SlideShare uma empresa Scribd logo
1 de 25
Cloud Security
Presented By
Devyani Vaidya
What is Cloud Security?
Cloud
• Agility
• Self-service
• Scale
• Automation
Security
• Gate-keeper
• Standards
• Control
• Centralized
Cloud Security is security principles applied to protect data,
applications and infrastructure associated within the Cloud
Computing technology.
Market Analysis
What market size are we talking about
Market Size:
2012 : US $425.4 Million
2013 : US $629.6 Million
2014 : US $963.4 Million
Global Cloud Security Market Growth
Analysis 2012-2014 (US$ million)
425.4
629.6
963.4
0
200
400
600
800
1000
1200
2012 2013 2014
Global Geographies
• The Americas
• Europe, the Middle East and Africa; European
Medicines Evaluation Agency. (EMEA)
• Asia Pacific (APAC)
Global Cloud Security Market in
Percentage
2012
Global
Cloud
Security
Market
Global
Security
Market
4
96
2014
Global
Cloud
Security
Market
Global
Security
Market
End-Users/Customers
• Large Enterprises
• Government Agencies
• Cloud Service Providers (CSPs)
• Medium-sized Enterprises
Global Cloud Security Market by End-
User Segmentation
38
31
17
9
5 Large Enterprises
Government Agencies
Cloud Service Providers
Medium Enterprises
Other/Third Party Vendors
Trends associated with Cloud Security
• Increasing Partnerships between CSPs and Security
Solution Providers Expected
• Increasing Emergence of Cloud Service-specific Security
Solution Providers
• Identity Management and Encryption to Remain the
Top Cloud Security Solutions Offered
• Increasing Availability of Cloud Security Solutions for
Small and Medium-sized Businesses (SMBs)
• Emergence of Strong Cloud Security Standard and
Guidelines
Why is Cloud Security Important
• Increasing Usage of Cloud Services in Non-
traditional Sectors
• Growing Adoption of Cloud Services in Government
Departments
• Rise in Cloud Service-specific Attacks
• Growing Usage of Cloud Services for Critical Data
Storage
• Rise in Employee Mobility
What are the challenges?
• CSPs believe that Security is End-users’ Issue
• Lack of Awareness about Cloud Security
• Inconsistent Network Connection Issues
• Lack of Proper Cloud Security Standards
What End-users/customers expect
from Cloud Security
• Strong Overall Security Offered
• Suite of Security Solutions Offered
• Encryption Key Management Features Offered
• Availability of Fine Granular Control
McAfee Inc.
• McAfee Inc., founded in 1987, is a leading provider
of network security solutions. The company is
listed on the New York Stock Exchange and is based
in California, US. The company provides security
services across the globe. The company’s security
products are for sectors such as Data Protection,
Email and Web Security, Endpoint Protection,
Mobile Security, Network Security, Risk and
Compliance, Security Software as a Service
(Security SaaS), and Security Management.
McAfee acquired by Intel
• On August 19, 2010 Intel acquired McAfee for
$7.68 billion in a cash deal. In FY2010, the
company reported total revenue of US$2.1
billion. However, in FY2010, the revenue from
the Cloud Security segment was low, at only
around US$25 million.
McAfee Cloud Security Program
McAfee Security-as-a-Service delivers complete
endpoint, email, web, and network protection through
the cloud, saving your IT department time, effort, and
costs. As part of our Security Connected framework
that delivers comprehensive security and integrated
management, McAfee Security SaaS leverages the
power of the cloud to help organizations realize faster
time-to-protection to secure their business.
McAfee SaaS Includes
• McAfee SaaS Email Protection
• McAfee SaaS Integrated Suites
• McAfee SaaS Endpoint Protection
• McAfee SaaS Vulnerability Management
• McAfee SaaS Web Protection
SWOT Analysis
Strengths
• The company’s cloud access control
solution allows control over the
entire lifecycle of cloud access
security, providing solutions such
as SSO, provisioning, strong
authentication and audit.
• Its solution helps in auto-
synchronization of identity data
between enterprise and cloud
applications for change
management scenarios
• Centralized management and
reporting are provided through
integration with the McAfee ePolicy
Orchestrator platform
Weakness
• Despite being an established
traditional security solution provider
with a wide geographic presence, the
company is slow to gain share in the
cloud security space
• Some pure-play companies such as
Symplified are witnessing much
higher growth in the Cloud Identity
Management market
• Some of its competitors, such as
Trend Micro, provides better key
management options/features
SWOT Analysis
Opportunities
• The company has a very long
list of partners from various
geographic locations, which
it can leverage to expand
• It recently launched its cloud
security platform, which
secures all content and data
traffic including email, web
and identity traffic; thus,
providing a unified solution
Threats
• Threat from pure-play vendors
such as Zscaler, Vshield from
VMware and Symplified that
have high growth rates
• Threat to its market share from
other traditional security
solution providers that are
expected to aggressively push
for expansion in this market
Some Key Competitors
• Trend Micro SecureCloud, and Trend Micro Deep
Security
• CA Access Control, and CA Identity Manager
• Symplified Mobile Edition, Symplified Access
Manager, and Symplified Identity Manager
• CloudPassage cloud server exposure
management
• Okta Cloud Services Platform
• GuardTime Keyless Signature Server
• CipherCloud Data Protection for Salesforce
Major Customers
• AT&T Global Network Services Client
• Citrix
• Microsoft VPN
• Juniper Networks
• Verizon
Other Information
Knowledge base Website
https://kc.mcafee.com/corporate/index?page=home
Security as a service by Mcafee
http://www.mcafee.com/us/products/security-as-a-
service/index.aspx
Netflix
Netflix is a commercial entertainment web based
company, by online subscriptions they provide website
TV shows and movies to subscribers with the online
streaming technology and also send DVD’s using US
mail service.
In 2010, Netflix started migrating its infrastructure to
Amazon EC2. At present Netflix has over 1 Petabyte of
data stored on Amazon, and the data are sent to
content delivery networks such as Akamai, Limelight
etc., that feed the content to local ISPs.
What Netflix is now?
• 24+ million members globally
• Streaming in 47 countries
• Watch on more than 700 Devices
• 33% of US peak evening Internet traffic
Why Did Netflix moved to Cloud
• Netflix is growing and adding subscribers at an
unprecedented rate. The company is expanding into
global markets, and an ever-growing array of Netflix-
ready devices is spurring streaming service to even
faster growth. At the heart of Netflix technology is the
Cloud Computing platform, which serves as the
distributed systems foundation for Netflix application
development, and powers the movie viewing
experience for millions of customers every day.
Netflix Cloud Security Strategy
• New deployments and upgrades
• Capacity planning & procurement
• Key management
• Detecting instance changes
• Application ownership, management
• Patching, updating
• Availability, in a failure-prone environment
• Embedding security controls
• Least privilege enforcement
• Testing/auditing for conformance
• Consistency, conformity in build and launch
• Continuous, aggressive monitoring, testing
Questions??
If you are interested in this presentation, I am
uploading this on slideshare.com. You can find
it by searching my name Venkatesh Chary.
Below is link for reference:

