SlideShare uma empresa Scribd logo
1 de 13
Pravin Kothari
          Founder & CEO

Co-founder ArcSight (acquired by HP)
     Founder, Agiliance (IT-GRC)
  Co-founder Impresse.com (B2B)




        October 2011
Cloud Adoption & Innovation
Expanding from Mid-market to Enterprise




    Public Cloud
  Services $176B in
   2015 (Gartner)
 26% Growth in 2010




                                          2
Cloud Computing – What’s the risk..
 Escalating Security Breaches




Dropbox confirms security glitch—
                                                  RSA Breach
                                                  RSA had a huge breach this week. Attackers stole
no password required                              information for 40 million two-factor authentication
Web-based storage firm Dropbox confirmed this     accounts. And the ones affected most may be
afternoon that a security breach allowed any      countless enterprise and cloud-based services
password to be used to access any user account.   in the public and private sector




Twitter breach revives cloud security fears
The breach of a hosted Google Apps application
used by Twitter employees has heightened
concerns over the security of cloud computing
Cloud Computing in Enterprise
Tug of War Between Business Users & Security
   Business Execs Desire       Security/Compliance Execs
    More Cloud Services          Have Cloud Concerns

                                       Lack of Control
       Agility & Flexibility
                                         & Visibility

                                        Data Privacy,
          Reduce cost
                                       Data Residency

     Minimal Administration        Regulatory Compliance

      Best-of-breed apps,          Emerging Cloud Threats
     Mobility & Social Media




                                                            4
Survey
 Public cloud services in your enterprise?
    1.   In use enterprise wide
    2.   In use in a few projects / departments
    3.   Expected in 6mos
    4.   Sometime in future

 Private or Public cloud in your enterprise?
    1. Private
    2. Hybrid
    3. Public

 Cloud services in your enterprise?
    1.   Email and office collaboration e.g. Google Apps, Microsoft
    2.   Storage & backup Box.net, Dropbox
    3.   SaaS e.g. Salesforce.com
    4.   IaaS e.g. Amazon
    5.   PaaS e.g. Force.com, Amazon S3/SimpleDB…, Google App Engine




                                                             CipherCloud Confidential   5
CipherCloud Encryption Gateway
Encrypt Sensitive Data On-the-fly Before it Leaves Your Network




                                                        Unified Policies
                                                       Across All Clouds




                                              In-line Gateway
                                              Encryption & Tokenization
                                              Format-&-Function preserved
                                              Customer retains Keys
                                              No impact on usability


                                                       CipherCloud Confidential   6
LIVE PRODUCT DEMO
Sample Customer Use Cases
    Organization                             Pain-points Addressed                                  Drivers
New Democratic Party of
Canada
                                   24M Canadian voters identities going to the US cloud                    R
Multi-national Investment   Highly sensitive M&A information going to cloud – most concerned
Bank                                       about insider threat at cloud provider                     P, S
Insurance Company           Requires all customer PHI data to be stored encrypted in the cloud        P, C
                            Customers uploaded tax & income documents need to be scanned
Mortgage Bank
                                             for malware and encrypted                                P, S
Health Insurance - Public     Physicians needed a new effective collaborative tool, to improve
Sector                      communications while also reducing data breaches (HIPAA, FISMA)           P, C
F100 Technology                  PCI required encryption of credit card and other PII data                 C
Personal care product
Manufacturer, Germany
                              Their retailer-resellers required compliance over uploaded data         R, C




                       R: Data Residency         P: Data Privacy         C: Compliance           S: Security


                                                                                CipherCloud Confidential       8
Open & Extensible Platform to build Ecosystem
Rapid Development of 3rd-Party Cloud/App Plug-ins




                                             Private
                                             Cloud


            Ownership




                        Out-of-the-box       Open
    CipherCloud
                            Cloud           Plug-in
      Gateway
                         Integration      Framework




                                            CipherCloud Confidential   9
CipherCloud Technology Summary
Patent-pending Technology
 Comprehensive data protection for all clouds
     Encryption, Tokenization, Key ownership
     Malware Detection & Cloud-Audit (Q4’11)
 Wire speed, Zero latency
 Strong security, 3rd-party tested
 Mobile support
 Fast deployment




              “We are impressed by CipherCloud's robust technology, security
              and performance.” - Canadian New Democratic Party
                                                           CipherCloud Confidential   10
Customer Benefits
Comprehensive Cloud Data Protection
 Protect against emerging cloud threats
 Eliminate data privacy and security concerns
 Satisfy compliance and data-residency requirements
 Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)
    Data Breach cost estimated at $214 per customer record*
        e.g. Over $2M for 10K records

