SlideShare uma empresa Scribd logo
1 de 29
SIKKERHET I SKYEN Ole Tom Seierstad Chief Security Advisor Microsoft Norge AS oles@microsoft.com
Hva er cloud? Komplette IT løsninger kan kjøres på én sentral tjener og at de tilgjengeliggjøres via internett på en rekke ulike enheter. Dette er hva vi kaller  “Cloud Computing”.
Cloud computing er en del avløsnigen Skybaserte løsninger gir IT-ressurser, som en tjeneste, på en dynamisk og skalerbar måte over et nettverk.  Fem viktige egenskaper Tjenestertilgjenglig for selvbetjening God tilgangtilnettet Delingavressurser (Resource pool) Raskemuligheter for endringer Målingavresultater CLOUD Web Client-Server Mainframe  4
Web Apps
Tilbakemeldingerfrabrukere Reduserekostnader ØkteffektivitetogGrønn IT Øktkundeog partner kontaktsamtbedrekundeopplevelse 6
Trender - FLEKSIBILITET
Trender - Fleksibilitet
Trender – Nye måter å arbeide på – regelverk
Kriminellefra “Cool...”
Til “Cash”
Tilpassningavnettverket
Tilpassning av nettverket
Tilpassning av nettverket
Sikkerhet er en nødvendighet
Sikkerhet er en nødvendighet
ULIKE implementeringer for CLOUD Computing Flytt hele løsningen til skyen Kjør deler av programmvaren i skyen Lagring av data i skyen Lag nye løsninger ved å kombinere ulke  Cloud Services Utvikle helt nye skybaserte løsninger
Ulike modeller – fra Offentlig til private skyløsninger Pålokaleservere Privat sky Offentlig sky Tilgjenglighetpåulikeenheter
Informasjon er under leverandørens kontroll Ikkebegrensetavgeografiogplassering Endringer i IT prosesser Leverandøren kan ha bedre sikkerhets prosesser og rutiner Fysisk sikkerhet vil bli administrert av sky-leverandøren Utfordringer med juridisksuverenitet Sentralisert lagring av data Økonomisk skalerbarhet Attraktiv for kriminelle Personvern utfordringer Forensics/etterforskning Muligheter og utfordringer
Vurderinger av sikkerhet i SKYEN
Compliance is still the duty of the Customer Sound Risk Management encompassing the Cloud is needed Collaboration between Customer and Provider is essential Need of a certain level of Process Transparency Strong Internal Team needed Contract Negotiation Definition of Controls and Metrics Integration of Controls into own processes Compliance and Risk Management Compliance requirements can be fulfilled by a skilled internal team and a certain level of process transparency by the cloud provider(s).
Cross-Domain Collaboration requires secure identities People and Devices Based on In-Person Proofing or similar Claims-Based Based on interoperable standards Privacy vs. Authentication has to be balanced Processes have to be able to include several providers Identity and Access Management Any digital identity system for the cloud has to be interoperable across different organisations and cloud providers and based on strong processes.
Service Engineering and Development Strong and Transparent Engineering Processes Needed Requirements Design Implementation Verification Release Response Proofed Based on Threat Models or similar Service Integrity The provider should follow a clear, defined, and provable process to integrate security and privacy in the service from the beginning and for the whole lifecycle.
Service Delivery Internal processes have to be able to cover multiple provider Security Monitoring Auditing Forensics Incident response Business Continuity Etc. Requirements depend on application and information needs Service Integrity The service delivery capabilities of the provider and the security management and auditing needs of the customer must be aligned.
Is part of the delivery chain Often subject to social engineering attacks (and similar) Review today’s processes and policies Endpoint Integrity It is very important to include the end point in any security consideration for cloud-based services.
Data Classification is the foundation Requirements Legal Needs Persistent Data Protection needed Encryption/Rights Management Has to cover the whole transaction Data in transit «New» Challenges Data Sovereignty Access to Information Data Partitioning and Processing Information Protection Implemented Data Classification helps to decide which data is ready for the cloud, under which circumstances, and with which controls.
Well-Functioning Risk and Compliance Programs are a must Data classification is the base Choose the right Deployment Model (Private, Community, or Public) Strong, cloud trained, Internal Team still needed Process Transparency, Compliance Controls, and Auditability by the Provider Implement a Secure Development Lifecycle and evaluate the Provider and their vendors as well Stronger federated identity and access controls  Information Lifecycle Controls Access controls to operate across organisational boundaries without surrendering identity ownership Recommendations
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation.  Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.  MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Mais conteúdo relacionado

