AWS(BDT402) Delivering Business Agility Using AWS
(BDT402) Delivering Business Agility Using AWS
 
Best Practices for Protecting Cloud Workloads - November 2016 Webinar Series
Best Practices for Protecting Cloud Workloads - November 2016 Webinar SeriesBest Practices for Protecting Cloud Workloads - November 2016 Webinar Series
Best Practices for Protecting Cloud Workloads - November 2016 Webinar Series
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
 
Mini curso - Ionic Framework
Mini curso - Ionic FrameworkMini curso - Ionic Framework
Mini curso - Ionic Framework
 
Introduction to AWS Enterprise Support
Introduction to AWS Enterprise SupportIntroduction to AWS Enterprise Support
Introduction to AWS Enterprise Support
 
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
 
Getting Started with Amazon Inspector - AWS June 2016 Webinar Series
Getting Started with Amazon Inspector - AWS June 2016 Webinar SeriesGetting Started with Amazon Inspector - AWS June 2016 Webinar Series
Getting Started with Amazon Inspector - AWS June 2016 Webinar Series
 
Amazon Inspector
Amazon InspectorAmazon Inspector
Amazon Inspector
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Planning the Migration to the Cloud - AWS India Summit 2012
Planning the Migration to the Cloud - AWS India Summit 2012Planning the Migration to the Cloud - AWS India Summit 2012
Planning the Migration to the Cloud - AWS India Summit 2012
 
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
AWS re:Invent 2016: Governance Strategies for Cloud Transformation (WWPS302)
 
Why are agencies struggling to drive digital business strategy?
Why are agencies struggling to drive digital business strategy?Why are agencies struggling to drive digital business strategy?
Why are agencies struggling to drive digital business strategy?
 
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
Gartner_CSC_The Era of Digital Transformation New Normal or Deja Vu_v4
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)
AWS re:Invent 2016: Preparing for a Large-Scale Migration to AWS (ENT212)
 
Alessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet GovernanceAlessandro Nicotra, Seminario Internet Governance
Alessandro Nicotra, Seminario Internet Governance
 
Social Media Strategy
Social Media StrategySocial Media Strategy
Social Media Strategy
 

Semelhante a (SEC321) Implementing Policy, Governance & Security for Enterprises

Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactivejerianasmith
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Private Cloud
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Chindala Murali
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
How to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationHow to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationEnterprise Management Associates
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptxBhagavathyPadmanabha1
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudMichael Elder
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud ManagementHCLSoftware
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsVikas Sahni
 

Semelhante a (SEC321) Implementing Policy, Governance & Security for Enterprises (20)

Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus InteractiveGet Informed About Cloud Computing for Enterprise IT by Opus Interactive
Get Informed About Cloud Computing for Enterprise IT by Opus Interactive
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
How to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationHow to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital Transformation
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx
 
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM CloudDevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
DevOps within the Hybrid Cloud Deploying to the VMware Platform on the IBM Cloud
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud Management
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