 Accelerate cloud adoption
    Significant cost savings migrating on-premise apps to cloud




                                                        *The Ponemon Institute

                 “Without CipherCloud, we won’t be able to use cloud.”
                     Customer interview in SearchCloudSecurity.com               11
Proven Management Team
Pravin Kothari, CISSP, CISA                      Varun Badhwar, CISSP, CISA
Founder & CEO                                    VP Product Marketing & Alliances
Co-founder ArcSight (IPO, $1.6B exit)            Global ISV Security Salesforce.com
Founder, Agiliance (IT-GRC Leader)               Risk Advisory KPMG
Co-founder Impresse.com (B2B)

Chakra Yadavalli, CISA                           Michael Kochanik
VP Engineering, Chief Architect                  VP Worldwide Sales
Head of IDC Agiliance (IT-GRC)                   VP Sales & GM CollabNet
Chief Architect, Phulaxis (ERP SoD)              Director Geodesic Systems; IKOS Systems


              Sun-Microsoft - Dev Ghoshal        Fifth Third Bank ex-CISO Bob West
 Expert
              KPMG Partner- Shahed Latif         Kaiser Director Risk –Ramy Houssaini
Advisory
              AIG CISO– Paul de Graaff           Qualys Founder – Gilles Samoun
 Board
              Prudential ex-CISO- Ken Tymisnki   Marriott ex-VP, Info Protection -Chris Zoladz


Investors


                                                                                                 12
Honors and Awards
 Gartner Cool Vendor in Cloud Security Services 2011
 Most Innovative Company Finalist, RSA Conference 2011
 Best in Security , Under The Radar 2011 Judge & Audience Choice Winner
 Best in Software & Cloud , TiEcon 2011 Innovation Expo Winner
 2011 SINET 16 Innovators (Oct 25, 2011, DC)
 Best Startup in America West, Global Security Challenge (Oct 27, 2011 London)




                                                                              13

Mais conteúdo relacionado

Mais procurados

CloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsCloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsChris Purrington
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualVMware Tanzu
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Vince Santo
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...Amazon Web Services
 
Avner algom feb 7 2012
Avner algom feb 7 2012Avner algom feb 7 2012
Avner algom feb 7 2012Avner Algom
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Lokesh Agarwal
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009mattdriscoll
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarBosnia Agile
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackRon Batra
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 

Mais procurados (20)

CloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsCloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William Fellows
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
Avner algom feb 7 2012
Avner algom feb 7 2012Avner algom feb 7 2012
Avner algom feb 7 2012
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021
 
Virtual Instruments Presentation
Virtual Instruments PresentationVirtual Instruments Presentation
Virtual Instruments Presentation
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana Seliškar
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications Track
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 

Semelhante a Cloud Adoption & Innovation Survey Results

Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Charting a path to the cloud final
Charting a path to the cloud finalCharting a path to the cloud final
Charting a path to the cloud finalScott Clinton
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comDeepu S Nath
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in ThailandIMC Institute
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Mark Silverberg
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 

Semelhante a Cloud Adoption & Innovation Survey Results (20)

Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Charting a path to the cloud final
Charting a path to the cloud finalCharting a path to the cloud final
Charting a path to the cloud final
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.com
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cloud Adoption & Innovation Survey Results