Mais procurados

Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureSABSAcourses
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4Activo Consulting
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingClinton DSouza
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security PlaybookIntel IT Center
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?Activo Consulting
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 

Mais procurados (20)

Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
Vulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computingVulnerabilities in SaaS layer of cloud computing
Vulnerabilities in SaaS layer of cloud computing
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
ITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORKITIL4 - DIGITAL TRUST FRAMEWORK
ITIL4 - DIGITAL TRUST FRAMEWORK
 
SABSA overview
SABSA overviewSABSA overview
SABSA overview
 
CISSPills #3.02
CISSPills #3.02CISSPills #3.02
CISSPills #3.02
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security Playbook
 
DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?DAM 2018 Review, What's next 2019 ?
DAM 2018 Review, What's next 2019 ?
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Catalyst research institute
Catalyst research instituteCatalyst research institute
Catalyst research institute
 
SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0SABSA Implementation(Part I)_ver1-0
SABSA Implementation(Part I)_ver1-0
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 

Destaque

Diário Oficial de Guarujá - 04 10-11
Diário Oficial de Guarujá - 04 10-11Diário Oficial de Guarujá - 04 10-11
Diário Oficial de Guarujá - 04 10-11Prefeitura de Guarujá
 
REVOLUÇÃO PRAIEIRA Governo de Penambuco
REVOLUÇÃO PRAIEIRA Governo de PenambucoREVOLUÇÃO PRAIEIRA Governo de Penambuco
REVOLUÇÃO PRAIEIRA Governo de Penambucohumberto145
 
Questionário Empresa Webvix
Questionário Empresa WebvixQuestionário Empresa Webvix
Questionário Empresa Webvixgueste3d3ab
 
Manual de Normas Acadêmicas 2011 Ibes/Sociesc
Manual de Normas Acadêmicas 2011 Ibes/SociescManual de Normas Acadêmicas 2011 Ibes/Sociesc
Manual de Normas Acadêmicas 2011 Ibes/SociescFran Buzzi
 
El mundo del fútbol rechaza amenazas
El mundo del fútbol rechaza amenazas El mundo del fútbol rechaza amenazas
El mundo del fútbol rechaza amenazas maria7417
 
ApresentaçãO Atividades 2009 Liochi
ApresentaçãO Atividades 2009 LiochiApresentaçãO Atividades 2009 Liochi
ApresentaçãO Atividades 2009 LiochiY2Studio
 
Apostila culinaria receitasdiet
Apostila culinaria receitasdietApostila culinaria receitasdiet
Apostila culinaria receitasdietrose
 
Receitas Para DiabéTicos
Receitas Para DiabéTicosReceitas Para DiabéTicos
Receitas Para DiabéTicosClaudia Cozinha
 
Os determinantes da inflação brasileira recente: estimações utilizando redes ...
Os determinantes da inflação brasileira recente: estimações utilizando redes ...Os determinantes da inflação brasileira recente: estimações utilizando redes ...
Os determinantes da inflação brasileira recente: estimações utilizando redes ...Grupo de Economia Política IE-UFRJ
 
Jornal Cidade - Ano II - Nº 29
Jornal Cidade - Ano II - Nº 29Jornal Cidade - Ano II - Nº 29
Jornal Cidade - Ano II - Nº 29Jornal Cidade
 
ApresentaçãO Atividades 2009
ApresentaçãO Atividades 2009ApresentaçãO Atividades 2009
ApresentaçãO Atividades 2009Y2Studio
 
A crianca em desenvolvimento helen bee
A crianca em desenvolvimento   helen beeA crianca em desenvolvimento   helen bee
A crianca em desenvolvimento helen beeKarina Regy
 