(SEC321) Implementing Policy, Governance & Security for Enterprises

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Kyle Falkenhagen, CSC Erik Winebrenner, CSC October 2015 SEC321 AWS for the Enterprise Implementing Policy, Governance, and Security for Enterprise Workloads
  • 2. What to Expect from the Session • Demonstrate enterprise policy, governance, and security capabilities that support the deployment and management of enterprise and industry applications on AWS using CSC’s Agility Platform • Demonstrate the value of blueprinting enterprise applications and environments • Demonstrate secure and managed connectivity to AWS • Present how CSC provides agile and consumption-based endpoint security for workloads in AWS providing enterprise management and 24x7 monitoring of workload compliance, vulnerabilities, and potential threats
  • 3. The Market Is Embracing an Application-Centric, Hybrid Cloud Model Business execs demand greater IT agility and innovation This is fostering greater adoption of hybrid cloud models 71% say their organizations need to embrace new technology or lose market share 47% of businesses are making technology and cloud decisions without getting the IT department involved … and sidestepping enterprise governance controls when central IT doesn’t deliver … and a shift to cloud platforms and apps, not just infrastructure Projected allocation of cloud spend 2013 – 2015 Hybrid 43% Private 25%Public 32%
  • 4. Forward-Thinking IT Organizations Are Adopting Hybrid Cloud Operating Models to Provide IT as a Service Virtualize Automation Hybrid Clouds IT as a Service Improve asset utilization and ROI Defer data center build- outs Launch initial private cloud Self-service access and on-demand provisioning Policy-driven cloud governance Compressed SDLC and tool chain automation IaaS and PaaS standardization Fully transparent and auditable service usage Broadly adopt utility cost model with chargeback Redundant service options with low switching costs Optimize variable-to- fixed costs by project Transparent linkage of demand, capacity, and costs
  • 5. • Accelerate AWS benefits to the enterprise, while ensuring compliance with IT standards, governance, and security requirements • Expand cloud service portfolios to enterprise platforms and apps (not just IaaS), available on a self-service, on-demand basis directly to the end users that need them • Rapidly obtain the benefits of hybrid environments using a pay-as-you-go OPEX model and CSC managed services, rather than attempt to build internally with scarce skills/capital +Amazon is the undisputed public cloud market share leader and is innovating faster than anyone else in public cloud. CSC has the market-leading cloud management and orchestration platform and strong expertise in enterprise application migration to cloud. CSC Enterprise Cloud Services For AWS The AWS and CSC Partnership
  • 6. INCLUDED: BizCloud BizCloud HC INCLUDED: Public Clouds Private Clouds Dev Test Prod IaaS Platforms Apps Store SDLC Tools CSC Agility Platform as a Service For AWS Manage/Govern Enterprise IT Services Across Hybrid Environments • Pay-as-you-go model • CSC Agility Platform provided as-a-Service • CSC-managed services including consolidated billing, helpdesk, and OS- level services • Integrated hybrid cyber-security model • Extensible policy engine for cloud governance • Cloud-portable blueprints for applications and platforms • Additional public and private cloud adapters available
  • 7. CLOUD-PORTABLE BLUEPRINTS POLICY-DRIVEN GOVERNANCE APPLICATION RELEASE AUTOMATION (ARA) Put platforms and apps in “cloud-portable blueprints.” Embed IT standards Use policies to automate governance/compliance, right sizing, right placement, etc. Consume cloud IT services not just from storefronts, but directly from SDLC tooling Accelerating Benefits Using CSC Agility Platform Others… BroadCloud Support CSC
  • 8. CSC Managed Hybrid Cloud Service The CSC Managed Hybrid Cloud service provides secure dedicated access between on-premises infrastructure and the AWS Cloud. IT organizations easily migrate workloads and take advantage of cost savings when allocating resources for dynamic projects. The CSC Managed Hybrid Cloud service integrates technology from AWS, Brocade, AT&T, and Intel: • AWS: Customers use AWS DirectConnect to establish private connectivity between AWS and data centers, offices, or colocation environments. • Brocade vRouter and the Brocade vADC: Provides additional secure access, reliability, advanced networking, and application performance across on-premises infrastructure into an AWS VPC using IPsec, vRouting, and application load balancing. Brocade leverages Data Plane Development Kit (DPDK) to deliver performance, boosting packet processing and throughput. • AT&T Netbond: Allows direct provisioning of 1G and 10G high-speed connections to an AWS VPC within the AWS cloud infrastructure and global availability zones. • Intel® Xeon® E5 processor: Enables Amazon EC2 to increase networking capabilities.
  • 9. CSC Hybrid Cloud Service – A Cloud Networking Strategy Foundation • Low-latency, on-net, fully redundant • Any-to-any, instant-on connectivity • Eliminate data center hairpin PERFORMANCE • Private IP address space avoids Internet/DDoS threats SECURITY • API controlled for on-demand adds and bandwidth changes AGILITY • Scales dynamically with cloud usage; elasticity creates added pricing value ELASTICITY • Save as much as 60% on networking • Cost model aligns with cloud usage COST-EFFECTIVENESS A network-enabled cloud solution with performance and security
  • 10. Big Data Platform as a Service APP 3 Flexible Deployment OptionsPublic Cloud Virtual Private Cloud Dedicated Cluster Enterprise Private Cloud CSC Big Data Platform as a Service APP 1 APP 2 REAL TIMEBATCH AD HOC Fully Managed as a Service Comprehensive, proactive infrastructure, and software management eliminates the most frustrating reason open source big data solutions fail: operational complexity. Big Data Expertise and Experience We have been working with Hadoop, Cassandra, and Mongo since 2011 and have implemented and managed more than 150 big data clusters. The Only PCI & HIPAA Compliance Certified SI Solution CSC is the first and only solutions integrator to meet stringent PCI and HIPAA certification standards with an open big data solution. Integrated Audit Monitoring and Comprehensive Security Every solution has comprehensive security activity and audit capabilities out of the box, and can be fully configured with the latest security features, from infrastructure to application. Real-Time, Streaming, and In-Memory Capabilities We have the broadest set of capabilities in the market, including deep expertise in installing, managing, and developing big and fast data analytics.
