SlideShare uma empresa Scribd logo
1 de 46
Cloud Computing
XaaS(Everything as a Service)
Security as a Service (SECaaS)
● Security as a Service (SECaaS) can most easily be described as a cloud
delivered model for outsourcing cybersecurity services.
● SECaaS provides security services on a subscription basis hosted by cloud
providers.
● Security as a Service solutions have become increasingly popular for
corporate infrastructures as a way to ease the in-house security team’s
responsibilities, scale security needs as the business grows, and avoid the
costs and maintenance of on-premise alternatives.
Benefits of SECaaS
Cost Savings
The Latest Security Tools and Updates
Faster Provisioning and Greater Agility
Free Up Resources
Security as a Service Examples
● Continuous Monitoring
● Data Loss Prevention (DLP)
● Business Continuity and Disaster
Recovery (BC/DR or BCDR)
● Email Security
● Antivirus Management
● Spam Filtering
● Identity and Access Management (IAM)
● Intrusion Protection
● Security Assessment
● Network Security
● Security Information and Event
Management (SIEM)
● Web Security
● Vulnerability Scanning
Identity management as a Service(IDaaS/IAMaaS)
● Identity Management as a Service (IdMaaS) is a cloud-based identity
management solution that allows customers to take advantage of identity
Management (IdM) technologies without having to invest in the underlying
hardware or applications.
● IdMaaS provides automate the management of user identities, access rights
and resources across multiple clouds, IT enviorments and applications. They
often provide break-through capabilities that are not available in traditional
applications
Identity management as a Service
● The architecture must provide a portable, pervasive identity across multiple
clouds.
● Identity and access management as a service builds on the basic idea of
software as a service (SaaS) that started in recent years, as vendors were
able to effectively "stream" services over the Web rather than provide them as
licensed software packages, such as in CDs and boxes.
● Network virtualization and the abstraction of hardware into logical tools further
accelerated this development.
● IAMaaS helps companies set up customized levels of security for an IT
architecture, either as a whole or in parts.
Identity management as a Service
● The essential idea is that a third-party service vendor sets up user identities
and determines what these individual users can do within a system.
● Like the old identity and access management tools, the way these services
work is through a complicated process of tagging and labeling individual
users and user behaviors, and then creating a detailed security authentication
for them.
Issues Faced by Industry
● Integrating cloud technologies with older, on-premises systems and centrally
managing governance of IT resources
● Controlling compliance costs associated with deploying flexible and scalable
cloud-based identity governance
● Demonstrating compliance with a growing number of regulatory requirements,
including new data privacy rules in the European Union.
IDMaaS Key Features
● Governance Platform. Supports compliance, provisioning and access
management processes across your organization by centralizing identity data and
providing a single location from which to model roles, policies and risk.
● Compliance Management. Streamlines execution of compliance controls and
improves audit performance by automating access certifications and policy
management.
● Lifecycle Management. Simplifies the process for creating, changing and
revoking access privileges by combining self-service access request and
password management with automated life-cycle event management for each
user.
● Identity Intelligence Services. Transforms technical identity data scattered
across multiple enterprise systems, or in the cloud, into centralized, easily
understood and business-relevant information.
Benefits of IdMaas
● Improved user productivity: Productivity improvement comes from
simplifying the sign-on interface and the ability to quickly change access
rights. Productivity is likely to improve further where you provide user self-
service.
● Improved customer and partner service: Customers and partners also
benefit from a more streamlined, secure process when accessing applications
and data.
● Reduced help desk costs: IT help desks typically experience fewer calls
about forgotten passwords when an identity management process is
implemented.
● Reduced IT costs: Identity management enables automatic provisioning,
providing or revoking users’ access rights to systems and applications.
Provisioning happens whether you automate it or not.
Attributes of IdMaaS Providers
● Compliance
● Access Provisioning and De-Provisioning
● User Self-Service
● Single Sign-On
● Integration with In-house IdM or Directories
● Security Around IdMaaS
● Setup and Running Costs
Database as a service (DBaaS)
● Database as a service (DBaaS) is a cloud computing managed service
offering that provides access to a database without requiring the setup of
physical hardware, the installation of software or the need to configure the
database.
● Most maintenance and administrative tasks are handled by the service
provider, freeing up users to quickly benefit from using the database.
Database as a service (DBaaS)
● DBaaS model is a fee-based subscription service in which the provider
maintains the physical infrastructure and database and delivers it as a private
cloud service.
● The service typically covers high-level administrative burdens such as
installation, initial configuration, maintenance and upgrades.
● Additional database administration (DBA) services, such as backup and
performance management may also be provided. Control over the content
and usage of the database is the responsibility of the customer.
DBaaS Categories
● DBaaS offerings are available for both relational and NoSQL database types.