Receitas Com Baixo Colesterol
Receitas Com Baixo ColesterolReceitas Com Baixo Colesterol
Receitas Com Baixo ColesterolClaudia Cozinha
 
Registro Simplificado - Marcas e patentes
Registro Simplificado - Marcas e patentesRegistro Simplificado - Marcas e patentes
Registro Simplificado - Marcas e patentesWELDES
 

Destaque (20)

Diário Oficial de Guarujá - 04 10-11
Diário Oficial de Guarujá - 04 10-11Diário Oficial de Guarujá - 04 10-11
Diário Oficial de Guarujá - 04 10-11
 
REVOLUÇÃO PRAIEIRA Governo de Penambuco
REVOLUÇÃO PRAIEIRA Governo de PenambucoREVOLUÇÃO PRAIEIRA Governo de Penambuco
REVOLUÇÃO PRAIEIRA Governo de Penambuco
 
Questionário Empresa Webvix
Questionário Empresa WebvixQuestionário Empresa Webvix
Questionário Empresa Webvix
 
Manual de Normas Acadêmicas 2011 Ibes/Sociesc
Manual de Normas Acadêmicas 2011 Ibes/SociescManual de Normas Acadêmicas 2011 Ibes/Sociesc
Manual de Normas Acadêmicas 2011 Ibes/Sociesc
 
El mundo del fútbol rechaza amenazas
El mundo del fútbol rechaza amenazas El mundo del fútbol rechaza amenazas
El mundo del fútbol rechaza amenazas
 
ApresentaçãO Atividades 2009 Liochi
ApresentaçãO Atividades 2009 LiochiApresentaçãO Atividades 2009 Liochi
ApresentaçãO Atividades 2009 Liochi
 
Revista do irb brasil ano 65
Revista do irb brasil   ano 65Revista do irb brasil   ano 65
Revista do irb brasil ano 65
 
Apostila culinaria receitasdiet
Apostila culinaria receitasdietApostila culinaria receitasdiet
Apostila culinaria receitasdiet
 
Receitas Para DiabéTicos
Receitas Para DiabéTicosReceitas Para DiabéTicos
Receitas Para DiabéTicos
 
Os determinantes da inflação brasileira recente: estimações utilizando redes ...
Os determinantes da inflação brasileira recente: estimações utilizando redes ...Os determinantes da inflação brasileira recente: estimações utilizando redes ...
Os determinantes da inflação brasileira recente: estimações utilizando redes ...
 
Jornal Cidade - Ano II - Nº 29
Jornal Cidade - Ano II - Nº 29Jornal Cidade - Ano II - Nº 29
Jornal Cidade - Ano II - Nº 29
 
Arborização urbana 1
Arborização urbana 1Arborização urbana 1
Arborização urbana 1
 
Manual tecnologo
Manual tecnologoManual tecnologo
Manual tecnologo
 
Revista Downtown
Revista DowntownRevista Downtown
Revista Downtown
 
Ssa1 resultado
Ssa1   resultadoSsa1   resultado
Ssa1 resultado
 
ApresentaçãO Atividades 2009
ApresentaçãO Atividades 2009ApresentaçãO Atividades 2009
ApresentaçãO Atividades 2009
 
17dejulho oexpresso
17dejulho oexpresso17dejulho oexpresso
17dejulho oexpresso
 
A crianca em desenvolvimento helen bee
A crianca em desenvolvimento   helen beeA crianca em desenvolvimento   helen bee
A crianca em desenvolvimento helen bee
 
Receitas Com Baixo Colesterol
Receitas Com Baixo ColesterolReceitas Com Baixo Colesterol
Receitas Com Baixo Colesterol
 
Registro Simplificado - Marcas e patentes
Registro Simplificado - Marcas e patentesRegistro Simplificado - Marcas e patentes
Registro Simplificado - Marcas e patentes
 

Semelhante a Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge

Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Essential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyEssential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyChristine Shepherd
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesNJVC, LLC
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxSaadZaman23
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftKesavan Munuswamy
 

Semelhante a Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge (20)

Cloud Transformation Services.pdf
Cloud Transformation Services.pdfCloud Transformation Services.pdf
Cloud Transformation Services.pdf
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Essential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration StrategyEssential Components of a Successful Cloud Migration Strategy
Essential Components of a Successful Cloud Migration Strategy
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
Cloud Security for U.S. Military Agencies
Cloud Security for U.S. Military AgenciesCloud Security for U.S. Military Agencies
Cloud Security for U.S. Military Agencies
 
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss PreventionWebinar: Microsoft 365 - Your Gateway to Data Loss Prevention
Webinar: Microsoft 365 - Your Gateway to Data Loss Prevention
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Top Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptxTop Trends in Cloud Computing for 2023.pptx
Top Trends in Cloud Computing for 2023.pptx
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Cloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from MicrosoftCloud Design Patterns Book from Microsoft
Cloud Design Patterns Book from Microsoft
 

Mais de IKT-Norge

Lars Johan Bjørkevoll, Xeneta
Lars Johan Bjørkevoll, XenetaLars Johan Bjørkevoll, Xeneta
Lars Johan Bjørkevoll, XenetaIKT-Norge
 
Erik Stokkeland
Erik Stokkeland Erik Stokkeland
Erik Stokkeland IKT-Norge
 
Ketil Widerberg
Ketil WiderbergKetil Widerberg
Ketil WiderbergIKT-Norge
 
Randi Marjamaa
Randi MarjamaaRandi Marjamaa
Randi MarjamaaIKT-Norge
 
Eirik Norman Hansen
Eirik Norman Hansen Eirik Norman Hansen
Eirik Norman Hansen IKT-Norge
 
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015IKT-Norge
 
Læringsanalyse – Arne Krokan
Læringsanalyse – Arne KrokanLæringsanalyse – Arne Krokan
Læringsanalyse – Arne KrokanIKT-Norge
 
Læringsanalyse – Yngve Lindvig
Læringsanalyse – Yngve LindvigLæringsanalyse – Yngve Lindvig
Læringsanalyse – Yngve LindvigIKT-Norge
 
Multi Smart Øving – skjermbilder
Multi Smart Øving – skjermbilderMulti Smart Øving – skjermbilder
Multi Smart Øving – skjermbilderIKT-Norge
 
NEO2015: Zwipe
NEO2015: ZwipeNEO2015: Zwipe
NEO2015: ZwipeIKT-Norge
 
NEO2015: Crypho
NEO2015: CryphoNEO2015: Crypho
NEO2015: CryphoIKT-Norge
 
NEO2015: Bartec Pixavi
NEO2015: Bartec PixaviNEO2015: Bartec Pixavi
NEO2015: Bartec PixaviIKT-Norge
 
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015IKT-Norge
 
NEO2015: Filmgrail
NEO2015: FilmgrailNEO2015: Filmgrail
NEO2015: FilmgrailIKT-Norge
 
NEO2015: Home Control
NEO2015: Home ControlNEO2015: Home Control
NEO2015: Home ControlIKT-Norge
 
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015IKT-Norge
 
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...IKT-Norge
 
NEO2015: Xeneta
NEO2015: XenetaNEO2015: Xeneta
NEO2015: XenetaIKT-Norge
 
NEO2015: Hatteland
NEO2015: HattelandNEO2015: Hatteland
NEO2015: HattelandIKT-Norge
 

Mais de IKT-Norge (20)

Lars Johan Bjørkevoll, Xeneta
Lars Johan Bjørkevoll, XenetaLars Johan Bjørkevoll, Xeneta
Lars Johan Bjørkevoll, Xeneta
 
Erik Stokkeland
Erik Stokkeland Erik Stokkeland
Erik Stokkeland
 
Ketil Widerberg
Ketil WiderbergKetil Widerberg
Ketil Widerberg
 
Randi Marjamaa
Randi MarjamaaRandi Marjamaa
Randi Marjamaa
 
Roar Olsen
Roar Olsen Roar Olsen
Roar Olsen
 
Eirik Norman Hansen
Eirik Norman Hansen Eirik Norman Hansen
Eirik Norman Hansen
 
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015
Roger Schjervas innlegg for produktivitetskommisjonen 19.05.2015
 