  • 11. Demo
  • 12. CSC Cybersecurity On-Demand Workload Protection Powered by CloudPassage
  • 13. Top Challenges Facing Cloud Customers: Why Should CSC’s Customers Care? • Increased scrutiny and responsibility following high-profile cloud breaches • New regulatory demands to better protect cloud-hosted data • Existing regulations increasingly applied to cloud environments • Require consistent security across workloads in an agile environment • Increased criminal attention on cloud assets due to their increased adoption • Greater threat to intellectual property as enterprises host off-premises • “Need to protect my cloud workloads at same level as my traditional systems” • Costs growing as internal IT security infrastructure expands • Expanding skilled resources required to manage security of cloud assets OPERATIONS ADVANCED THREATS RISK AND COMPLIANCE NEXT-GEN TECHNOLOGIES • Require visibility of all assets, regardless of location or cloud provider • Cloud expected to be cheaper than traditional — in reality, security bogs down cost, eliminates savings • Growing risk exposure as virtual workloads increase
  • 14. SUN MON TUE WED THU FRI SAT Hosted Intrusion Detection (HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Vulnerability Mgmt. Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Tech. Compliance (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Client Cost Implications in As-Is Model Cost of traditional cybersecurity solution relative to overall workload cost COST OF SECURITY IS OVERWHELMING PAY 100% REGARDLESS OF USAGE PAY FOR MULTIPLE SECURITY CONTROLS
  • 15. Self-Managed Cloud Workload Security Company A Public Private HR Payroll HIPAA Big Data Germany Production Dev/Test Production PCI Amazon Web Services Traditional IT Endpoint Security SIEM Vuln. Scanning Payroll HR HIPAASales Dev/Test Managed Workloads Rogue Systems Security Policies
  • 16. CSC Cloud Security Services On-Demand Workload Protection—Powered by CloudPassage Security Information and Event Management (SIEM) Pulse Advanced Reporting Policy Creation, Configuration, and Management Email-Based Alerting Account Setup and Management Complete Management of Cloud Workload Security Monitored (Optional) Consulting (Optional) Managed CSC CLOUD SECURITY SERVICES Configuration Security Monitoring Software Vulnerability Assessment Log-Based Intrusion Detection Workload Firewall Management System Account Management File Integrity Monitoring
  • 17. Meet All Critical Control Objectives Gain visibility into enterprise and individual asset security posture Uncover and manage vulnerabilities and configuration issues Get immediate reports showing open issues against CIS benchmarks Do this across an entire account or department, or by type of system Data Protection Compromise Management Operational Automation Visibility Strong Access Control Vulnerability Management Ultra- lightweight SaaS Based Workload-Level Security Micro- segmentation Instant On BENEFITS FEATURES
  • 18. Consumption-Based Pricing Lowers Operating Costs Cost of traditional cybersecurity solution relative to overall workload cost SUN MON TUE WED THU FRI SAT Hosted Intrusion Detection (HID) Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Vulnerability Mgmt. Costs (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Tech. Compliance (7 days) PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT PROTECT Customer Workload Costs (3 days) OFF OFF OFF WED THU FRI OFF SUN MON TUE WED THU FRI SAT On-Demand Workload Protection (3 days) OFF OFF OFF PROTECT PROTECT PROTECT OFF Customer Workload Costs (3 days) OFF OFF OFF WED THU FRI OFF Cost of On-Demand Workload Protection (OWP) ConsolidationbyOWP
  • 19. CSC-Managed Cloud Workload Security with OWP CSC Proprietary Pulse Portal Company A CSC Risk Management Center (RMC) Managed Workloads Rogue Systems Security Policies Public Private PayrollHR Dev / Test Germany PCI HIPAA Production Big Data Nodes
  • 20. Digital Trust: Your Future State CSC ON-DEMAND WORKLOAD PROTECTION Reduce cost and complexity Enable secure adoption of virtual technologies Evaluate compliance with regulatory requirements Provide full visibility across cloud workloads Securely harness cloud’s flexibility and consumption-based model Monitor and respond to threats 24x7x365
  • 21. Why CSC for On-Demand Workload Protection Global scale Threat intelligence 24x7 Global SOCs 1,000s of experts CSC named a Leader in IDC MarketScape Asia/Pacific Managed Security Services 2015 Vendor Assessment Consumption-based pricing — not just in technology, but for services Enterprise-grade management and scalability Customer/App/Regulation-specific policies 24x7x365 SIEM — monitoring and investigation Pulse Customer Portal
  • 22. We Understand Cybersecurity GLOBAL CYBERSECURITY PROFESSIONALS 2,000+ INTEGRATED GLOBAL RISK MANAGEMENT CENTERS 5+ YEARS PROVIDING CYBERSECURITY SERVICES 35+ GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE 15+ PUBLIC & PRIVATE SECTOR EXPERTISE Nearly 40 years of experience in delivering secure, managed enterprise services Successfully supporting the world’s most security- conscious clients, including aerospace and defense, and banking and financial institutions worldwide Helping 250+ clients manage risk and overcome the most extreme threats Integrated global Risk Management Centers IT security experts with in-depth experience End-to-end visibility of customer’s enterprise governance and compliance posture UK Noida Kuala Lumpur Sydney Newark
  • 23. CSC Proprietary Pulse Portal  24x7x365 visibility  Immediate access to detailed logs and incident data  Executive-oriented dashboard  Performance metrics  Simple user-querying methods  Correlation of incident and vulnerability data to provide enterprise-wide “Situational Awareness” EXAMPLE VIEWSPORTAL FEATURES
  • 24. Thank You! Stop by the CSC Booth (424)
  • 26. Thank you! For longer demos please visit the CSC (Booth 424) on the expo floor