Relational DBaaS offerings utilize an SQL database and are offered for
traditional database management systems (DBMS) like Db2, Oracle, SQL
Server and MySQL, as well as for cloud-only database systems like Amazon
RDS and Azure.
● NoSQL DBaaS offerings span multiple DBMS types, including graph,
document, wide column and key/value stores.
● Regardless of the type of cloud database, DBaaS offers elastic database
services for application development, test and production deployment,
typically with an easy to use web console and RESTful API.
DBaaS uses
● The DBaaS model is ideal for small to medium-sized businesses that do not
have well-staffed IT departments. Offloading the service and maintenance of
the database to the DBaaS provider enables small to medium-sized
businesses to implement applications and systems that they otherwise could
not afford to build and support on-premises.
● Workloads involving data with stringent regulatory requirements may not be
suitable for a DBaaS model. Furthermore, mission-critical applications that
require optimal performance and 99.999% of uptime may be better suited for
on-premises implementation.
● This is not to say that mission-critical workloads cannot run on cloud services,
but much of the DBaaS adoption to date has been for less crucial
applications, such as development and pilot programs.
Advantages of DBaaS
1. Reduced management requirements -- the DBaaS provider takes on many
management and administrative burdens.
2. Elimination of physical infrastructure -- the infrastructure required to run the
database is provided by the DBaaS provider.
3. Reduced IT costs -- users do not need to manage and plan for database
hardware upgrades.
4. Increased savings -- users do not need to invest in costly hardware, because
the physical infrastructure is no longer on premises. Additional savings can
also come from reduced capital expenditures, less staff, decreased electrical
costs and a smaller physical space.
Disadvantages of DBaaS
● Lack of control over the IT infrastructure is usually the most significant issue with
DBaaS versus an in-house solution. In a provider-managed infrastructure, an
organization's technicians do not have direct access to the servers and storage
used to run the database.
● If an organization's internet connection goes down, or if the system experiences
an outage at the service provider location, the organization will not have access to
its data until the service provider repairs the problem causing the outage.
● Security can also be a concern because it is controlled by the service provider
and an organization will not have direct influence over the physical safety of the
servers.
● Latency is another concern. The additional time required to access enterprise
data over the internet can cause performance issues. These performance issues
grow when loading large amounts of data, which tends to be slow and time-
consuming.
Storage as a Service
● Storage as a service (STaaS) is a managed service in which the provider
supplies the customer with access to a data storage platform.
● The service can be delivered on premises from infrastructure that is dedicated
to a single customer, or it can be delivered from the public cloud as a shared
service that's purchased by subscription and is billed according to one or
more usage metrics.
● Typical offerings include bare-metal storage capacity; raw storage volumes;
network file systems; storage objects; and storage applications that support
file sharing and backup lifecycle management.
Uses of STaaS
● Use STaaS for the ability to deploy resources at an instant or to replace some
existing storage space -- leaving room for on-premises storage hardware.
● Company would sign a service-level agreement (SLA) whereby the STaaS
provider agrees to rent storage space on a cost-per-gigabyte-stored and cost-
per-data-transfer basis, and the company's data would then be automatically
transferred at the specified time over the storage provider's proprietary wide
area network (WAN) or the internet.
● If the company's data were to ever become corrupt or get lost, the network
administrator could contact the STaaS provider and request a copy of the
data.
Storage as a service in cloud computing
● These storage methods include
○ backup and restore,
○ disaster recovery,
○ block storage,
○ SSD storage,
○ object storage
○ bulk data transfer
Storage as a service in cloud computing
● Backup and restore refers to the backing up of data to the cloud, which
provides protection in case of data loss.
● Disaster recovery may refer to protecting and replicating data from virtual
machines (VMs).
● Block storage enables customers to provision block storage volumes for
lower-latency I/O.
● SSD storage is another storage type that is typically used for intensive
read/write and I/O operations.
● Object storage systems are used in data analytics, disaster recovery and
cloud applications and tend to have high latency.
● Cold storage is used to create and configure stored data quickly.
● Bulk data transfers will use disks and other hardware to transfer data.
Advantages of STaaS
● Storage costs. Personnel, hardware and physical storage space expenses
are reduced.
● Disaster recovery. Having multiple copies of data stored in different locations
can better enable disaster recovery measures.
● Scalability. With most public cloud services, users only pay for the resources
that they use.
● Syncing. Files can be automatically synced across multiple devices.
● Security. Security can be both an advantage and a disadvantage, as security
methods may change per vendor. Data tends to be encrypted during
transmission and while at rest.
Disadvantages of STaaS
● Security. Users may end up transferring business-sensitive or mission-critical
data to the cloud, which makes it important to choose a service provider that's
reliable.
● Potential storage costs. If bandwidth limitations are exceeded, these could be
expensive.
