SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Evaluating Risks of Cloud-Based Services

Ronald Poserina
Symantec.cloud - Director, Enterprise & Partners
What Does It Take to be Secure?
The Three T’s


• Talent



• Time



• Technology


Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   2
Three T’s: Talent, Time, & Technology

Talent
• Do you have personnel that are knowledgeable on security risks
  and can lead your organization in best risk management
  practices?
• Are you willing to devote the financial resources to recruitment,
  training (initial and on-going), and personnel management?




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011
Three T’s: Talent, Time, & Technology

 Time
 • Are your security defenses monitored and managed around the
   clock?
 • Can your security personnel respond with sufficient speed and
   effectiveness to new security threats?
 • Do you have the financial means to have this time devotion?




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011
Three T’s: Talent, Time, & Technology

Technology
• In today’s and tomorrow’s dynamic and increasingly
  sophisticated and stealthy threat environment, do you have the
  most up-to-date and optimal mix of security technologies?
• As your organization’s working methods change (e.g., more
  distributed, mobile, collaborative, modular), is your security in
  synch?
• Time and $$$ again, do you have the resources to stay current
  on security innovations, evaluate products, test, and deploy?



Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011
Options

          Build          Cloud




                  SYMANTEC VISION 2011   6
Consider the Benefits: Services from the Cloud


                     • Predictable expense (OPEX)
    Lower TCO        • Reduced Infrastructure costs (heating, cooling, rack-space, etc)


                     • Simplifies Your Architecture
   Simplification    • Simplifies IT Operations and management


                     • Best-of-breed layered threat protection in real-time
      Security       • Stops threats before they reach corporate network



     Scalability     • Able to grow or reduce with your business



                     • Centralized management consoles and policy control
    Ease of use      • 24/7 expert support


                                          SYMANTEC VISION 2011
Can I Trust Public Clouds?




                             SYMANTEC VISION 2011   8
Top SaaS Concerns                                                                                        (% of respondents)




                                                                                               Public
                                                                                               Private




                            Source: IDC, Cloud Computing Attitudes, April 2010, n = 255.
Evaluating Risks of Cloud-based Services                                      SYMANTEC VISION 2011                  9
Common Questions About the Cloud
• Data Locality – Where is my data?
• Data Access – Who can access my data in your company?
• Data Segregation – How is my data segregated from other
  customers?
• Regulatory Compliance – What do I need to know?




                                      SYMANTEC VISION 2011   10
Data Locality – Which Data Centers?




                             South Africa




                              SYMANTEC VISION 2011   11
Data Access – What Controls are in Place?
  Change Control Processes

  Multi-Factor Authentication

  Secure data storage

  Logging and audit trails

  Threat modelling

  Tracking code execution

  Data path through systems

  Ethical Hack/Penetration testing

  Hashes used for all passwords

  Encryption in motion / Encryption at rest

                                              SYMANTEC VISION 2011   12
Physical Security
• Biometrics (palm print, retina scan, fingerprint reader);
  numerical entry pad; smart card swipe system; physical locks
• Systems situated in locked cages or suites
• Independent CC TV system within our suites/cages
• All access is logged and tracked and must be pre-scheduled




                                     SYMANTEC VISION 2011        13
Data Security
• Developer access restricted to test systems
• Access Entitlement Reviews
• Use ISO 27001 standards for all employee vetting, and controls
• Limited access to physical mail to small monitored population
• Access to production infrastructure is via a secure segregated
  management network and encrypted protocols such as SSH and
  RDP over TLS
• Access to production systems via two-factor authentication
• controls over access to configuration files, system binaries etc



                                      SYMANTEC VISION 2011           14
SaaS Certifications




                      SYMANTEC VISION 2011   15
Availability Concerns
• Do you guarantee system availability?
• In case of a major disaster, what major systems do you have in
  place?




