SlideShare una empresa de Scribd logo
1 de 30
Get into the Cloud
Safely and Securely

Manage ● Optimize ● Secure – Since 1987 ™

Bryley Systems Inc.
Copyright 2014
Gavin H. Livingstone
•President, Bryley Systems Inc.
•Over 30 years in computer support
•MBA from Boston College, Novell CNE,
Microsoft MCSE
Bryley Systems is a full-service partner, fulfilling
the information-technology needs of our clients
throughout central New England since 1987.
Visit www.Bryley.com for more information.
Bryley Systems Inc.

Slide 2

Copyright 2014
Synopsis
Cloud Services and your data; learn how to select from
Cloud options while protecting yourself from internal and
external threats:
•How to compare popular Cloud Services
•Preventative measures to secure your Cloud Services
•How to ensure the integrity of your valuable data,
whether inside your office or out in the Cloud

Bryley Systems Inc.

Slide 3

Copyright 2014
Agenda

I. Comparing Cloud Services
A. Going to the Cloud
B. Cloud Computing Service Models
C. Public, Private, and Hybrid Clouds
D. Common SaaS Cloud Services
E. Selection Process
F. Securing Cloud Services

II. Preventative Measures
A. Computer and Internet/Cloud-Use policy
B. Security Policy
C. User Education
D. Technologies

III. Data Integrity
A. Backup
B. Disaster Recovery
Bryley Systems Inc.

Slide 4

Copyright 2014
I. Comparing Cloud Services
A. Going to the Cloud
B. Cloud Computing Service Models
C. Public, Private, and Hybrid Clouds
D. Common SaaS Cloud Services
E. Selection Process
F. Securing Cloud Services

Bryley Systems Inc.

Slide 5

Copyright 2014
• Benefits:

Going to the Cloud

o Eliminate up-front capital expenditure
o Reduce operating costs
o Access from anywhere

• Considerations:
o Ensure sufficient bandwidth, both up and down
o Consider Internet fail-over to ensure availability
o Most start small and expand gradually
Bryley Systems Inc.

Slide 6

Copyright 2014
Cloud Computing Service Models
•Software as a Service (SaaS):
o On-demand software; software and data hosted in Cloud
o Common applications: CRM, ERP, HRM, accounting, etc.
o Web-based interface with subscription fee per user

•Platform as a Service (PaaS):
o Basic components (virtual machines, software) to build on
o Consumer creates the software

•Infrastructure as a Service (IaaS):
o Raw infrastructure (computing hardware, storage, etc.)
o Consumer deploys servers and creates entire environment
Bryley Systems Inc.

Slide 7

Copyright 2014
Public, Private, and Hybrid Clouds
•Public Cloud – Cloud-based resources available to anyone
•Private Cloud – Dedicated Cloud environment:
o
o
o
o

Hosted services to a limited number of people
Usually exclusive Virtual Machine(s)
Protected behind a firewall
Often accessed via VPN

•Hybrid – Interfaced Cloud Services:
o Combination of two or more Clouds (Private, Public)
o Often refers to mix of on-premise plus Cloud-based resources (two
layer)

Go to http://www.Bryley.com/Hosted-Cloud-Server/ for details on
Bryley’s Hosted Cloud Server, our private-cloud service.
Bryley Systems Inc.

Slide 8

Copyright 2014
Common SaaS Cloud Services
•Prevention
•Productivity Suites
•Storage
•Backup and Recovery
Visit http://www.Bryley.com/Solutions/Cloud-Computing/
to see our Cloud Services.

Bryley Systems Inc.

Slide 9

Copyright 2014
SaaS – Prevention

• Most organizations start with Prevention
• Primary options within Prevention:

o Email protection – Controls spam plus offers email encryption and archiving
o End-point security – Secure end-user computers against external attacks
o Web filtering – Prevent/log unauthorized access to undesired websites

• Popular email-protection options include:
o McAfee Email Protection – Continuity & Outbound at $27/user per year
o Microsoft Exchange Online Protection – Exchange only at $12/user per year
o ProofPoint Essentials Business – Outbound & spooling at $26.40/user per year

• Endpoint security from McAfee, Symantec, AVG, Kaspersky
• Web filtering from McAfee, Axway (Tumbleweed), WebSense
• See http://www.Bryley.com/McAfee-SaaS/ for McAfee options
• We also offer secure transfer: http://www.Bryley.com/Leapfile/
Bryley Systems Inc.