● Potential downtimes. Vendors may go through periods of downtime where the
service is not available, which can be trouble for mission-critical data.
● Limited customization. Since the cloud infrastructure is owned and managed
by the service provider, it is less customizable.
● Potential for vendor lock-in. It may be difficult to migrate from one service to
another.
Examples of STaaS
Examples of STaaS vendors include Dell EMC, Hewlett Packard Enterprise
(HPE), NetApp and IBM. Dell EMC provides Isilon NAS storage, EMC Unity
hybrid-flash storage and other storage options. HPE has an equally large, if not
larger, presence in storage systems compared to Dell EMC.
Collaboration as a services
● Enterprise customers increasingly depend on a mixture of voice, video,
messaging, customer care, web conferencing, and telepresence services to
collaborate internally and keep in touch with their customer bases.
● The diversity of these collaborative channels means that customers’ IT
professionals need to be expert with many different technology solutions.
● These solutions are always changing and getting better, with more services
and richer capabilities.
● All of this adds up to significant CapEx and OpEx spend.
CaaS provides complete range of collaboration services—including voice, video,
messaging, customer care, and web conferencing—as a service with a simple
peruser, per-month consumption model.
CaaS enables customers to move to an OpEx model and pay only for the services
they really need and use.
CaaS Outcomes
The expected outcomes of CaaS include:
● A clear shift to an OpEx model rather than a CapEx model for the prospect or
customer
● Superior technology that underscores an enterprise’s core collaborative
needs
● Broad service assurance with always-available collaboration services from
anywhere and at any time
● A consultative relationship in which CMS works hard to partner with the
customer to optimize the infrastructure and extract as much value as possible
from the CaaS investment
CaaS Use cases
● Customer with operational needs
● Customer with technology adoption needs
● Customer with transformational needs
CaaS
Advantages
Disadvantages
Compliance as Service
● Cloud compliance issues occur as any cloud consumer make use of cloud
storage and backup services.
● Cloud computing by its very nature extents various jurisdictions.
● For Example, The laws of the country of request from where it originates
many not necessarily match the laws of the country in which the request is
being processed, and probably laws of neither location match the laws of the
country in which the service is delivered.
● Compliance is beyond than a basically provided an unidentified service token
to an identity so that access to a resource can be obtain.
● Compliance is a difficult issue which needs considerable expertise.
Compliance as Service
● A Compliance as a Service may be needed to be able to manage cloud
relationships, comprehend security rules and procedures, know how to
operate data and administer privacy, deliver an incidence feedback, archive,
and enable the system to be queried.
● A well-implemented Compliance as a Service may measure the risk of
servicing compliance and ensure or indemnify tenancy against that risk.
● Compliance as a Service can be brought to bear as mechanism to guarantee
that an e-mail conformed to particular standards, anything which may be new
electronic service of a network of national postal system and something which
may help in ending the scourge of spam.
Compliance as Service
The major services that should provided additionally in a Compliance as a Service (CaaS) offering:
● Database access control
● Separation of duties
● Annual risk assessment
● Application management
● Change control
● Data discovery
● Data masking
● Incident response
● Policy creation and enforcement
● Real-time data protection
● Repair of vulnerabilities
● Personnel training
● Service configuration
Advantages of Compliance as a Service (CaaS)
● In cloud, Encryption is quite arduous to track which is simplified by the
Compliance as a Service. To fulfill the needs of end user and organizations
around governance including compliance, they use a cloud provider’s service.
These services deliver pre-built behaviors with specific regulations, such as
needed encryption levels.
● Compliance as a Services are configurable i.e. no development is required.
This is cost effective for the organizations and it reduce the maintenance
along with changing regulations, as well as internal and external policies of
the corporations.
Disadvantages of Compliance as a Service (CaaS)
● Cloud service consumers will be held responsible for any issues with the
compliance services. Its mandatory that customer validate the compliance
services to ensure that there are no issues.
● It is impossible to Compliance as a Service providers to support all the
regulations among all the countries. Also, as all the services are cloud based
then there is always a risk that providers will stop to providing the services at
any time because of low uses of their services. So, end-user and organization
become dependent on service providers. Overall these are some critical
aspects which falls under drawbacks of CaaS.
Communication as a Service
● Communications as a service (CaaS) is a collection of different vendor
services that facilitate business communications. Organizations may use
these and similar services to lower costs and increase efficiency for business
processes involving audio or video telecommunications.
● Communications as a service is part of a larger category of services known
as software as a service (SaaS), in which vendors offer software products
and services over the Internet.
● It is also an alternative to the traditional model of buying and installing
licensed software on site.
Communications as a service
● The core concept of Communications as a service is that accessing these
