Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

With FireHost You Can Have it All: Performance & Security

At FireHost we believe you can have it all with no trade-offs! Join us as we discuss: Security, and Performance.

  • Inicia sesión para ver los comentarios

With FireHost You Can Have it All: Performance & Security

  1. 1. 31 July 2014 You Can Have It All Todd Gleason Security AND Performance VP of Technology
  2. 2. Today’s Speakers Performance and Security Todd Gleason VP of Technology Gleason is a central figure in continuously innovating and architecting the secure cloud infrastructure for FireHost and its customers. He brings 20 years of experience in technology including global IT, R&D, security, cloud, networking, compute, virtualization, storage, and application development and delivery technologies. Gleason has helped redefine industry expectations about performance, security, and compliance in the cloud.
  3. 3. • History of Computing & Performance Implications • Performance Growth & Conflicts • The Myth of the Security/Performance Tradeoff • Boosting Performance with Security • Pricing Comparison • Questions & Answers Agenda Performance and Security
  4. 4. Moore’s Law The observation made in 1965 by Gordon Moore, co- founder of Intel, that the number of transistors per square inch on an integrated circuit will double every year. It’s a trend that has continued since the invention of the integrated circuit. 1965 30 1000 10,000 100,000 1,000,000 10,000,000 100,000,000 1,000,000,000 1970 1975 1980 1985 1990 1995 2000 2005 2010 transistors transistors transistors transistors transistors transistors transistors transistors
  5. 5. The History of Computing
  6. 6. Performance and Security Security Barriers to Performance Cost Expertise
  7. 7. Performance SecurityMyth: & Tradeoff
  8. 8. Performance and Security Change your Thinking Have It All You Can
  9. 9. How Security Enhances Performance No bottlenecks and cleaner traffic Bottlenecks and unwanted traffic Enhanced Performance Hindered Performance with less effective bolt-on security with all-encompassing integrated security
  10. 10. How Does it Work? Performance and Security
  11. 11. Perimeter Security Performance and Security
  12. 12. Virtual Server Security Performance and Security
  13. 13. Supporting Security Services Performance and Security
  14. 14. Secure Administrative Access Performance and Security
  15. 15. Putting It All Together Performance and Security
  16. 16. Performance and Security
  17. 17. Pricing Comparison Performance and Security Comparing Apples to Oranges When comparinglist price to list price, FireHost initiallyappearsmore expensive thanother cloud providers. Performance Adjustment Once adjusted for performance, the price gap is significantly reduced, in some cases favoring FireHost. Security Adjustment Adding in the cost from security products, FireHost becomes the less expensive, easier-to-manage option. Support Adjustment Some other providers also require additional fees for support, further strengthening FireHost’s TCO advantage. cost
  18. 18. December 2013 January 2014 110 million customers’ credit card and personal data stolen 1.1 million customers’ credit and debit card data stolen 3 million customers’ credit and debit card data stolen April 2014 May 2014 June 2014 145 million users’ passwords affected (Forensics under way) Credit and debit cards ? Who’s Next? Performance and Security
  19. 19. & Questions Answers Performance and Security
  20. 20. Thank You Please visit us at Email Phone +1 877 262 3473 Performance and Security