Slide 10

Copyright 2014
SaaS – Productivity Suites
•Suite of word processing, spreadsheet, slideshow,
calendar, email, storage, and other applications
•Google Apps for Business:
o $50/user per year
o One size fits all across multiple devices

•Microsoft Office 365:
o Options start at $48/year, but common at $96/year and up
o Greater functionality with familiar interface
o Primarily Windows-based devices
o Visit http://www.Bryley.com/Office365/
Bryley Systems Inc.

Slide 11

Copyright 2014
SaaS – Storage

• Desired features (often found only in paid versions):
o
o
o
o
o

Plans start at $5/user per month; price increases with features & space
File synchronization across multiple devices
Security with rotating encryption keys
Access control and auditing
AD/LDAP integration

• Popular options include:
o Box.net – 10Gb free; highly secure and comprehensive (integration,
access control, etc.) offering. Also, NetSkope second-highest rating.
o Dropbox – 2Gb free; over 200M subscribers. Easiest and most fun to
use, but a bit more expensive than comparable offerings.
o Google Drive – 15Gb free; no frills, but very reliable at reasonable cost.
o Microsoft OneDrive – 7Gb free; offers the most for the least. Includes
unique “Fetch” (from a PC) feature and integrates within MS Office.
Bryley Systems Inc.

Slide 12

Copyright 2014
SaaS – Backup and Recovery

• Desired features:

o Automatically copy image or folders and files to Cloud periodically
o Secure via encryption and somewhat resistant to attack
o Held separately, unchanged, for recovery purposes

• Popular options include:
o Carbonite – Extremely popular; automated, encrypted, and easy to use.
Starts at $59.99/device per year; business plans start at $299.99/year.
o Mozy – Well-known with both home and business versions. Home starts
at $5.99/device per month; business plans start at $26.98/month.
o SOS Online Backup – Includes monitoring, password encryption, and
phone support. Pricing at $9.99/user per month; unlimited users and
devices at $99.99 per month.

• Bryley BU/DR at http://www.Bryley.com/Backup-Data-Recovery
Bryley Systems Inc.

Slide 13

Copyright 2014
Selection Process

• Primary concerns:

o Privacy – Based on type of encryption:
o How are they protecting your data?
o What tools are used to protect data from third-party access?

o Resiliency – Measure dependability of the vendor’s service via SLA:
o How much downtime? Conversely, how much uptime (five 9s) or availability?
o What protocols in-place during downtime? Any remuneration if SLA not met?

o Customization – What to move to the Cloud and when:
o Can vendor support a two-layered approach (on-premise plus Cloud)?
o Can the vendor scale to your needs?

o Control – More control can reduce Total Cost of Ownership:
o What can I configure and manage myself through policies via the admin interface?
o What is no longer available to me?

o Support – Essential for satisfaction, security, and when things go wrong
Details at http://www.eweek.com/c/a/Cloud-Computing/How-to-Assess-CloudBased-EMail-Security-Vendors/.
Bryley Systems Inc.

Slide 14

Copyright 2014
Selection Process (continued)
•Key issues:
o
o
o
o

Administration – Easy setup and enforcement
Effectiveness – Works reliably and consistently
End-user interface – Intuitive, secure, and friendly
Granularity – Allows multi-level policies and permissions

Bryley Systems Inc.

Slide 15

Copyright 2014
Securing Cloud Services

Top 9 threats to Cloud Services in 2013:

1. Data breach – Usually externally, but internal assistance
2. Data loss – Disaster, malware, or lost encryption key
3. Hijacking – Account or service traffic
4. Insecure interfaces and APIs – Awareness
5. Denial of Service (DoS) – Slows performance; increase cost
6. Malicious insiders – Unnecessary access, bad passwords
7. Cloud abuse – Using Cloud computing malevolently
8. Insufficient due diligence – Understand the risks
9. Shared technologies – Shared infrastructure and platform
Visit http://www.Infoworld.com/t/Cloud-Security/9-top-threats-cloud-computing-security-213428.
Bryley Systems Inc.

Slide 16

Copyright 2014
Securing Cloud Services (cont.)

• Cloud Services provider:

o Proper provisioning and deployment of Virtual Machines
o Multi-level security at all points of entry
o Secure access

• Your habits should include:
o
o
o
o
o

Proper policies and Internet/Cloud-use procedures
Remote backup separate from other services
Two-factor authentication where available
Preventative measures
Disaster Recovery plan

Bryley Systems Inc.