services over the internet is extremely convenient.
● The client businesses do not have to worry about maintaining servers and
connections, uploading different kinds of content or doing all of the
administrative work involved in keeping a communications platform functional.
● Business users just sign in and use the services. Types of Communications
as a service include Voice over Internet Protocol (VoIP) or internet telephone
solutions, and video conferencing services.
Communications as a service
● Businesses have designed specific video conferencing products in which
users can sign via the Internet and participate as necessary.
● Vendors can then bill the business according to its participation.
● The convenience and utility of CaaS and similar services are rapidly
expanding the business world.
● It is part of a greater trend toward cloud computing services and other remote
services used by businesses to reduce overhead or optimize business
processes.
Monitoring as a service (MaaS)
● Monitoring as a service (MaaS) is one of many cloud delivery models under
anything as a service (XaaS).
● It is a framework that facilitates the deployment of monitoring functionalities
for various other services and applications within the cloud.
● The most common application for MaaS is online state monitoring, which
continuously tracks certain states of applications, networks, systems,
instances or any element that may be deployable within the cloud
MaaS
MaaS offerings consist of multiple tools and applications meant to monitor a
certain aspect of an application, server, system or any other IT component.
There is a need for proper data collection, especially of the performance and real-
time statistics of IT components, in order to make proper and informed
management possible.
The tools being offered by MaaS providers may vary in some ways, but there are
very basic monitoring schemes that have become ad hoc standards simply
because of their benefits.
MaaS
● State monitoring is one of them, and has become the most widely used feature.
● It is the overall monitoring of a component in relation to a set metric or standard.
In state monitoring, a certain aspect of a component is constantly evaluated, and
results are usually displayed in real time or periodically updated as a report.
● For example, the overall timeout requests measured in a period of time might be
evaluated to see if this deviates from what's considered an acceptable value.
Administrators can later take action to rectify faults or even respond in real time.
● State monitoring is very powerful because notifications now come in almost every
form, from emails and text messages to various social media alerts like a tweet or
a status update on Facebook.
Network as a Service
● Network as a service (NaaS) is a business model for delivering enterprise-
wide area network services virtually on a subscription basis.
● Configuring and operating routers and protocols, WAN optimizers and other
components, such as firewalls or software-defined-WAN endpoints, can be
complicated. With NaaS, those responsibilities are handled by a third-party
provider and then made available to enterprise customers.
Network as a Service
● The functionality of the infrastructure may be included in a single NaaS flat
fee, or the business may individually subscribe to each service, which can
include optimization, firewall -- or other security -- and SD-WAN, depending
on the service provider.
● Some NaaS providers have specific focus areas, like ultra-secure
connectivity, ultra-simple configuration, or providing services to mobile and
temporary locations
Network as a Service
● Small or midsize businesses are the classic NaaS buyers, especially those
with no existing investment in a WAN.
● With the rise of so many other as a service models in the last 10 years,
however, larger organizations have become more interested in the option.
● NaaS can be especially appealing to new business owners because it avoids
a lot of the capital investment expense for network hardware
Network as a Service
● NaaS also reduces the amount of staff time required to maintain the network
and reduces the level of training and skill required of network staff.
● With NaaS, the network essentially becomes another utility you pay for, like
the electricity, water or heat.
● In the NaaS business model, IT staff manage the organization's network
through a portal rather than through a patchwork of network management
tools and stacks of hardware.
● A new location can be added to the organization's WAN by connecting it to
the NaaS provider's nearest point of presence (POP) either directly through a
leased line to a nearby data center or over the internet.
Benefits of NaaS
● Because NaaS minimizes capital investment, as well as staff time
commitment, the business model is growing, thanks in large part to the rise of
SD-WAN. One of the primary business concerns about NaaS is resilience --
guaranteeing uptime to a location.
● Uptime concerns are addressed because SD-WAN technologies make it
simple to use multiple network links to provide connectivity back to the NaaS
backbone -- and potentially directly to other NaaS sites across the internet.
SD-WAN technology also helps resolve concerns over traffic engineering for
demanding applications like VoIP.
● For these and other reasons, NaaS vendors often emphasize SD-WAN
functionality in addition to the simplicity of deployment and management at
the heart of the NaaS model.
Additional NaaS considerations
● Other NaaS concerns organizations must address include how to deal with
service-level agreements (SLAs), which are more common to NaaS in cloud
services, and how to handle compliance issues related to data sovereignty.
● The question of who manages the last-mile connectivity that links each site to
the nearest POP can be handled by the NaaS provider as part of the service,
or it may be the responsibility of the customer.

