32. Data Lost It is unlikely. Reputable Cloud Providers copy data 3-4 times
33. However, it is normal to store highly value-able datain two or more different cloud providers Data Service replicated replicated Cloud Provider 1 Cloud Provider 2
35. Data in Transit data Internet Cloud Provider It can be secured using encryption technology, e.g. SSL It is used especially for sensitive data
36. Data at Rest Cloud Provider Biggest prize for attackers! More and more cloud providers are developing nativedata encryption Even if it is stolen, it will be useless for attackers
39. Security processes are typically in place for physical access Background Check Two factor authentication Intrusion detection system Audit Video surveillance
40. Multi tenant Infrastructure Corporate 4 Corporate 3 Corporate 2 Corporate 1 …infrastructure is shared by many corporations (tenant)
42. Cloud Providers use isolationtechniques Data Isolation Virtualization Computing Isolation a vulnerability in one tenant has little impact on other tenants
60. Follow discussions and presentations on facebook “I’m Cloud Confused” http://www.facebook.com/pages/Im-Cloud-Confused/219897591208?ref=ts
61. You Us 10simple questions,2minutes to completehttp://surveymonkey.com/s.aspx?sm=NrndNTZkoG6j8BWJYejC1g_3d_3d Will Publish Results on facebook
62. Want to try Cloudfor your business now ? Only a few minutes to setup http://www.slideshare.net/Guppers/guppers-3-minute-walkthrough
63. For more presentations like this, visit, follow, subscribe to: Blog: http://www.andyharjanto.com Twitter: http://twitter.com/harjanto Contact: andy@guppers.com