Slide 17

Copyright 2014
II. Preventative Measures
A. Computer and Internet/Cloud-Use Policy
B. Security Policy
C. User Education
D. Technologies

Bryley Systems Inc.

Slide 18

Copyright 2014
Preventative – Computer and
Internet/Cloud-Use Policy

•Defines how employees use computer and Internet
(Cloud) while reducing organization’s liability
•Should be as formal as other policy documents
•Objectives:
o Reduce or eliminate unproductive use (personal shopping,
entertainment, etc.)
o Prohibit illegal use (downloading copyrighted materials,
gambling, pornography, etc.)
o Limit legal liability (sexual harassment, illegal activities)
Bryley Systems Inc.

Slide 19

Copyright 2014
Preventative – Computer and

Internet/Cloud-Use Policy (continued)
•Include within Employee Manual
•Require separate sign-off
•Some suggestions:
o
o
o
o

Use only company-provided Cloud Services
Use only company-approved software
Do not share accounts and passwords
Restrict to business-use only

Bryley Systems Inc.

Slide 20

Copyright 2014
Preventative – Security Policy
•Complements Computer & Internet/Cloud-Use policy
•Defines, from a technology standpoint, what is allowed
and not allowed in the Cloud and on the local network
•Defines the process for making changes, including who
authorizes these changes
•Written Security Information Program (WISP)
•Include within Employee Manual
•Require separate sign-off

Bryley Systems Inc.

Slide 21

Copyright 2014
Preventative – User Education
•Essential to the health of your Cloud Services
and your on-premise computer network
•Provide ongoing training:
o Safe browsing
o Avoiding phishing and scams
o Proper password use and storage
o Do not download viruses and spyware

•Some organizations phish internal users; once
hooked, IT provides immediate feedback
Bryley Systems Inc.

Slide 22

Copyright 2014
Preventative – Technologies
•Operating System
•Firewall
•VPN
•Layering

Bryley Systems Inc.

Slide 23

Copyright 2014
Technologies – Operating System
•Interface Active Directory or LDAP to Cloud Services
•All users must have own username and password
•Require password complexity with periodic changes
•Use file and directory security to restrict access
•Enable auditing and/or encryption on sensitive data
•Limit administrative access: Administrators use a nonprivileged account for day-to-day activities

Bryley Systems Inc.

Slide 24

Copyright 2014
Technologies – Firewall
•Controls network traffic between its interfaces (typically
between local network and Cloud)
•Default rules block most inbound traffic while allowing
outbound traffic
•Stateful packet inspection is a required feature
•Universal Threat Management on some appliances
•Automatic circuit fail-over on higher-end models
•See http://www.Bryley.com/Secure-Network/

Bryley Systems Inc.

Slide 25

Copyright 2014
Technologies – VPN
•Encrypted connection over the Internet
•Primary site requires a VPN-hardware device
•Remote connection can be via a hardware
device, login (SSL), or a software client (IPSec)
•Required for Bryley’s Hosted Cloud Server; it
provides secure connection for Private Cloud

Bryley Systems Inc.

Slide 26

Copyright 2014
Technologies – Layering
•Create multiple, redundant, levels of protection
•Provide multi-vendor solutions at key areas
•Like home security; the more layers (door locks plus
deadbolt, window locks, open/closed sensors, motion
sensors, security cameras, etc.) the better.
•Bryley layering for 201 CMR 17.00 compliance:
o Comprehensive Support Program
o Secure Network
o Multi-Point Security Hardening Service
o Visit http://www.Bryley.com/Solutions/Network-Security/
Bryley Systems Inc.

Slide 27

Copyright 2014
III. Data Integrity
A. Backup
B. Disaster Recovery

Bryley Systems Inc.

Slide 28

Copyright 2014
Integrity – Backup
• Store all data at on-premise servers or in the
Cloud (rather than on workstations)
• Deploy data-backup plan:
o Who manages the process
o Define where and how backups are stored offsite
o What gets backed-up (server image, folders, files)
o How often do backups run (continuous, periodically)

• Get our free 2014 Data-Backup Guidelines at

http://www.Bryley.com/Bryley-Data-Backup-Guidelines-2014/

Bryley Systems Inc.

Slide 29

Copyright 2014
Integrity – Disaster Recovery

• Build/ensure appropriate levels of redundancy
in all business-critical systems:
o Phone system
o Cloud Services
o Computer network

• Create and distribute a contingency plan:
o What offsite resources are available where
o Who does what, where, and when

• Test often; especially restoration of backups
Bryley Systems Inc.