Mais conteúdo relacionado

Semelhante a Cloud Computing (1).pptx

Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control Auditing
Navin Malhotra
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
SURBHI SAROHA
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
Agora Group
 
CloudComputing
CloudComputingCloudComputing
CloudComputing
Adi Challa
 

Semelhante a Cloud Computing (1).pptx (20)

CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Unit 2 part 1.pptx
Unit 2 part 1.pptxUnit 2 part 1.pptx
Unit 2 part 1.pptx
 
Unit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdfUnit 3 Cloud Computing.pdf
Unit 3 Cloud Computing.pdf
 
Cloud Computing & Control Auditing
Cloud Computing & Control AuditingCloud Computing & Control Auditing
Cloud Computing & Control Auditing
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
CirrusDB Offerings
CirrusDB OfferingsCirrusDB Offerings
CirrusDB Offerings
 
What is cloud computing
What is cloud computing What is cloud computing
What is cloud computing
 
Cloud Migration headache? Ease the pain with Data Virtualization! (EMEA)
Cloud Migration headache? Ease the pain with Data Virtualization! (EMEA)Cloud Migration headache? Ease the pain with Data Virtualization! (EMEA)
Cloud Migration headache? Ease the pain with Data Virtualization! (EMEA)
 
Analysis of Cloud Services
Analysis of Cloud ServicesAnalysis of Cloud Services
Analysis of Cloud Services
 
Introduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptxIntroduction to Cloud Computing(UNIT 1).pptx
Introduction to Cloud Computing(UNIT 1).pptx
 
vVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan ToddvVols and Your Cloud Operating Model with Tristan Todd
vVols and Your Cloud Operating Model with Tristan Todd
 
Cloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptxCloud Fundamentals PPT.pptx
Cloud Fundamentals PPT.pptx
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
SaaS Application Scalability: Best Practices from Architecture to Cloud Infra...
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
CloudComputing
CloudComputingCloudComputing
CloudComputing
 
Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.
 
Dimension Data Cloud Services Portfolio
Dimension Data Cloud Services PortfolioDimension Data Cloud Services Portfolio
Dimension Data Cloud Services Portfolio
 

Último

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Último (20)

Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

Cloud Computing (1).pptx

  • 2. Security as a Service (SECaaS) ● Security as a Service (SECaaS) can most easily be described as a cloud delivered model for outsourcing cybersecurity services. ● SECaaS provides security services on a subscription basis hosted by cloud providers. ● Security as a Service solutions have become increasingly popular for corporate infrastructures as a way to ease the in-house security team’s responsibilities, scale security needs as the business grows, and avoid the costs and maintenance of on-premise alternatives.
  • 3. Benefits of SECaaS Cost Savings The Latest Security Tools and Updates Faster Provisioning and Greater Agility Free Up Resources
  • 4. Security as a Service Examples ● Continuous Monitoring ● Data Loss Prevention (DLP) ● Business Continuity and Disaster Recovery (BC/DR or BCDR) ● Email Security ● Antivirus Management ● Spam Filtering ● Identity and Access Management (IAM) ● Intrusion Protection ● Security Assessment ● Network Security ● Security Information and Event Management (SIEM) ● Web Security ● Vulnerability Scanning
  • 5. Identity management as a Service(IDaaS/IAMaaS) ● Identity Management as a Service (IdMaaS) is a cloud-based identity management solution that allows customers to take advantage of identity Management (IdM) technologies without having to invest in the underlying hardware or applications. ● IdMaaS provides automate the management of user identities, access rights and resources across multiple clouds, IT enviorments and applications. They often provide break-through capabilities that are not available in traditional applications
  • 6. Identity management as a Service ● The architecture must provide a portable, pervasive identity across multiple clouds. ● Identity and access management as a service builds on the basic idea of software as a service (SaaS) that started in recent years, as vendors were able to effectively "stream" services over the Web rather than provide them as licensed software packages, such as in CDs and boxes. ● Network virtualization and the abstraction of hardware into logical tools further accelerated this development. ● IAMaaS helps companies set up customized levels of security for an IT architecture, either as a whole or in parts.
  • 7. Identity management as a Service ● The essential idea is that a third-party service vendor sets up user identities and determines what these individual users can do within a system. ● Like the old identity and access management tools, the way these services work is through a complicated process of tagging and labeling individual users and user behaviors, and then creating a detailed security authentication for them.
  • 8. Issues Faced by Industry ● Integrating cloud technologies with older, on-premises systems and centrally managing governance of IT resources ● Controlling compliance costs associated with deploying flexible and scalable cloud-based identity governance ● Demonstrating compliance with a growing number of regulatory requirements, including new data privacy rules in the European Union.
  • 9. IDMaaS Key Features ● Governance Platform. Supports compliance, provisioning and access management processes across your organization by centralizing identity data and providing a single location from which to model roles, policies and risk. ● Compliance Management. Streamlines execution of compliance controls and improves audit performance by automating access certifications and policy management. ● Lifecycle Management. Simplifies the process for creating, changing and revoking access privileges by combining self-service access request and password management with automated life-cycle event management for each user. ● Identity Intelligence Services. Transforms technical identity data scattered across multiple enterprise systems, or in the cloud, into centralized, easily understood and business-relevant information.
  • 10. Benefits of IdMaas ● Improved user productivity: Productivity improvement comes from simplifying the sign-on interface and the ability to quickly change access rights. Productivity is likely to improve further where you provide user self- service. ● Improved customer and partner service: Customers and partners also benefit from a more streamlined, secure process when accessing applications and data. ● Reduced help desk costs: IT help desks typically experience fewer calls about forgotten passwords when an identity management process is implemented. ● Reduced IT costs: Identity management enables automatic provisioning, providing or revoking users’ access rights to systems and applications. Provisioning happens whether you automate it or not.
  • 11. Attributes of IdMaaS Providers ● Compliance ● Access Provisioning and De-Provisioning ● User Self-Service ● Single Sign-On ● Integration with In-house IdM or Directories ● Security Around IdMaaS ● Setup and Running Costs
  • 12. Database as a service (DBaaS) ● Database as a service (DBaaS) is a cloud computing managed service offering that provides access to a database without requiring the setup of physical hardware, the installation of software or the need to configure the database. ● Most maintenance and administrative tasks are handled by the service provider, freeing up users to quickly benefit from using the database.
  • 13. Database as a service (DBaaS) ● DBaaS model is a fee-based subscription service in which the provider maintains the physical infrastructure and database and delivers it as a private cloud service. ● The service typically covers high-level administrative burdens such as installation, initial configuration, maintenance and upgrades. ● Additional database administration (DBA) services, such as backup and performance management may also be provided. Control over the content and usage of the database is the responsibility of the customer.
  • 14. DBaaS Categories ● DBaaS offerings are available for both relational and NoSQL database types. Relational DBaaS offerings utilize an SQL database and are offered for traditional database management systems (DBMS) like Db2, Oracle, SQL Server and MySQL, as well as for cloud-only database systems like Amazon RDS and Azure. ● NoSQL DBaaS offerings span multiple DBMS types, including graph, document, wide column and key/value stores. ● Regardless of the type of cloud database, DBaaS offers elastic database services for application development, test and production deployment, typically with an easy to use web console and RESTful API.
  • 15. DBaaS uses ● The DBaaS model is ideal for small to medium-sized businesses that do not have well-staffed IT departments. Offloading the service and maintenance of the database to the DBaaS provider enables small to medium-sized businesses to implement applications and systems that they otherwise could not afford to build and support on-premises. ● Workloads involving data with stringent regulatory requirements may not be suitable for a DBaaS model. Furthermore, mission-critical applications that require optimal performance and 99.999% of uptime may be better suited for on-premises implementation. ● This is not to say that mission-critical workloads cannot run on cloud services, but much of the DBaaS adoption to date has been for less crucial applications, such as development and pilot programs.
  • 16. Advantages of DBaaS 1. Reduced management requirements -- the DBaaS provider takes on many management and administrative burdens. 2. Elimination of physical infrastructure -- the infrastructure required to run the database is provided by the DBaaS provider. 3. Reduced IT costs -- users do not need to manage and plan for database hardware upgrades. 4. Increased savings -- users do not need to invest in costly hardware, because the physical infrastructure is no longer on premises. Additional savings can also come from reduced capital expenditures, less staff, decreased electrical costs and a smaller physical space.