                                     SYMANTEC VISION 2011          16
Addressing Availability
• Remove Single Points of Failure
  – Multiple systems, datacenters, feeds & vendors
  – Geographically diverse operations centers
• Capacity Planning
• Business Continuity Planning




                                          SYMANTEC VISION 2011   17
Perceived Loss of Control
• How do I know what the cloud is doing with my data?
• What capabilities will I have to control policy?
• Reporting and metrics are important and I need access on
  demand.
• What trouble-shooting or diagnostic tools will I have?
• How reliable and helpful with the vendors support team be?




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   18
Control Concerns – Management Portal
• Policy Management
• Reporting Access
• Troubleshooting /
  Tracking
• Multi-tiered levels of
  access
• Alerting and service
  news




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   19
Control Concerns – Getting Help
• 24x7x365 Global Technical Support Dedicated to SaaS Service
     – Portal / Email / Telephone
     – Multilingual
• Extensive documentation
• Online training videos
• Implementation plans
• Best Practices




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   20
Reputation – Who’s Using the Provider?
Over 32,000 customers and billions of mails and web transactions processed daily




                                                 SYMANTEC VISION 2011
Service Level Agreements
• Know what you’re paying for
• Review contract terms and understand how SLA’s apply
• Ask how SLA’s are reported on
• What are you entitled to in the event SLA’s aren't met?
• Compare SLA’s of vendors your considering for like services




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   22
Service Level Agreements


                                            AntiSpam                 SLA                  99%




                                                                                                 February 2011 Performance
                                                                                                 February 2011 Performance
                                            effectiveness                           99.99997%

                                            Spam false               SLA               0.0003%
                                            positive rate                           0.000007%

                                            AntiVirus false          SLA               0.0001%
                                            positive rate                           0.000003%

                                            Email & Web Service      SLA                 100%
                                            Availability                                100%



 Evaluating Risks of Cloud-based Services                     SYMANTEC VISION 2011                                           23
The Symantec.cloud Difference
Delivery

• SLA focused service model
    – 100% Availability and 100% Virus protection (known and unknown)
    – 99% Spam capture
    – Latency guarantee under 60 seconds email 100 ms web
• Security focused
    – SAS 70 Type II Audits on Datacenters
• Global Infrastructure




Evaluating Risks of Cloud-based Services     SYMANTEC VISION 2011       24
The Symantec.cloud Difference
Technology

• 13 Years of Experience in Delivering IT solutions from the cloud
• Skeptic™ Heuristics
• Converged Threat Analysis
• Integrated reporting and policy management
• Network design and Capacity planning




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011      25
The Symantec.cloud Difference
Support

• Non-standard Support Model
• Dedicated Technical resources




Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011   26
Rowan Trollope: 6 tips for companies moving into the cloud 1

1. Reputation - Check out the reputation of the service provider:
   How long have they been offering cloud services, bearing in
   mind that size isn't everything; many big companies are piling
   into the market but don't know what they are doing
2. Security - Security is key. Really understand how secure your
   data have to be, and ask the vendor how they would solve
   your security problems
3. Resiliency - Investigate how the cloud provider makes back-up
   copies of your data, how you can move the data to another
   provider, and what happens if the provider goes out of
   business

Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011
Rowan Trollope: 6 tips for companies moving into the cloud 1

4. Service Levels - Work hard to get a good service level
   agreement with clear financial penalties to ensure a good
   service.
5. Certification - Be wary of industry certifications, because they
   capture just a moment in time. Do your own research on how
   the vendor is performing
6. Try it out - Finally, try the service. The beauty of cloud
   computing is that it's easy to switch on and off. Obviously
   don't start your cloud adventure with confidential data or
   mission-critical systems, but if the service works for you, you
   can expand.

Evaluating Risks of Cloud-based Services   SYMANTEC VISION 2011
Thank you!
    Ron Poserina
    Ronald_Poserina@symantec.com
    +1 (646) 519-8121




    SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY
    Copyright © 2011 Symantec Corporation. All rights reserved.