Slide 30

Copyright 2014

Más contenido relacionado

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Bryley - Get Into The Cloud; Safely & Securely -- Feb-2014

  • 1. Get into the Cloud Safely and Securely Manage ● Optimize ● Secure – Since 1987 ™ Bryley Systems Inc. Copyright 2014
  • 2. Gavin H. Livingstone •President, Bryley Systems Inc. •Over 30 years in computer support •MBA from Boston College, Novell CNE, Microsoft MCSE Bryley Systems is a full-service partner, fulfilling the information-technology needs of our clients throughout central New England since 1987. Visit www.Bryley.com for more information. Bryley Systems Inc. Slide 2 Copyright 2014
  • 3. Synopsis Cloud Services and your data; learn how to select from Cloud options while protecting yourself from internal and external threats: •How to compare popular Cloud Services •Preventative measures to secure your Cloud Services •How to ensure the integrity of your valuable data, whether inside your office or out in the Cloud Bryley Systems Inc. Slide 3 Copyright 2014
  • 4. Agenda I. Comparing Cloud Services A. Going to the Cloud B. Cloud Computing Service Models C. Public, Private, and Hybrid Clouds D. Common SaaS Cloud Services E. Selection Process F. Securing Cloud Services II. Preventative Measures A. Computer and Internet/Cloud-Use policy B. Security Policy C. User Education D. Technologies III. Data Integrity A. Backup B. Disaster Recovery Bryley Systems Inc. Slide 4 Copyright 2014
  • 5. I. Comparing Cloud Services A. Going to the Cloud B. Cloud Computing Service Models C. Public, Private, and Hybrid Clouds D. Common SaaS Cloud Services E. Selection Process F. Securing Cloud Services Bryley Systems Inc. Slide 5 Copyright 2014
  • 6. • Benefits: Going to the Cloud o Eliminate up-front capital expenditure o Reduce operating costs o Access from anywhere • Considerations: o Ensure sufficient bandwidth, both up and down o Consider Internet fail-over to ensure availability o Most start small and expand gradually Bryley Systems Inc. Slide 6 Copyright 2014
  • 7. Cloud Computing Service Models •Software as a Service (SaaS): o On-demand software; software and data hosted in Cloud o Common applications: CRM, ERP, HRM, accounting, etc. o Web-based interface with subscription fee per user •Platform as a Service (PaaS): o Basic components (virtual machines, software) to build on o Consumer creates the software •Infrastructure as a Service (IaaS): o Raw infrastructure (computing hardware, storage, etc.) o Consumer deploys servers and creates entire environment Bryley Systems Inc. Slide 7 Copyright 2014
  • 8. Public, Private, and Hybrid Clouds •Public Cloud – Cloud-based resources available to anyone •Private Cloud – Dedicated Cloud environment: o o o o Hosted services to a limited number of people Usually exclusive Virtual Machine(s) Protected behind a firewall Often accessed via VPN •Hybrid – Interfaced Cloud Services: o Combination of two or more Clouds (Private, Public) o Often refers to mix of on-premise plus Cloud-based resources (two layer) Go to http://www.Bryley.com/Hosted-Cloud-Server/ for details on Bryley’s Hosted Cloud Server, our private-cloud service. Bryley Systems Inc. Slide 8 Copyright 2014
  • 9. Common SaaS Cloud Services •Prevention •Productivity Suites •Storage •Backup and Recovery Visit http://www.Bryley.com/Solutions/Cloud-Computing/ to see our Cloud Services. Bryley Systems Inc. Slide 9 Copyright 2014
  • 10. SaaS – Prevention • Most organizations start with Prevention • Primary options within Prevention: o Email protection – Controls spam plus offers email encryption and archiving o End-point security – Secure end-user computers against external attacks o Web filtering – Prevent/log unauthorized access to undesired websites • Popular email-protection options include: o McAfee Email Protection – Continuity & Outbound at $27/user per year o Microsoft Exchange Online Protection – Exchange only at $12/user per year o ProofPoint Essentials Business – Outbound & spooling at $26.40/user per year • Endpoint security from McAfee, Symantec, AVG, Kaspersky • Web filtering from McAfee, Axway (Tumbleweed), WebSense • See http://www.Bryley.com/McAfee-SaaS/ for McAfee options • We also offer secure transfer: http://www.Bryley.com/Leapfile/ Bryley Systems Inc. Slide 10 Copyright 2014
  • 11. SaaS – Productivity Suites •Suite of word processing, spreadsheet, slideshow, calendar, email, storage, and other applications •Google Apps for Business: o $50/user per year o One size fits all across multiple devices •Microsoft Office 365: o Options start at $48/year, but common at $96/year and up o Greater functionality with familiar interface o Primarily Windows-based devices o Visit http://www.Bryley.com/Office365/ Bryley Systems Inc. Slide 11 Copyright 2014
  • 12. SaaS – Storage • Desired features (often found only in paid versions): o o o o o Plans start at $5/user per month; price increases with features & space File synchronization across multiple devices Security with rotating encryption keys Access control and auditing AD/LDAP integration • Popular options include: o Box.net – 10Gb free; highly secure and comprehensive (integration, access control, etc.) offering. Also, NetSkope second-highest rating. o Dropbox – 2Gb free; over 200M subscribers. Easiest and most fun to use, but a bit more expensive than comparable offerings. o Google Drive – 15Gb free; no frills, but very reliable at reasonable cost. o Microsoft OneDrive – 7Gb free; offers the most for the least. Includes unique “Fetch” (from a PC) feature and integrates within MS Office. Bryley Systems Inc. Slide 12 Copyright 2014
  • 13. SaaS – Backup and Recovery • Desired features: o Automatically copy image or folders and files to Cloud periodically o Secure via encryption and somewhat resistant to attack o Held separately, unchanged, for recovery purposes • Popular options include: o Carbonite – Extremely popular; automated, encrypted, and easy to use. Starts at $59.99/device per year; business plans start at $299.99/year. o Mozy – Well-known with both home and business versions. Home starts at $5.99/device per month; business plans start at $26.98/month. o SOS Online Backup – Includes monitoring, password encryption, and phone support. Pricing at $9.99/user per month; unlimited users and devices at $99.99 per month. • Bryley BU/DR at http://www.Bryley.com/Backup-Data-Recovery Bryley Systems Inc. Slide 13 Copyright 2014
  • 14. Selection Process • Primary concerns: o Privacy – Based on type of encryption: o How are they protecting your data? o What tools are used to protect data from third-party access? o Resiliency – Measure dependability of the vendor’s service via SLA: o How much downtime? Conversely, how much uptime (five 9s) or availability? o What protocols in-place during downtime? Any remuneration if SLA not met? o Customization – What to move to the Cloud and when: o Can vendor support a two-layered approach (on-premise plus Cloud)? o Can the vendor scale to your needs? o Control – More control can reduce Total Cost of Ownership: o What can I configure and manage myself through policies via the admin interface? o What is no longer available to me? o Support – Essential for satisfaction, security, and when things go wrong Details at http://www.eweek.com/c/a/Cloud-Computing/How-to-Assess-CloudBased-EMail-Security-Vendors/. Bryley Systems Inc. Slide 14 Copyright 2014
  • 15. Selection Process (continued) •Key issues: o o o o Administration – Easy setup and enforcement Effectiveness – Works reliably and consistently End-user interface – Intuitive, secure, and friendly Granularity – Allows multi-level policies and permissions Bryley Systems Inc. Slide 15 Copyright 2014
  • 16. Securing Cloud Services Top 9 threats to Cloud Services in 2013: 1. Data breach – Usually externally, but internal assistance 2. Data loss – Disaster, malware, or lost encryption key 3. Hijacking – Account or service traffic 4. Insecure interfaces and APIs – Awareness 5. Denial of Service (DoS) – Slows performance; increase cost 6. Malicious insiders – Unnecessary access, bad passwords 7. Cloud abuse – Using Cloud computing malevolently 8. Insufficient due diligence – Understand the risks 9. Shared technologies – Shared infrastructure and platform Visit http://www.Infoworld.com/t/Cloud-Security/9-top-threats-cloud-computing-security-213428. Bryley Systems Inc. Slide 16 Copyright 2014
  • 17. Securing Cloud Services (cont.) • Cloud Services provider: o Proper provisioning and deployment of Virtual Machines o Multi-level security at all points of entry o Secure access • Your habits should include: o o o o o Proper policies and Internet/Cloud-use procedures Remote backup separate from other services Two-factor authentication where available Preventative measures Disaster Recovery plan Bryley Systems Inc. Slide 17 Copyright 2014
  • 18. II. Preventative Measures A. Computer and Internet/Cloud-Use Policy B. Security Policy C. User Education D. Technologies Bryley Systems Inc. Slide 18 Copyright 2014