Læringsanalyse – Arne Krokan
Læringsanalyse – Arne KrokanLæringsanalyse – Arne Krokan
Læringsanalyse – Arne Krokan
 
Læringsanalyse – Yngve Lindvig
Læringsanalyse – Yngve LindvigLæringsanalyse – Yngve Lindvig
Læringsanalyse – Yngve Lindvig
 
Multi Smart Øving – skjermbilder
Multi Smart Øving – skjermbilderMulti Smart Øving – skjermbilder
Multi Smart Øving – skjermbilder
 
NEO2015: Zwipe
NEO2015: ZwipeNEO2015: Zwipe
NEO2015: Zwipe
 
NEO2015: Crypho
NEO2015: CryphoNEO2015: Crypho
NEO2015: Crypho
 
NEO2015: Bartec Pixavi
NEO2015: Bartec PixaviNEO2015: Bartec Pixavi
NEO2015: Bartec Pixavi
 
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015
Verdiskaping i en digital verden: Næringsminister Monica Mæland på NEO2015
 
NEO2015: Filmgrail
NEO2015: FilmgrailNEO2015: Filmgrail
NEO2015: Filmgrail
 
NEO2015: Home Control
NEO2015: Home ControlNEO2015: Home Control
NEO2015: Home Control
 
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015
Et digitalt #drømmeløft for Norge: Innovasjon Norge-keynote på NEO2015
 
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...
NEO2015: The Trampery keynote. Creating a global innovation cluster: Lessons ...
 
NEO2015: Xeneta
NEO2015: XenetaNEO2015: Xeneta
NEO2015: Xeneta
 
NEO2015: Hatteland
NEO2015: HattelandNEO2015: Hatteland
NEO2015: Hatteland
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Sikkerhet i skyen v/ Ole Tom Seierstad, Chief Security Adviser, Microsoft Norge

  • 1. SIKKERHET I SKYEN Ole Tom Seierstad Chief Security Advisor Microsoft Norge AS oles@microsoft.com
  • 2.
  • 3. Hva er cloud? Komplette IT løsninger kan kjøres på én sentral tjener og at de tilgjengeliggjøres via internett på en rekke ulike enheter. Dette er hva vi kaller “Cloud Computing”.
  • 4. Cloud computing er en del avløsnigen Skybaserte løsninger gir IT-ressurser, som en tjeneste, på en dynamisk og skalerbar måte over et nettverk. Fem viktige egenskaper Tjenestertilgjenglig for selvbetjening God tilgangtilnettet Delingavressurser (Resource pool) Raskemuligheter for endringer Målingavresultater CLOUD Web Client-Server Mainframe 4
  • 6. Tilbakemeldingerfrabrukere Reduserekostnader ØkteffektivitetogGrønn IT Øktkundeog partner kontaktsamtbedrekundeopplevelse 6
  • 9. Trender – Nye måter å arbeide på – regelverk
  • 15. Sikkerhet er en nødvendighet
  • 16. Sikkerhet er en nødvendighet
  • 17. ULIKE implementeringer for CLOUD Computing Flytt hele løsningen til skyen Kjør deler av programmvaren i skyen Lagring av data i skyen Lag nye løsninger ved å kombinere ulke Cloud Services Utvikle helt nye skybaserte løsninger
  • 18. Ulike modeller – fra Offentlig til private skyløsninger Pålokaleservere Privat sky Offentlig sky Tilgjenglighetpåulikeenheter
  • 19. Informasjon er under leverandørens kontroll Ikkebegrensetavgeografiogplassering Endringer i IT prosesser Leverandøren kan ha bedre sikkerhets prosesser og rutiner Fysisk sikkerhet vil bli administrert av sky-leverandøren Utfordringer med juridisksuverenitet Sentralisert lagring av data Økonomisk skalerbarhet Attraktiv for kriminelle Personvern utfordringer Forensics/etterforskning Muligheter og utfordringer
  • 21. Compliance is still the duty of the Customer Sound Risk Management encompassing the Cloud is needed Collaboration between Customer and Provider is essential Need of a certain level of Process Transparency Strong Internal Team needed Contract Negotiation Definition of Controls and Metrics Integration of Controls into own processes Compliance and Risk Management Compliance requirements can be fulfilled by a skilled internal team and a certain level of process transparency by the cloud provider(s).
  • 22. Cross-Domain Collaboration requires secure identities People and Devices Based on In-Person Proofing or similar Claims-Based Based on interoperable standards Privacy vs. Authentication has to be balanced Processes have to be able to include several providers Identity and Access Management Any digital identity system for the cloud has to be interoperable across different organisations and cloud providers and based on strong processes.
  • 23. Service Engineering and Development Strong and Transparent Engineering Processes Needed Requirements Design Implementation Verification Release Response Proofed Based on Threat Models or similar Service Integrity The provider should follow a clear, defined, and provable process to integrate security and privacy in the service from the beginning and for the whole lifecycle.
  • 24. Service Delivery Internal processes have to be able to cover multiple provider Security Monitoring Auditing Forensics Incident response Business Continuity Etc. Requirements depend on application and information needs Service Integrity The service delivery capabilities of the provider and the security management and auditing needs of the customer must be aligned.
  • 25. Is part of the delivery chain Often subject to social engineering attacks (and similar) Review today’s processes and policies Endpoint Integrity It is very important to include the end point in any security consideration for cloud-based services.
  • 26. Data Classification is the foundation Requirements Legal Needs Persistent Data Protection needed Encryption/Rights Management Has to cover the whole transaction Data in transit «New» Challenges Data Sovereignty Access to Information Data Partitioning and Processing Information Protection Implemented Data Classification helps to decide which data is ready for the cloud, under which circumstances, and with which controls.
  • 27. Well-Functioning Risk and Compliance Programs are a must Data classification is the base Choose the right Deployment Model (Private, Community, or Public) Strong, cloud trained, Internal Team still needed Process Transparency, Compliance Controls, and Auditability by the Provider Implement a Secure Development Lifecycle and evaluate the Provider and their vendors as well Stronger federated identity and access controls Information Lifecycle Controls Access controls to operate across organisational boundaries without surrendering identity ownership Recommendations
  • 28.
  • 29. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Notas do Editor