Evaluating Risks of Cloud-based Services                          29

Más contenido relacionado

La actualidad más candente

Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 
Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10Symantec
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Grant Swanson
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...CA Technologies
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Microsoft Technet France
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxMicrosoft Technet France
 

La actualidad más candente (20)

Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
Technology Primer: Software-Defined Networking and Its Impact on Infrastructu...
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
Information Security
Information SecurityInformation Security
Information Security
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
LyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des RéseauxLyncConference2013 - Dimensionnement et gestion des Réseaux
LyncConference2013 - Dimensionnement et gestion des Réseaux
 

Similar a Evaluating Risks of Cloud Based Services

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceVMware Tanzu
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderDatapipe
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpointCloudPassage
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 

Similar a Evaluating Risks of Cloud Based Services (20)

Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer ExperienceHow VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
How VMware IT Modernized My VMware to Deliver an Exceptional Customer Experience
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Securing Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service ProviderSecuring Your Business #3 - Role Of The Service Provider
Securing Your Business #3 - Role Of The Service Provider
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 

Más de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 

Más de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Evaluating Risks of Cloud Based Services

  • 1. Evaluating Risks of Cloud-Based Services Ronald Poserina Symantec.cloud - Director, Enterprise & Partners
  • 2. What Does It Take to be Secure? The Three T’s • Talent • Time • Technology Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 2
  • 3. Three T’s: Talent, Time, & Technology Talent • Do you have personnel that are knowledgeable on security risks and can lead your organization in best risk management practices? • Are you willing to devote the financial resources to recruitment, training (initial and on-going), and personnel management? Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011
  • 4. Three T’s: Talent, Time, & Technology Time • Are your security defenses monitored and managed around the clock? • Can your security personnel respond with sufficient speed and effectiveness to new security threats? • Do you have the financial means to have this time devotion? Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011
  • 5. Three T’s: Talent, Time, & Technology Technology • In today’s and tomorrow’s dynamic and increasingly sophisticated and stealthy threat environment, do you have the most up-to-date and optimal mix of security technologies? • As your organization’s working methods change (e.g., more distributed, mobile, collaborative, modular), is your security in synch? • Time and $$$ again, do you have the resources to stay current on security innovations, evaluate products, test, and deploy? Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011
  • 6. Options Build Cloud SYMANTEC VISION 2011 6
  • 7. Consider the Benefits: Services from the Cloud • Predictable expense (OPEX) Lower TCO • Reduced Infrastructure costs (heating, cooling, rack-space, etc) • Simplifies Your Architecture Simplification • Simplifies IT Operations and management • Best-of-breed layered threat protection in real-time Security • Stops threats before they reach corporate network Scalability • Able to grow or reduce with your business • Centralized management consoles and policy control Ease of use • 24/7 expert support SYMANTEC VISION 2011
  • 8. Can I Trust Public Clouds? SYMANTEC VISION 2011 8
  • 9. Top SaaS Concerns (% of respondents) Public Private Source: IDC, Cloud Computing Attitudes, April 2010, n = 255. Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 9
  • 10. Common Questions About the Cloud • Data Locality – Where is my data? • Data Access – Who can access my data in your company? • Data Segregation – How is my data segregated from other customers? • Regulatory Compliance – What do I need to know? SYMANTEC VISION 2011 10
  • 11. Data Locality – Which Data Centers? South Africa SYMANTEC VISION 2011 11
  • 12. Data Access – What Controls are in Place? Change Control Processes Multi-Factor Authentication Secure data storage Logging and audit trails Threat modelling Tracking code execution Data path through systems Ethical Hack/Penetration testing Hashes used for all passwords Encryption in motion / Encryption at rest SYMANTEC VISION 2011 12
