SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
Elastic Detector
http://elastic-detector.secludit.com




   Elastic Security for Cloud
        Infrastructures

           Matthias Jung
           CTO SecludIT
          j@secludit.com
Problem

  Cloud Infrastructures are highly dynamic and in
  permanent change




       How to get visibility, control, and protection?
Problem


   Today's Problems

    •  Lack of visibility

    •  Increasing size of overall vulnerability window

    •  Security degradation over time

    •  Manual management errors

   Note: Security is still the most important obstacle
   to the adoption of cloud computing
Our Solution


    Elastic Detector for Amazon EC2: Innovative
    Technology and Key Concepts

    •  Auto-Detection of new machines

    •  Auto-Deployment of Monitoring via "Auto-
       Checks"

    •  No Agents, No Up-Front Configuration
Our Solution


   Elastic Detector: Key Features

    •  Detection of inconsistencies and anomalies

    •  Real-time alerts

    •  Status visualization and graphs

    •  Daily reports

    •  Problem drill-down
Elastic Detector
Elastic Detector
Elastic Detector
Benefits


    Elastic Detector Key Benefits


    •  Increased Security

    •  Comprehensive Visibility and Control

    •  Reduction in administration time, cost, and
       worries

    •  "Safe Bet" Technology
Product


   Where Are We?

    •  Private Beta started in December 2010

    •  Product Release March, 1st, 2011

    •  Metered Pricing ($0.025 per Server Hour)

    •  25 Customers (SaaS, Application Hosters, Dev/
       Test)

    •  Planned: Elastic Protector (September 2011)
Questions ?


 Want to Try Out?
elastic-detector.secludit.com




Company: secludit.com
Blog:    elastic-security.com
Twitter: @elasticsecurity

Más contenido relacionado

La actualidad más candente

Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowDevOps.com
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir JirasekVladimir Jirasek
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
David Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpDavid Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpWeAreEsynergy
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Appsrazvanroman
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24
 
Moving Security to the Left
Moving Security to the LeftMoving Security to the Left
Moving Security to the LeftJavier Godinez
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationNetizen Corporation
 
Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Amazon Web Services
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 

La actualidad más candente (20)

Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
David Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpDavid Slater G-Cloud Meet Up
David Slater G-Cloud Meet Up
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Apps
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Moving Security to the Left
Moving Security to the LeftMoving Security to the Left
Moving Security to the Left
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
 
Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 

Destacado

Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionCloudOps Summit
 
EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012staffordlibrary
 
Blogi i fora historyczne
Blogi i fora historyczneBlogi i fora historyczne
Blogi i fora historycznebarmaj7
 
Ast simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyAst simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyBatgerel Batjargal
 
Target audience
Target audienceTarget audience
Target audiencesarahlambe
 
Lane tech & lincoln park
Lane tech & lincoln parkLane tech & lincoln park
Lane tech & lincoln parkElizabeth_20
 
MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012staffordlibrary
 
Prezentācija1 ltv
Prezentācija1 ltvPrezentācija1 ltv
Prezentācija1 ltvJose Duarte
 
Presentation1
Presentation1Presentation1
Presentation1nooch33
 
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelConsumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelEnprecis
 
Convergence – Social Enterprise
Convergence – Social EnterpriseConvergence – Social Enterprise
Convergence – Social EnterpriseCloudOps Summit
 
Szinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunSzinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunJose Duarte
 
19098962 note-sejarah
19098962 note-sejarah19098962 note-sejarah
19098962 note-sejarahClover Tay
 
Media research methods
Media research methodsMedia research methods
Media research methodssarahlambe
 
LRSP 433 Chavez Summer 2012
LRSP 433  Chavez Summer 2012LRSP 433  Chavez Summer 2012
LRSP 433 Chavez Summer 2012staffordlibrary
 
MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012staffordlibrary
 

Destacado (20)

Tp fernandagonzalez lamejor
Tp fernandagonzalez lamejorTp fernandagonzalez lamejor
Tp fernandagonzalez lamejor
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
 
EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012
 
Blogi i fora historyczne
Blogi i fora historyczneBlogi i fora historyczne
Blogi i fora historyczne
 
Wh3
Wh3Wh3
Wh3
 
Ast simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyAst simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copy
 
Target audience
Target audienceTarget audience
Target audience
 
Lane tech & lincoln park
Lane tech & lincoln parkLane tech & lincoln park
Lane tech & lincoln park
 
MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012
 
Prezentācija1 ltv
Prezentācija1 ltvPrezentācija1 ltv
Prezentācija1 ltv
 
Presentation1
Presentation1Presentation1
Presentation1
 
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelConsumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
 
Convergence – Social Enterprise
Convergence – Social EnterpriseConvergence – Social Enterprise
Convergence – Social Enterprise
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
 
Szinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunSzinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hun
 
19098962 note-sejarah
19098962 note-sejarah19098962 note-sejarah
19098962 note-sejarah
 
Media research methods
Media research methodsMedia research methods
Media research methods
 
LRSP 433 Chavez Summer 2012
LRSP 433  Chavez Summer 2012LRSP 433  Chavez Summer 2012
LRSP 433 Chavez Summer 2012
 
MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012
 
Singin’ the rain
Singin’ the rainSingin’ the rain
Singin’ the rain
 

Similar a Startups: Jung - SECLUDIT

How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...Amazon Web Services
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-securitySergio Loureiro
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-securitySecludIT
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101eG Innovations
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?eG Innovations
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overviewbmiller144
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXDevOps.com
 
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealitySingle Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealityJohn Williams
 
Keynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityKeynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityElasticsearch
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...eG Innovations
 
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...eG Innovations
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...AgileNetwork
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Jason Mashak
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 

Similar a Startups: Jung - SECLUDIT (20)

The Road to SaaS
The Road to SaaSThe Road to SaaS
The Road to SaaS
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-security
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-security
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overview
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
 
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealitySingle Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
 
Keynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityKeynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic Observability
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
 
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...
ANIn Chennai April 2024 |Beyond Big Bang: Technical Agility in Vintage Produc...
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 

Más de CloudOps Summit

Enable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowEnable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowCloudOps Summit
 
Augmenting People – Steuern wir noch oder werden wir gesteuert?
Augmenting People –  Steuern wir noch oder werden wir gesteuert?Augmenting People –  Steuern wir noch oder werden wir gesteuert?
Augmenting People – Steuern wir noch oder werden wir gesteuert?CloudOps Summit
 
Enterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyEnterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyCloudOps Summit
 
Time is the currency of IT
Time is the currency of ITTime is the currency of IT
Time is the currency of ITCloudOps Summit
 
Agile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdAgile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdCloudOps Summit
 
Devops in the real world
Devops in the real worldDevops in the real world
Devops in the real worldCloudOps Summit
 
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenLokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenCloudOps Summit
 
True Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageTrue Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageCloudOps Summit
 
Cloud Computing is not simple
Cloud Computing is not simpleCloud Computing is not simple
Cloud Computing is not simpleCloudOps Summit
 
How to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsHow to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsCloudOps Summit
 
You should not own a data center
You should not own a data centerYou should not own a data center
You should not own a data centerCloudOps Summit
 
Cloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloudOps Summit
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
 
Liquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioLiquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioCloudOps Summit
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 

Más de CloudOps Summit (20)

Enable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowEnable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud Escrow
 
Augmenting People – Steuern wir noch oder werden wir gesteuert?
Augmenting People –  Steuern wir noch oder werden wir gesteuert?Augmenting People –  Steuern wir noch oder werden wir gesteuert?
Augmenting People – Steuern wir noch oder werden wir gesteuert?
 
Programming humans
Programming humansProgramming humans
Programming humans
 
Enterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyEnterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexy
 
Time is the currency of IT
Time is the currency of ITTime is the currency of IT
Time is the currency of IT
 
Komplex – Perplex?
Komplex – Perplex?Komplex – Perplex?
Komplex – Perplex?
 
Agile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdAgile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wird
 
Agile Virtualisierung
Agile VirtualisierungAgile Virtualisierung
Agile Virtualisierung
 
Devops in the real world
Devops in the real worldDevops in the real world
Devops in the real world
 
Banking Reloaded
Banking ReloadedBanking Reloaded
Banking Reloaded
 
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenLokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
 
True Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageTrue Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined Storage
 
Cloud Computing is not simple
Cloud Computing is not simpleCloud Computing is not simple
Cloud Computing is not simple
 
How to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsHow to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & Acquisitions
 
You should not own a data center
You should not own a data centerYou should not own a data center
You should not own a data center
 
Cloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS Konkurrenz
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Liquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioLiquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.io
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 

Último

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 

Último (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 

Startups: Jung - SECLUDIT

  • 1. Elastic Detector http://elastic-detector.secludit.com Elastic Security for Cloud Infrastructures Matthias Jung CTO SecludIT j@secludit.com
  • 2. Problem Cloud Infrastructures are highly dynamic and in permanent change How to get visibility, control, and protection?
  • 3. Problem Today's Problems •  Lack of visibility •  Increasing size of overall vulnerability window •  Security degradation over time •  Manual management errors Note: Security is still the most important obstacle to the adoption of cloud computing
  • 4. Our Solution Elastic Detector for Amazon EC2: Innovative Technology and Key Concepts •  Auto-Detection of new machines •  Auto-Deployment of Monitoring via "Auto- Checks" •  No Agents, No Up-Front Configuration
  • 5. Our Solution Elastic Detector: Key Features •  Detection of inconsistencies and anomalies •  Real-time alerts •  Status visualization and graphs •  Daily reports •  Problem drill-down
  • 9. Benefits Elastic Detector Key Benefits •  Increased Security •  Comprehensive Visibility and Control •  Reduction in administration time, cost, and worries •  "Safe Bet" Technology
  • 10. Product Where Are We? •  Private Beta started in December 2010 •  Product Release March, 1st, 2011 •  Metered Pricing ($0.025 per Server Hour) •  25 Customers (SaaS, Application Hosters, Dev/ Test) •  Planned: Elastic Protector (September 2011)
  • 11. Questions ? Want to Try Out? elastic-detector.secludit.com Company: secludit.com Blog: elastic-security.com Twitter: @elasticsecurity