  • 17. Disadvantages of DBaaS ● Lack of control over the IT infrastructure is usually the most significant issue with DBaaS versus an in-house solution. In a provider-managed infrastructure, an organization's technicians do not have direct access to the servers and storage used to run the database. ● If an organization's internet connection goes down, or if the system experiences an outage at the service provider location, the organization will not have access to its data until the service provider repairs the problem causing the outage. ● Security can also be a concern because it is controlled by the service provider and an organization will not have direct influence over the physical safety of the servers. ● Latency is another concern. The additional time required to access enterprise data over the internet can cause performance issues. These performance issues grow when loading large amounts of data, which tends to be slow and time- consuming.
  • 18. Storage as a Service ● Storage as a service (STaaS) is a managed service in which the provider supplies the customer with access to a data storage platform. ● The service can be delivered on premises from infrastructure that is dedicated to a single customer, or it can be delivered from the public cloud as a shared service that's purchased by subscription and is billed according to one or more usage metrics. ● Typical offerings include bare-metal storage capacity; raw storage volumes; network file systems; storage objects; and storage applications that support file sharing and backup lifecycle management.
  • 19. Uses of STaaS ● Use STaaS for the ability to deploy resources at an instant or to replace some existing storage space -- leaving room for on-premises storage hardware. ● Company would sign a service-level agreement (SLA) whereby the STaaS provider agrees to rent storage space on a cost-per-gigabyte-stored and cost- per-data-transfer basis, and the company's data would then be automatically transferred at the specified time over the storage provider's proprietary wide area network (WAN) or the internet. ● If the company's data were to ever become corrupt or get lost, the network administrator could contact the STaaS provider and request a copy of the data.
  • 20. Storage as a service in cloud computing ● These storage methods include ○ backup and restore, ○ disaster recovery, ○ block storage, ○ SSD storage, ○ object storage ○ bulk data transfer
  • 21. Storage as a service in cloud computing ● Backup and restore refers to the backing up of data to the cloud, which provides protection in case of data loss. ● Disaster recovery may refer to protecting and replicating data from virtual machines (VMs). ● Block storage enables customers to provision block storage volumes for lower-latency I/O. ● SSD storage is another storage type that is typically used for intensive read/write and I/O operations. ● Object storage systems are used in data analytics, disaster recovery and cloud applications and tend to have high latency. ● Cold storage is used to create and configure stored data quickly. ● Bulk data transfers will use disks and other hardware to transfer data.
  • 22. Advantages of STaaS ● Storage costs. Personnel, hardware and physical storage space expenses are reduced. ● Disaster recovery. Having multiple copies of data stored in different locations can better enable disaster recovery measures. ● Scalability. With most public cloud services, users only pay for the resources that they use. ● Syncing. Files can be automatically synced across multiple devices. ● Security. Security can be both an advantage and a disadvantage, as security methods may change per vendor. Data tends to be encrypted during transmission and while at rest.
  • 23. Disadvantages of STaaS ● Security. Users may end up transferring business-sensitive or mission-critical data to the cloud, which makes it important to choose a service provider that's reliable. ● Potential storage costs. If bandwidth limitations are exceeded, these could be expensive. ● Potential downtimes. Vendors may go through periods of downtime where the service is not available, which can be trouble for mission-critical data. ● Limited customization. Since the cloud infrastructure is owned and managed by the service provider, it is less customizable. ● Potential for vendor lock-in. It may be difficult to migrate from one service to another.
  • 24. Examples of STaaS Examples of STaaS vendors include Dell EMC, Hewlett Packard Enterprise (HPE), NetApp and IBM. Dell EMC provides Isilon NAS storage, EMC Unity hybrid-flash storage and other storage options. HPE has an equally large, if not larger, presence in storage systems compared to Dell EMC.
  • 25. Collaboration as a services ● Enterprise customers increasingly depend on a mixture of voice, video, messaging, customer care, web conferencing, and telepresence services to collaborate internally and keep in touch with their customer bases. ● The diversity of these collaborative channels means that customers’ IT professionals need to be expert with many different technology solutions. ● These solutions are always changing and getting better, with more services and richer capabilities. ● All of this adds up to significant CapEx and OpEx spend.
  • 26. CaaS provides complete range of collaboration services—including voice, video, messaging, customer care, and web conferencing—as a service with a simple peruser, per-month consumption model. CaaS enables customers to move to an OpEx model and pay only for the services they really need and use.
  • 27. CaaS Outcomes The expected outcomes of CaaS include: ● A clear shift to an OpEx model rather than a CapEx model for the prospect or customer ● Superior technology that underscores an enterprise’s core collaborative needs ● Broad service assurance with always-available collaboration services from anywhere and at any time ● A consultative relationship in which CMS works hard to partner with the customer to optimize the infrastructure and extract as much value as possible from the CaaS investment
  • 28. CaaS Use cases ● Customer with operational needs ● Customer with technology adoption needs ● Customer with transformational needs
  • 30. Compliance as Service ● Cloud compliance issues occur as any cloud consumer make use of cloud storage and backup services. ● Cloud computing by its very nature extents various jurisdictions. ● For Example, The laws of the country of request from where it originates many not necessarily match the laws of the country in which the request is being processed, and probably laws of neither location match the laws of the country in which the service is delivered. ● Compliance is beyond than a basically provided an unidentified service token to an identity so that access to a resource can be obtain. ● Compliance is a difficult issue which needs considerable expertise.
  • 31. Compliance as Service ● A Compliance as a Service may be needed to be able to manage cloud relationships, comprehend security rules and procedures, know how to operate data and administer privacy, deliver an incidence feedback, archive, and enable the system to be queried. ● A well-implemented Compliance as a Service may measure the risk of servicing compliance and ensure or indemnify tenancy against that risk. ● Compliance as a Service can be brought to bear as mechanism to guarantee that an e-mail conformed to particular standards, anything which may be new electronic service of a network of national postal system and something which may help in ending the scourge of spam.
  • 32. Compliance as Service The major services that should provided additionally in a Compliance as a Service (CaaS) offering: ● Database access control ● Separation of duties ● Annual risk assessment ● Application management ● Change control ● Data discovery ● Data masking ● Incident response ● Policy creation and enforcement ● Real-time data protection ● Repair of vulnerabilities ● Personnel training ● Service configuration