  • 13. Physical Security • Biometrics (palm print, retina scan, fingerprint reader); numerical entry pad; smart card swipe system; physical locks • Systems situated in locked cages or suites • Independent CC TV system within our suites/cages • All access is logged and tracked and must be pre-scheduled SYMANTEC VISION 2011 13
  • 14. Data Security • Developer access restricted to test systems • Access Entitlement Reviews • Use ISO 27001 standards for all employee vetting, and controls • Limited access to physical mail to small monitored population • Access to production infrastructure is via a secure segregated management network and encrypted protocols such as SSH and RDP over TLS • Access to production systems via two-factor authentication • controls over access to configuration files, system binaries etc SYMANTEC VISION 2011 14
  • 15. SaaS Certifications SYMANTEC VISION 2011 15
  • 16. Availability Concerns • Do you guarantee system availability? • In case of a major disaster, what major systems do you have in place? SYMANTEC VISION 2011 16
  • 17. Addressing Availability • Remove Single Points of Failure – Multiple systems, datacenters, feeds & vendors – Geographically diverse operations centers • Capacity Planning • Business Continuity Planning SYMANTEC VISION 2011 17
  • 18. Perceived Loss of Control • How do I know what the cloud is doing with my data? • What capabilities will I have to control policy? • Reporting and metrics are important and I need access on demand. • What trouble-shooting or diagnostic tools will I have? • How reliable and helpful with the vendors support team be? Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 18
  • 19. Control Concerns – Management Portal • Policy Management • Reporting Access • Troubleshooting / Tracking • Multi-tiered levels of access • Alerting and service news Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 19
  • 20. Control Concerns – Getting Help • 24x7x365 Global Technical Support Dedicated to SaaS Service – Portal / Email / Telephone – Multilingual • Extensive documentation • Online training videos • Implementation plans • Best Practices Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 20
  • 21. Reputation – Who’s Using the Provider? Over 32,000 customers and billions of mails and web transactions processed daily SYMANTEC VISION 2011
  • 22. Service Level Agreements • Know what you’re paying for • Review contract terms and understand how SLA’s apply • Ask how SLA’s are reported on • What are you entitled to in the event SLA’s aren't met? • Compare SLA’s of vendors your considering for like services Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 22
  • 23. Service Level Agreements AntiSpam SLA 99% February 2011 Performance February 2011 Performance effectiveness  99.99997% Spam false SLA 0.0003% positive rate  0.000007% AntiVirus false SLA 0.0001% positive rate  0.000003% Email & Web Service SLA 100% Availability  100% Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 23
  • 24. The Symantec.cloud Difference Delivery • SLA focused service model – 100% Availability and 100% Virus protection (known and unknown) – 99% Spam capture – Latency guarantee under 60 seconds email 100 ms web • Security focused – SAS 70 Type II Audits on Datacenters • Global Infrastructure Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 24
  • 25. The Symantec.cloud Difference Technology • 13 Years of Experience in Delivering IT solutions from the cloud • Skeptic™ Heuristics • Converged Threat Analysis • Integrated reporting and policy management • Network design and Capacity planning Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 25
  • 26. The Symantec.cloud Difference Support • Non-standard Support Model • Dedicated Technical resources Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011 26
  • 27. Rowan Trollope: 6 tips for companies moving into the cloud 1 1. Reputation - Check out the reputation of the service provider: How long have they been offering cloud services, bearing in mind that size isn't everything; many big companies are piling into the market but don't know what they are doing 2. Security - Security is key. Really understand how secure your data have to be, and ask the vendor how they would solve your security problems 3. Resiliency - Investigate how the cloud provider makes back-up copies of your data, how you can move the data to another provider, and what happens if the provider goes out of business Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011
  • 28. Rowan Trollope: 6 tips for companies moving into the cloud 1 4. Service Levels - Work hard to get a good service level agreement with clear financial penalties to ensure a good service. 5. Certification - Be wary of industry certifications, because they capture just a moment in time. Do your own research on how the vendor is performing 6. Try it out - Finally, try the service. The beauty of cloud computing is that it's easy to switch on and off. Obviously don't start your cloud adventure with confidential data or mission-critical systems, but if the service works for you, you can expand. Evaluating Risks of Cloud-based Services SYMANTEC VISION 2011
  • 29. Thank you! Ron Poserina Ronald_Poserina@symantec.com +1 (646) 519-8121 SYMANTEC PROPRIETARY/CONFIDENTIAL – INTERNAL USE ONLY Copyright © 2011 Symantec Corporation. All rights reserved. Evaluating Risks of Cloud-based Services 29