SlideShare a Scribd company logo
1 of 21
Stay Safe
In The Cloud
         Len Padilla
Senior Director of Technology
        NTT Europe
Cloud Computing Primer
What is it? Is it really different? Isn’t it just a new version of the
mainframe?




Cloud Security
How can this possibly be safe if it’s not in my data centre?




Service Providers
How do you choose your business partners?
Today’s discussion

       Cloud Computing Primer
       What is it? Is it really different? Isn’t it just a new version of the
       mainframe?



       Cloud Security
       How can this possibly be safe if it’s not in my data centre?



       Service Providers
       How do you choose your business partners?
Cloud Computing is an approach
 to computing that leverages the
      efficient pooling of on-
 demand, self-managed virtual
  infrastructure, consumed as a
              service
Oh Larry…
Compute Cloud – Dynamic scaling
                                                                                                         Increase/decrease computing capacity
                                                                                                         100% reserved/guaranteed resources


                                                                                                          Free burst (unguaranteed)

          Resources
          (Ghz/Ram)                                                                                       Guaranteed resources


        20 Ghz




        10 Ghz
                                                                                                         Initial commitment




         0 Ghz
                                                                                                         Time




                                                                          August
                                                      May




                                                                   July
                 January




                                              April
                                      March
                           February




                                                            June




                                                                                   September


                                                                                               October
Cloud Concerns
Today’s discussion

       Cloud Computing Primer
       What is it? Is it really different? Isn’t it just a new version of the
       mainframe?



       Cloud Security
       How can this possibly be safe if it’s not in my data centre?



       Service Providers
       How do you choose your business partners?
What is Security?

 • C : Confidentiality

 • I : Integrity

 • A : Availability
                                                         CIA
Joe St Sauver, Ph.D. - Internet2 Joint Tech Conference
What is Security?
        Confidentiality (ISO-27001):
• C : Confidentiality
        Ensuring that information is
        accessible only to those
• I : Integrity
        authorized to have access.
        One of the cornerstones of
• A : Availability
        information security.
Security: Confidentiality


• Perimeter vs Endpoint
• Operators & Users



                            CIA
Security: Confidentiality

• Perimeter vs Endpoint
• IDS / IPS
• Operators & Users


                Perimeter?
Security: Confidentiality

• Perimeter vs Endpoint
• IDS / IPS
• Operators & Users


            (N)IDS – where?
Security: Confidentiality

•   Perimeter vs Endpoint
     Governance
•   IDS / IPS
•   Operators & Users
     • Service Provider
    • Internal Staff
Today’s discussion

       Cloud Computing Primer
       What is it? Is it really different? Isn’t it just a new version of the
       mainframe?



       Cloud Security
       How can this possibly be safe if it’s not in my data centre?



       Service Providers
       How do you choose your business partners?
Service Provider

• Proof
  Partnership: Your Service Provider
  has become your business partner.
• Products the SP provides, the
  The more
  more critical to your success.
• Partnership
Service Provider : A True Partner
      •          Traditional Hosting                  …ensure that our costs align with the actual amount of
                  – Rigid, inflexible, but stable     computing resources consumed…

      •          Utility based Hosting
                                                      …a cost structure whereby our infrastructure costs scale to
                  – Pay as you Use                    tiered proportion to the actual number of commercial
                                                      transactions (flight bookings, hotel reservations etc…
                  – Transparency
      •          Transactional Hosting
                  – Financial Alignment
Revenue v Cost




                                                                                  Online Client Revenue
                                                                                  Traditional Hosting
                                                                                  Utility Hosting
                                                                                  Transactional (PNR)



                                               Time
Today’s discussion
       Cloud Computing Primer
       A valid cost-effective model. Can take your
       business to the next stage.

       Cloud Security
       The Cloud is safe, when used correctly. Security
       is more than technical.

       Service Providers
       Your new business partner. Choose wisely!
Clouds aren’t dangerous,
if you’ve charted a course

     Come see us!

More Related Content

Similar to Stay safe in the cloud - Len Padilla - Senior Director of Technology - NTT Europe

Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406Peter Coffee
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumTom Crombez
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud BusinessACMBangalore
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyAl Afflitto
 
Microsoft Cloud Computing for Ecommerce
Microsoft Cloud Computing for EcommerceMicrosoft Cloud Computing for Ecommerce
Microsoft Cloud Computing for EcommerceTechMaster Vietnam
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaAsheem Chandna
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CarePeter Coffee
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...CaseCentral
 
Apptio up cloud conference 2012 [final].pptx
Apptio up cloud conference 2012 [final].pptxApptio up cloud conference 2012 [final].pptx
Apptio up cloud conference 2012 [final].pptxKhazret Sapenov
 
Disa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 HjsDisa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 HjsGovCloud Network
 
Cloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesCloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesPrasad Chitta
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
DISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaSDISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaSGovCloud Network
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.Peter Coffee
 

Similar to Stay safe in the cloud - Len Padilla - Senior Director of Technology - NTT Europe (20)

Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406Peter Coffee CIO Forum 20100406
Peter Coffee CIO Forum 20100406
 
Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013Lets Do the Cloud-CFO Summit 2013
Lets Do the Cloud-CFO Summit 2013
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
 
FewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuumFewebPlus @ microsoft 19 april 2010 cloud continuum
FewebPlus @ microsoft 19 april 2010 cloud continuum
 
Making of a Successful Cloud Business
Making of a Successful Cloud BusinessMaking of a Successful Cloud Business
Making of a Successful Cloud Business
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Microsoft Cloud Computing for Ecommerce
Microsoft Cloud Computing for EcommerceMicrosoft Cloud Computing for Ecommerce
Microsoft Cloud Computing for Ecommerce
 
Cloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - ChandnaCloud Computing - Jan 2011 - Chandna
Cloud Computing - Jan 2011 - Chandna
 
An enterprise journey in the Cloud
An enterprise journey in the CloudAn enterprise journey in the Cloud
An enterprise journey in the Cloud
 
Having the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should CareHaving the Cloud Conversation: Why the Business Architect Should Care
Having the Cloud Conversation: Why the Business Architect Should Care
 
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
Cloud Computing and eDiscovery: What is in it for you? By ESG's Brian Babinea...
 
Apptio up cloud conference 2012 [final].pptx
Apptio up cloud conference 2012 [final].pptxApptio up cloud conference 2012 [final].pptx
Apptio up cloud conference 2012 [final].pptx
 
Disa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 HjsDisa CSD Cloud Brief Sept 2009 Hjs
Disa CSD Cloud Brief Sept 2009 Hjs
 
Cloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesCloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & Challenges
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
DISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaSDISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaS
 
The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.The Enterprise Cloud: Immediate. Urgent. Inevitable.
The Enterprise Cloud: Immediate. Urgent. Inevitable.
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Stay safe in the cloud - Len Padilla - Senior Director of Technology - NTT Europe

  • 1. Stay Safe In The Cloud Len Padilla Senior Director of Technology NTT Europe
  • 2. Cloud Computing Primer What is it? Is it really different? Isn’t it just a new version of the mainframe? Cloud Security How can this possibly be safe if it’s not in my data centre? Service Providers How do you choose your business partners?
  • 3.
  • 4. Today’s discussion Cloud Computing Primer What is it? Is it really different? Isn’t it just a new version of the mainframe? Cloud Security How can this possibly be safe if it’s not in my data centre? Service Providers How do you choose your business partners?
  • 5. Cloud Computing is an approach to computing that leverages the efficient pooling of on- demand, self-managed virtual infrastructure, consumed as a service
  • 6.
  • 8. Compute Cloud – Dynamic scaling Increase/decrease computing capacity 100% reserved/guaranteed resources Free burst (unguaranteed) Resources (Ghz/Ram) Guaranteed resources 20 Ghz 10 Ghz Initial commitment 0 Ghz Time August May July January April March February June September October
  • 10. Today’s discussion Cloud Computing Primer What is it? Is it really different? Isn’t it just a new version of the mainframe? Cloud Security How can this possibly be safe if it’s not in my data centre? Service Providers How do you choose your business partners?
  • 11. What is Security? • C : Confidentiality • I : Integrity • A : Availability CIA Joe St Sauver, Ph.D. - Internet2 Joint Tech Conference
  • 12. What is Security? Confidentiality (ISO-27001): • C : Confidentiality Ensuring that information is accessible only to those • I : Integrity authorized to have access. One of the cornerstones of • A : Availability information security.
  • 13. Security: Confidentiality • Perimeter vs Endpoint • Operators & Users CIA
  • 14. Security: Confidentiality • Perimeter vs Endpoint • IDS / IPS • Operators & Users Perimeter?
  • 15. Security: Confidentiality • Perimeter vs Endpoint • IDS / IPS • Operators & Users (N)IDS – where?
  • 16. Security: Confidentiality • Perimeter vs Endpoint Governance • IDS / IPS • Operators & Users • Service Provider • Internal Staff
  • 17. Today’s discussion Cloud Computing Primer What is it? Is it really different? Isn’t it just a new version of the mainframe? Cloud Security How can this possibly be safe if it’s not in my data centre? Service Providers How do you choose your business partners?
  • 18. Service Provider • Proof Partnership: Your Service Provider has become your business partner. • Products the SP provides, the The more more critical to your success. • Partnership
  • 19. Service Provider : A True Partner • Traditional Hosting …ensure that our costs align with the actual amount of – Rigid, inflexible, but stable computing resources consumed… • Utility based Hosting …a cost structure whereby our infrastructure costs scale to – Pay as you Use tiered proportion to the actual number of commercial transactions (flight bookings, hotel reservations etc… – Transparency • Transactional Hosting – Financial Alignment Revenue v Cost Online Client Revenue Traditional Hosting Utility Hosting Transactional (PNR) Time
  • 20. Today’s discussion Cloud Computing Primer A valid cost-effective model. Can take your business to the next stage. Cloud Security The Cloud is safe, when used correctly. Security is more than technical. Service Providers Your new business partner. Choose wisely!
  • 21. Clouds aren’t dangerous, if you’ve charted a course Come see us!