  • 33. Advantages of Compliance as a Service (CaaS) ● In cloud, Encryption is quite arduous to track which is simplified by the Compliance as a Service. To fulfill the needs of end user and organizations around governance including compliance, they use a cloud provider’s service. These services deliver pre-built behaviors with specific regulations, such as needed encryption levels. ● Compliance as a Services are configurable i.e. no development is required. This is cost effective for the organizations and it reduce the maintenance along with changing regulations, as well as internal and external policies of the corporations.
  • 34. Disadvantages of Compliance as a Service (CaaS) ● Cloud service consumers will be held responsible for any issues with the compliance services. Its mandatory that customer validate the compliance services to ensure that there are no issues. ● It is impossible to Compliance as a Service providers to support all the regulations among all the countries. Also, as all the services are cloud based then there is always a risk that providers will stop to providing the services at any time because of low uses of their services. So, end-user and organization become dependent on service providers. Overall these are some critical aspects which falls under drawbacks of CaaS.
  • 35. Communication as a Service ● Communications as a service (CaaS) is a collection of different vendor services that facilitate business communications. Organizations may use these and similar services to lower costs and increase efficiency for business processes involving audio or video telecommunications. ● Communications as a service is part of a larger category of services known as software as a service (SaaS), in which vendors offer software products and services over the Internet. ● It is also an alternative to the traditional model of buying and installing licensed software on site.
  • 36. Communications as a service ● The core concept of Communications as a service is that accessing these services over the internet is extremely convenient. ● The client businesses do not have to worry about maintaining servers and connections, uploading different kinds of content or doing all of the administrative work involved in keeping a communications platform functional. ● Business users just sign in and use the services. Types of Communications as a service include Voice over Internet Protocol (VoIP) or internet telephone solutions, and video conferencing services.
  • 37. Communications as a service ● Businesses have designed specific video conferencing products in which users can sign via the Internet and participate as necessary. ● Vendors can then bill the business according to its participation. ● The convenience and utility of CaaS and similar services are rapidly expanding the business world. ● It is part of a greater trend toward cloud computing services and other remote services used by businesses to reduce overhead or optimize business processes.
  • 38. Monitoring as a service (MaaS) ● Monitoring as a service (MaaS) is one of many cloud delivery models under anything as a service (XaaS). ● It is a framework that facilitates the deployment of monitoring functionalities for various other services and applications within the cloud. ● The most common application for MaaS is online state monitoring, which continuously tracks certain states of applications, networks, systems, instances or any element that may be deployable within the cloud
  • 39. MaaS MaaS offerings consist of multiple tools and applications meant to monitor a certain aspect of an application, server, system or any other IT component. There is a need for proper data collection, especially of the performance and real- time statistics of IT components, in order to make proper and informed management possible. The tools being offered by MaaS providers may vary in some ways, but there are very basic monitoring schemes that have become ad hoc standards simply because of their benefits.
  • 40. MaaS ● State monitoring is one of them, and has become the most widely used feature. ● It is the overall monitoring of a component in relation to a set metric or standard. In state monitoring, a certain aspect of a component is constantly evaluated, and results are usually displayed in real time or periodically updated as a report. ● For example, the overall timeout requests measured in a period of time might be evaluated to see if this deviates from what's considered an acceptable value. Administrators can later take action to rectify faults or even respond in real time. ● State monitoring is very powerful because notifications now come in almost every form, from emails and text messages to various social media alerts like a tweet or a status update on Facebook.
  • 41. Network as a Service ● Network as a service (NaaS) is a business model for delivering enterprise- wide area network services virtually on a subscription basis. ● Configuring and operating routers and protocols, WAN optimizers and other components, such as firewalls or software-defined-WAN endpoints, can be complicated. With NaaS, those responsibilities are handled by a third-party provider and then made available to enterprise customers.
  • 42. Network as a Service ● The functionality of the infrastructure may be included in a single NaaS flat fee, or the business may individually subscribe to each service, which can include optimization, firewall -- or other security -- and SD-WAN, depending on the service provider. ● Some NaaS providers have specific focus areas, like ultra-secure connectivity, ultra-simple configuration, or providing services to mobile and temporary locations
  • 43. Network as a Service ● Small or midsize businesses are the classic NaaS buyers, especially those with no existing investment in a WAN. ● With the rise of so many other as a service models in the last 10 years, however, larger organizations have become more interested in the option. ● NaaS can be especially appealing to new business owners because it avoids a lot of the capital investment expense for network hardware
  • 44. Network as a Service ● NaaS also reduces the amount of staff time required to maintain the network and reduces the level of training and skill required of network staff. ● With NaaS, the network essentially becomes another utility you pay for, like the electricity, water or heat. ● In the NaaS business model, IT staff manage the organization's network through a portal rather than through a patchwork of network management tools and stacks of hardware. ● A new location can be added to the organization's WAN by connecting it to the NaaS provider's nearest point of presence (POP) either directly through a leased line to a nearby data center or over the internet.
  • 45. Benefits of NaaS ● Because NaaS minimizes capital investment, as well as staff time commitment, the business model is growing, thanks in large part to the rise of SD-WAN. One of the primary business concerns about NaaS is resilience -- guaranteeing uptime to a location. ● Uptime concerns are addressed because SD-WAN technologies make it simple to use multiple network links to provide connectivity back to the NaaS backbone -- and potentially directly to other NaaS sites across the internet. SD-WAN technology also helps resolve concerns over traffic engineering for demanding applications like VoIP. ● For these and other reasons, NaaS vendors often emphasize SD-WAN functionality in addition to the simplicity of deployment and management at the heart of the NaaS model.
  • 46. Additional NaaS considerations ● Other NaaS concerns organizations must address include how to deal with service-level agreements (SLAs), which are more common to NaaS in cloud services, and how to handle compliance issues related to data sovereignty. ● The question of who manages the last-mile connectivity that links each site to the nearest POP can be handled by the NaaS provider as part of the service, or it may be the responsibility of the customer.