Mais conteúdo relacionado

Mais procurados

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security PresentationAjay p
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 

Mais procurados (20)

SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure SentinelThreat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
OWASP Cloud Top 10
OWASP Cloud Top 10OWASP Cloud Top 10
OWASP Cloud Top 10
 
IBM Qradar
IBM QradarIBM Qradar
IBM Qradar
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cloud Computing paradigm
Cloud Computing paradigmCloud Computing paradigm
Cloud Computing paradigm
 

Destaque

Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directoryDevyani Vaidya
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Devyani Vaidya
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile Devyani Vaidya
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brainkoustuba
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet Devyani Vaidya
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing SecurityDevyani Vaidya
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwavesDevyani Vaidya
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 

Destaque (20)

Resource management
Resource managementResource management
Resource management
 
Seminar on telephone directory
Seminar on telephone directorySeminar on telephone directory
Seminar on telephone directory
 
Fuels Saver System
Fuels Saver SystemFuels Saver System
Fuels Saver System
 
Environmental law
Environmental lawEnvironmental law
Environmental law
 
Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting Energy Harvesing Through Reverse Electrowetting
Energy Harvesing Through Reverse Electrowetting
 
Wireless network
Wireless networkWireless network
Wireless network
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Data As A Service
Data As A ServiceData As A Service
Data As A Service
 