  • 1. Pravin Kothari Founder & CEO Co-founder ArcSight (acquired by HP) Founder, Agiliance (IT-GRC) Co-founder Impresse.com (B2B) October 2011
  • 2. Cloud Adoption & Innovation Expanding from Mid-market to Enterprise Public Cloud Services $176B in 2015 (Gartner) 26% Growth in 2010 2
  • 3. Cloud Computing – What’s the risk.. Escalating Security Breaches Dropbox confirms security glitch— RSA Breach RSA had a huge breach this week. Attackers stole no password required information for 40 million two-factor authentication Web-based storage firm Dropbox confirmed this accounts. And the ones affected most may be afternoon that a security breach allowed any countless enterprise and cloud-based services password to be used to access any user account. in the public and private sector Twitter breach revives cloud security fears The breach of a hosted Google Apps application used by Twitter employees has heightened concerns over the security of cloud computing
  • 4. Cloud Computing in Enterprise Tug of War Between Business Users & Security Business Execs Desire Security/Compliance Execs More Cloud Services Have Cloud Concerns Lack of Control Agility & Flexibility & Visibility Data Privacy, Reduce cost Data Residency Minimal Administration Regulatory Compliance Best-of-breed apps, Emerging Cloud Threats Mobility & Social Media 4
  • 5. Survey  Public cloud services in your enterprise? 1. In use enterprise wide 2. In use in a few projects / departments 3. Expected in 6mos 4. Sometime in future  Private or Public cloud in your enterprise? 1. Private 2. Hybrid 3. Public  Cloud services in your enterprise? 1. Email and office collaboration e.g. Google Apps, Microsoft 2. Storage & backup Box.net, Dropbox 3. SaaS e.g. Salesforce.com 4. IaaS e.g. Amazon 5. PaaS e.g. Force.com, Amazon S3/SimpleDB…, Google App Engine CipherCloud Confidential 5
  • 6. CipherCloud Encryption Gateway Encrypt Sensitive Data On-the-fly Before it Leaves Your Network Unified Policies Across All Clouds  In-line Gateway  Encryption & Tokenization  Format-&-Function preserved  Customer retains Keys  No impact on usability CipherCloud Confidential 6
  • 8. Sample Customer Use Cases Organization Pain-points Addressed Drivers New Democratic Party of Canada 24M Canadian voters identities going to the US cloud R Multi-national Investment Highly sensitive M&A information going to cloud – most concerned Bank about insider threat at cloud provider P, S Insurance Company Requires all customer PHI data to be stored encrypted in the cloud P, C Customers uploaded tax & income documents need to be scanned Mortgage Bank for malware and encrypted P, S Health Insurance - Public Physicians needed a new effective collaborative tool, to improve Sector communications while also reducing data breaches (HIPAA, FISMA) P, C F100 Technology PCI required encryption of credit card and other PII data C Personal care product Manufacturer, Germany Their retailer-resellers required compliance over uploaded data R, C R: Data Residency P: Data Privacy C: Compliance S: Security CipherCloud Confidential 8
  • 9. Open & Extensible Platform to build Ecosystem Rapid Development of 3rd-Party Cloud/App Plug-ins Private Cloud Ownership Out-of-the-box Open CipherCloud Cloud Plug-in Gateway Integration Framework CipherCloud Confidential 9
  • 10. CipherCloud Technology Summary Patent-pending Technology  Comprehensive data protection for all clouds  Encryption, Tokenization, Key ownership  Malware Detection & Cloud-Audit (Q4’11)  Wire speed, Zero latency  Strong security, 3rd-party tested  Mobile support  Fast deployment “We are impressed by CipherCloud's robust technology, security and performance.” - Canadian New Democratic Party CipherCloud Confidential 10
  • 11. Customer Benefits Comprehensive Cloud Data Protection  Protect against emerging cloud threats  Eliminate data privacy and security concerns  Satisfy compliance and data-residency requirements  Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)  Data Breach cost estimated at $214 per customer record*  e.g. Over $2M for 10K records  Accelerate cloud adoption  Significant cost savings migrating on-premise apps to cloud *The Ponemon Institute “Without CipherCloud, we won’t be able to use cloud.” Customer interview in SearchCloudSecurity.com 11
  • 12. Proven Management Team Pravin Kothari, CISSP, CISA Varun Badhwar, CISSP, CISA Founder & CEO VP Product Marketing & Alliances Co-founder ArcSight (IPO, $1.6B exit) Global ISV Security Salesforce.com Founder, Agiliance (IT-GRC Leader) Risk Advisory KPMG Co-founder Impresse.com (B2B) Chakra Yadavalli, CISA Michael Kochanik VP Engineering, Chief Architect VP Worldwide Sales Head of IDC Agiliance (IT-GRC) VP Sales & GM CollabNet Chief Architect, Phulaxis (ERP SoD) Director Geodesic Systems; IKOS Systems Sun-Microsoft - Dev Ghoshal Fifth Third Bank ex-CISO Bob West Expert KPMG Partner- Shahed Latif Kaiser Director Risk –Ramy Houssaini Advisory AIG CISO– Paul de Graaff Qualys Founder – Gilles Samoun Board Prudential ex-CISO- Ken Tymisnki Marriott ex-VP, Info Protection -Chris Zoladz Investors 12
  • 13. Honors and Awards  Gartner Cool Vendor in Cloud Security Services 2011  Most Innovative Company Finalist, RSA Conference 2011  Best in Security , Under The Radar 2011 Judge & Audience Choice Winner  Best in Software & Cloud , TiEcon 2011 Innovation Expo Winner  2011 SINET 16 Innovators (Oct 25, 2011, DC)  Best Startup in America West, Global Security Challenge (Oct 27, 2011 London) 13