Editor's Notes

  1. Deleteleft and right
  2. The final area I’d like to discuss and concerns the financial impact of Cloud / Virtualisation in the Travel / Hospitality sectorFinancial evolution hasn’t changed much over the Years, except for UtilityWhilst technology continues to evolve, the contracting / financial aspects of IT services delivery have remained fairly constant over the years. In the managed hosting space, you’ll find a mixed bag of annuity based fixed cost services, some variable or one time costs.Utility = +Pay as you use, Transparent - Complex, potentially not aligned to business, hard to compare. Step forward thoughThe development of virtualisation has enabled many service providers to adopt a utility based billing models that at least allows customers to pay for what they use, but this model can on the face of it be rather complex and ultimately doesn’t necessarily translate into what's important or meaningful for their business. For anyone that’s implemented utility based charging some of the challenges this can present are around budgeting, assigning cost, complex invoicing process, difficulty in comparing with other providers etc. On the flip side Utility based computing can provide much greater levels of flexibility together with transparency of costs / usage. So on balance I'm sure most people will look at utility based computing as a positive step forward.Next step – Transactional, to align cost base with revenue streamsFor one of our airline clients, whilst utility based computing was a requirement as part of their web services development, they also wanted a financial model that they could relate to in terms of business transactions or PNR. PNR standard term, but not currently relevant in mged hosting space. Complex, partnerships are importantFor the airline sector, PNR is a fairly standard term, but in the world of managed hosting, on a global scale its much less prevalent. The journey in exploring this was by no means an easy one. One of the greatest challenges we had to address was in obtaining enough evidential data that we could rely upon to ensure our short, medium and long term projections were sound and that they would satisfy both the client and our internal sponsors.This is not an easy internal sale!! Service Providers need business buy in, support, but benefits for both, longevity – aligned business objectivesClearly, when looking at this type of commercial model, all our internal business units needed to have input into its construction. Fortunately, we have been able to secure the internal agreement to adopt this non standard approach. Whilst the agreement is very different to the ones we would typically adopt, the valuable insight, closer working partnership and greater access to business information we would not otherwise have access to, help to drive longevity into the relationship.Not right for all, assess risks, client profileI would also like to stress that this approach whilst right for Etihad Airways, may not be right for other organisations but the consultative approach we need to go through ensure both parties are cognisant of the challenges this may present.It goes without saying that a move from Traditional hosting > Utility > PNR presents us with a greater level of risk but we believe this is what many of our customers want from us and we are trying to adapt not just technically, but commercially as well.Key Point – So in summary, the ‘business’ is expecting IT to do More with Less. Through initiatives such as this, we are excited about the opportunities this approach to commercial modelling presents as we feel this will be the next evolution in the Service Provider space, but it will require the adoption of new technologies and business partnerships to support it.MOVE TO NEXT SLIDE