Digital Locker
Digital LockerDigital Locker
Digital Locker
 
History of Laptop
History of LaptopHistory of Laptop
History of Laptop
 
Wireless Charging Of Mobile
Wireless Charging Of Mobile  Wireless Charging Of Mobile
Wireless Charging Of Mobile
 
Table of contents blue brain
Table of contents blue brainTable of contents blue brain
Table of contents blue brain
 
Ppt on open and close door using Applet
Ppt on open and close door using Applet Ppt on open and close door using Applet
Ppt on open and close door using Applet
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
Wireless mobile charging using microwaves
Wireless mobile charging using microwavesWireless mobile charging using microwaves
Wireless mobile charging using microwaves
 
secued cloud
 secued cloud secued cloud
secued cloud
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Applet programming
Applet programming Applet programming
Applet programming
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 

Semelhante a Cloud Security

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Adewole Shitta-bey
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04Avinaba Basu
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - finalsvanelderen
 
Microsoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification StrategyMicrosoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification StrategyWilliam Burkey, MBA
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptarun nalam
 
Encloud en ppt 1
Encloud en ppt 1Encloud en ppt 1
Encloud en ppt 1Suraj B
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015ISSA LA
 

Semelhante a Cloud Security (20)

Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 
Microsoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification StrategyMicrosoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification Strategy
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Encloud en ppt 1
Encloud en ppt 1Encloud en ppt 1
Encloud en ppt 1
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 

Mais de Devyani Vaidya

Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsDevyani Vaidya
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesDevyani Vaidya
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structuresDevyani Vaidya
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage systemDevyani Vaidya
 

Mais de Devyani Vaidya (10)

Hashing
HashingHashing
Hashing
 
Fundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of recordsFundamental file structure concepts & managing files of records
Fundamental file structure concepts & managing files of records
 
Cosequential processing and the sorting of large files
Cosequential processing and the sorting of large filesCosequential processing and the sorting of large files
Cosequential processing and the sorting of large files
 
Introduction to the design and specification of file structures
Introduction to the design and specification of file structuresIntroduction to the design and specification of file structures
Introduction to the design and specification of file structures
 
Mobile Phone Cloning
 Mobile Phone Cloning Mobile Phone Cloning
Mobile Phone Cloning
 
Barcode Technology
Barcode TechnologyBarcode Technology
Barcode Technology
 
3D- Doctor
3D- Doctor3D- Doctor
3D- Doctor
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 