  • 19. Preventative – Computer and Internet/Cloud-Use Policy •Defines how employees use computer and Internet (Cloud) while reducing organization’s liability •Should be as formal as other policy documents •Objectives: o Reduce or eliminate unproductive use (personal shopping, entertainment, etc.) o Prohibit illegal use (downloading copyrighted materials, gambling, pornography, etc.) o Limit legal liability (sexual harassment, illegal activities) Bryley Systems Inc. Slide 19 Copyright 2014
  • 20. Preventative – Computer and Internet/Cloud-Use Policy (continued) •Include within Employee Manual •Require separate sign-off •Some suggestions: o o o o Use only company-provided Cloud Services Use only company-approved software Do not share accounts and passwords Restrict to business-use only Bryley Systems Inc. Slide 20 Copyright 2014
  • 21. Preventative – Security Policy •Complements Computer & Internet/Cloud-Use policy •Defines, from a technology standpoint, what is allowed and not allowed in the Cloud and on the local network •Defines the process for making changes, including who authorizes these changes •Written Security Information Program (WISP) •Include within Employee Manual •Require separate sign-off Bryley Systems Inc. Slide 21 Copyright 2014
  • 22. Preventative – User Education •Essential to the health of your Cloud Services and your on-premise computer network •Provide ongoing training: o Safe browsing o Avoiding phishing and scams o Proper password use and storage o Do not download viruses and spyware •Some organizations phish internal users; once hooked, IT provides immediate feedback Bryley Systems Inc. Slide 22 Copyright 2014
  • 23. Preventative – Technologies •Operating System •Firewall •VPN •Layering Bryley Systems Inc. Slide 23 Copyright 2014
  • 24. Technologies – Operating System •Interface Active Directory or LDAP to Cloud Services •All users must have own username and password •Require password complexity with periodic changes •Use file and directory security to restrict access •Enable auditing and/or encryption on sensitive data •Limit administrative access: Administrators use a nonprivileged account for day-to-day activities Bryley Systems Inc. Slide 24 Copyright 2014
  • 25. Technologies – Firewall •Controls network traffic between its interfaces (typically between local network and Cloud) •Default rules block most inbound traffic while allowing outbound traffic •Stateful packet inspection is a required feature •Universal Threat Management on some appliances •Automatic circuit fail-over on higher-end models •See http://www.Bryley.com/Secure-Network/ Bryley Systems Inc. Slide 25 Copyright 2014
  • 26. Technologies – VPN •Encrypted connection over the Internet •Primary site requires a VPN-hardware device •Remote connection can be via a hardware device, login (SSL), or a software client (IPSec) •Required for Bryley’s Hosted Cloud Server; it provides secure connection for Private Cloud Bryley Systems Inc. Slide 26 Copyright 2014
  • 27. Technologies – Layering •Create multiple, redundant, levels of protection •Provide multi-vendor solutions at key areas •Like home security; the more layers (door locks plus deadbolt, window locks, open/closed sensors, motion sensors, security cameras, etc.) the better. •Bryley layering for 201 CMR 17.00 compliance: o Comprehensive Support Program o Secure Network o Multi-Point Security Hardening Service o Visit http://www.Bryley.com/Solutions/Network-Security/ Bryley Systems Inc. Slide 27 Copyright 2014
  • 28. III. Data Integrity A. Backup B. Disaster Recovery Bryley Systems Inc. Slide 28 Copyright 2014
  • 29. Integrity – Backup • Store all data at on-premise servers or in the Cloud (rather than on workstations) • Deploy data-backup plan: o Who manages the process o Define where and how backups are stored offsite o What gets backed-up (server image, folders, files) o How often do backups run (continuous, periodically) • Get our free 2014 Data-Backup Guidelines at http://www.Bryley.com/Bryley-Data-Backup-Guidelines-2014/ Bryley Systems Inc. Slide 29 Copyright 2014
  • 30. Integrity – Disaster Recovery • Build/ensure appropriate levels of redundancy in all business-critical systems: o Phone system o Cloud Services o Computer network • Create and distribute a contingency plan: o What offsite resources are available where o Who does what, where, and when • Test often; especially restoration of backups Bryley Systems Inc. Slide 30 Copyright 2014

Notas del editor

  1. Everything from “as ubiquitous as electricity” to “passing fad”.