  1. . So what is cloud?  Need a broad definition … “An approach to computing that’s about internet scale and connecting to a variety of devices and endpoints”
  2. Been doing this awhile…As we think about how Microsoft is poised to take advantage of the shift to services going forward, let’s step back a minute and just set some context about where we are and where we’ve beenWe been doing business and delivering software through the cloud for over a decadeMost people are surprised to learn about where we’re leading…Our online properties (WL, MSN) see some 600 million unique users every monthThe Xbox guys pushed out some 5 petabytes of content over Xbox Live during the week of ChristmasWe process up to 9.9 billion messages a day via WL MessengerWe have over 500 million active Windows Live IDsThe BPOS guys have a million paying users in 36 countries and regionsEven MS Update/Windows Update … operates at incredible scale - pushes out over a petabyte of updates every month to millions of servers and hundreds of millions of PCsEven back when we pushed out SP2 for Windows XP, over 250 million of those PCs were upgraded with WU – upgrading a desktop operating system is as incredibly sophisticated a cloud service as you will ever see, and we did it at massive scale (hundreds of millions)We’re not new at this…Our breadth of experience spans 30 years w/consumers, over 20 years in the enterprise, and over a decade providing services in the cloudWhen these competencies, these muscles come together – our understanding of enterprise requirements combined w/our ability to scale delivery through the cloud, for example – you get things like MS Online services. The sum of our capabilities ends up greater than the partsOther guys trying to compensate for that via acquisitions – we wish them luckThis breadth of offering extends to our hundreds of thousands of partners as wellFor every $1 in revenue we make, they make $7 – that’s how we built the company – that continues in the cloudWe have more than 7,000 partners reselling BPOS, more than 100 partners join this community each weekWe have nearly 10,000 hosting partnersOur commitment to continuing this path is reflected through the investments we’re making, through the breadth of our offering across all these different businesses we’re in and the investment we’re makingWe’re evolving some of the most successful product franchises the software industry has ever seen – Windows and Office – to the cloud, and we’re not stopping there – our database business, our messaging and collab business – the list goes on and onNot taking this lightlyThis is how we’re going to grow the business – this is the future of MicrosoftNot just products, either – we believe our infrastructure/datacenter investments to be unmatched in the industry (put the onus on GOOG to refute?)700,000+ square foot Chicago and the 300,000+ square foot Dublin, Ireland data centersAmsterdam, Hong Kong, Japan, and Singapore: We announced (November 2009) that we have datacenter capacity in these regional locations//Microsoft sites, including MSN.com and Windows Live Services attract more than 600 million unique users worldwide each month and in 46 markets and 21 languagesMicrosoft sites captured nearly 15% of global internet minutes (up 43% from last year.) 70% of Microsoft’s time comes from Windows Live Messenger.Windows Live Hotmail: More than 369 million active accounts worldwide (Source: comScore WW November 2009), making it the world’s largest web-based email service and is used in nearly every country in the world.Windows Live Messenger:More than 314 million active accounts worldwide (Source: comScore WW November 2009); Customers send up to 9.9 billion messages a day with Windows Live Messenger. (Source: Microsoft internal data, as of October 2009), making it the #1 most used free instant messaging service in the world.
  3. Cost ReductionContinues cost containment and budget optimization amplified by the economy downturn (before - efficiency and waste elimination; now - cost cutting)Focus on internal productivity solutionsGreen ITInterest in environmental sustainability, however, limited evidence of significant investments in “Green IT”Citizen InteractionSteady movement toward increased citizens interaction/ involvement with Government agencies via multiple platforms (portals, call centers, mobile networks)The main value of the Identity management Solution Area is in the areas of efficient access, compliance and e-servicesFrom PlaybookGrowthCustomer wants to extend IT service availability (e.g. email) to users who don’t have dedicated PCs (task workers, deskless workers)Customer wants to consolidate email to a single platformCustomer wants to set up a new data centerCompetitionThere is a threat to replace Microsoft applications with a competitive solution, e.g. Google AppsThere a threat to replace Microsoft infrastructure with a competitive solution, e.g. VMware- or IBM- architected Data CenterCost ManagementReducing datacenter costs is a critical need, e.g. personnel, energy expenseMoving expenditures from CapEx to OpEx is advantageous imperative to CustomerCost puts EA/VL renewal at risk – ‘CALs/Office too costly’Cost puts EA/VL renewal at risk – ‘Servers too costly’Technology OptimizationCustomer needs to modernize data center infrastructureCustomer needs to centralize data center infrastructureCustomer has issues with data center capacity/workload fluctuationOtherCustomer does NOT have Data Center expertise /technical human resourceCustomer has Data Center expertise /technical human resources Customer has a strong need to show leadership on environmental impact reduction, e.g. CO2 emission reduction
  4. Where users work
  5. When they work
  6. How and where Businesses and Governments provide services
  7. Besides classical crime: Loss of Intelectual PropertyThis is causing fear for adoption of the technology by end consumers
  8. Where we initially came from – assets protected by huge walls
  9. The first people working from outside the firewall and vendors and suppliers having access to your data
  10. And today the Internet is your networkYou need the openness in the future to creat ad-hoc collaboration or even established collaboration
  11. Security has to enable all those scenarios
  12. Only a well managed environment is a secure environment – and an inexpensive environment (CoreIO)
  13. Windows Azure, combined with other elements of Microsoft's software plus services offering, enable customers to craft solutions combining the best of on-premises, hosted, and cloud-based applications and services. For example and application money's executes run within the IT data center, but might store large amounts of data in the cloud. Existing exact applications can be extended by securely accessing a variety of cloud-based services. Or new solutions can be created by a combining existing cloud-based services in new and interesting ways.