Último

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 

Último (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 

Cloud Security

  • 2. What is Cloud Security? Cloud • Agility • Self-service • Scale • Automation Security • Gate-keeper • Standards • Control • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
  • 3. Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million
  • 4. Global Cloud Security Market Growth Analysis 2012-2014 (US$ million) 425.4 629.6 963.4 0 200 400 600 800 1000 1200 2012 2013 2014
  • 5. Global Geographies • The Americas • Europe, the Middle East and Africa; European Medicines Evaluation Agency. (EMEA) • Asia Pacific (APAC)
  • 6. Global Cloud Security Market in Percentage 2012 Global Cloud Security Market Global Security Market 4 96 2014 Global Cloud Security Market Global Security Market
  • 7. End-Users/Customers • Large Enterprises • Government Agencies • Cloud Service Providers (CSPs) • Medium-sized Enterprises
  • 8. Global Cloud Security Market by End- User Segmentation 38 31 17 9 5 Large Enterprises Government Agencies Cloud Service Providers Medium Enterprises Other/Third Party Vendors
  • 9. Trends associated with Cloud Security • Increasing Partnerships between CSPs and Security Solution Providers Expected • Increasing Emergence of Cloud Service-specific Security Solution Providers • Identity Management and Encryption to Remain the Top Cloud Security Solutions Offered • Increasing Availability of Cloud Security Solutions for Small and Medium-sized Businesses (SMBs) • Emergence of Strong Cloud Security Standard and Guidelines
  • 10. Why is Cloud Security Important • Increasing Usage of Cloud Services in Non- traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility
  • 11. What are the challenges? • CSPs believe that Security is End-users’ Issue • Lack of Awareness about Cloud Security • Inconsistent Network Connection Issues • Lack of Proper Cloud Security Standards
  • 12. What End-users/customers expect from Cloud Security • Strong Overall Security Offered • Suite of Security Solutions Offered • Encryption Key Management Features Offered • Availability of Fine Granular Control
  • 13. McAfee Inc. • McAfee Inc., founded in 1987, is a leading provider of network security solutions. The company is listed on the New York Stock Exchange and is based in California, US. The company provides security services across the globe. The company’s security products are for sectors such as Data Protection, Email and Web Security, Endpoint Protection, Mobile Security, Network Security, Risk and Compliance, Security Software as a Service (Security SaaS), and Security Management.
  • 14. McAfee acquired by Intel • On August 19, 2010 Intel acquired McAfee for $7.68 billion in a cash deal. In FY2010, the company reported total revenue of US$2.1 billion. However, in FY2010, the revenue from the Cloud Security segment was low, at only around US$25 million.
  • 15. McAfee Cloud Security Program McAfee Security-as-a-Service delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs. As part of our Security Connected framework that delivers comprehensive security and integrated management, McAfee Security SaaS leverages the power of the cloud to help organizations realize faster time-to-protection to secure their business.
  • 16. McAfee SaaS Includes • McAfee SaaS Email Protection • McAfee SaaS Integrated Suites • McAfee SaaS Endpoint Protection • McAfee SaaS Vulnerability Management • McAfee SaaS Web Protection
  • 17. SWOT Analysis Strengths • The company’s cloud access control solution allows control over the entire lifecycle of cloud access security, providing solutions such as SSO, provisioning, strong authentication and audit. • Its solution helps in auto- synchronization of identity data between enterprise and cloud applications for change management scenarios • Centralized management and reporting are provided through integration with the McAfee ePolicy Orchestrator platform Weakness • Despite being an established traditional security solution provider with a wide geographic presence, the company is slow to gain share in the cloud security space • Some pure-play companies such as Symplified are witnessing much higher growth in the Cloud Identity Management market • Some of its competitors, such as Trend Micro, provides better key management options/features
  • 18. SWOT Analysis Opportunities • The company has a very long list of partners from various geographic locations, which it can leverage to expand • It recently launched its cloud security platform, which secures all content and data traffic including email, web and identity traffic; thus, providing a unified solution Threats • Threat from pure-play vendors such as Zscaler, Vshield from VMware and Symplified that have high growth rates • Threat to its market share from other traditional security solution providers that are expected to aggressively push for expansion in this market
  • 19. Some Key Competitors • Trend Micro SecureCloud, and Trend Micro Deep Security • CA Access Control, and CA Identity Manager • Symplified Mobile Edition, Symplified Access Manager, and Symplified Identity Manager • CloudPassage cloud server exposure management • Okta Cloud Services Platform • GuardTime Keyless Signature Server • CipherCloud Data Protection for Salesforce
  • 20. Major Customers • AT&T Global Network Services Client • Citrix • Microsoft VPN • Juniper Networks • Verizon Other Information Knowledge base Website https://kc.mcafee.com/corporate/index?page=home Security as a service by Mcafee http://www.mcafee.com/us/products/security-as-a- service/index.aspx
  • 21. Netflix Netflix is a commercial entertainment web based company, by online subscriptions they provide website TV shows and movies to subscribers with the online streaming technology and also send DVD’s using US mail service. In 2010, Netflix started migrating its infrastructure to Amazon EC2. At present Netflix has over 1 Petabyte of data stored on Amazon, and the data are sent to content delivery networks such as Akamai, Limelight etc., that feed the content to local ISPs.
  • 22. What Netflix is now? • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 Devices • 33% of US peak evening Internet traffic
  • 23. Why Did Netflix moved to Cloud • Netflix is growing and adding subscribers at an unprecedented rate. The company is expanding into global markets, and an ever-growing array of Netflix- ready devices is spurring streaming service to even faster growth. At the heart of Netflix technology is the Cloud Computing platform, which serves as the distributed systems foundation for Netflix application development, and powers the movie viewing experience for millions of customers every day.
  • 24. Netflix Cloud Security Strategy • New deployments and upgrades • Capacity planning & procurement • Key management • Detecting instance changes • Application ownership, management • Patching, updating • Availability, in a failure-prone environment • Embedding security controls • Least privilege enforcement • Testing/auditing for conformance • Consistency, conformity in build and launch • Continuous, aggressive monitoring, testing
  • 25. Questions?? If you are interested in this presentation, I am uploading this on slideshare.com. You can find it by searching my name Venkatesh Chary. Below is link for reference: