SlideShare una empresa de Scribd logo
1 de 25
Cloud Security
   Group Assignment
    Venkatesh Chary
     Arun Krishna
What is Cloud Security?
        Cloud                             Security

 •   Agility                        •   Gate-keeper
 •   Self-service                   •   Standards
 •   Scale                          •   Control
 •   Automation                     •   Centralized


Cloud Security is security principles applied to protect data,
applications and infrastructure associated within the Cloud
Computing technology.
Market Analysis
What market size are we talking about
Market Size:
           2012 : US $425.4 Million

          2013 : US $629.6 Million

          2014 : US $963.4 Million
Global Cloud Security Market Growth
   Analysis 2012-2014 (US$ million)
1200
               41.4% Compound annual growth
1000

800

600
                                   963.4
400
                   629.6
200    425.4

   0
       2012         2013           2014
Global Geographies
• The Americas

• Europe, the Middle East and Africa; European
  Medicines Evaluation Agency. (EMEA)

• Asia Pacific (APAC)
Global Cloud Security Market in
          Percentage

         2012                       2014


   2.5                          4
                Global                     Global
                Cloud                      Cloud
                Security                   Security
                Market                     Market
                Global                     Global
                Security                   Security
97.5            Market                     Market
                           96
End-Users/Customers
• Large Enterprises

• Government Agencies

• Cloud Service Providers (CSPs)

• Medium-sized Enterprises
Global Cloud Security Market by End-
         User Segmentation
             5         Large Enterprises
        9

                       Government Agencies
                 38
   17
                       Cloud Service Providers

                       Medium Enterprises

                       Other/Third Party Vendors
            31
Trends associated with Cloud Security

• Increasing Partnerships between CSPs and Security
  Solution Providers Expected
• Increasing Emergence of Cloud Service-specific Security
  Solution Providers
• Identity Management and Encryption to Remain the
  Top Cloud Security Solutions Offered
• Increasing Availability of Cloud Security Solutions for
  Small and Medium-sized Businesses (SMBs)
• Emergence of Strong Cloud Security Standard and
  Guidelines
Why is Cloud Security Important

• Increasing Usage of Cloud Services in Non-
  traditional Sectors
• Growing Adoption of Cloud Services in
  Government Departments
• Rise in Cloud Service-specific Attacks
• Growing Usage of Cloud Services for Critical Data
  Storage
• Rise in Employee Mobility
What are the challenges?

•   CSPs believe that Security is End-users’ Issue
•   Lack of Awareness about Cloud Security
•   Inconsistent Network Connection Issues
•   Lack of Proper Cloud Security Standards
What End-users/customers expect
          from Cloud Security

•   Strong Overall Security Offered
•   Suite of Security Solutions Offered
•   Encryption Key Management Features Offered
•   Availability of Fine Granular Control
McAfee Inc.
• McAfee Inc., founded in 1987, is a leading
  provider of network security solutions. The
  company is listed on the New York Stock
  Exchange and is based in California, US. The
  company provides security services across the
  globe. The company’s security products are for
  sectors such as Data Protection, Email and Web
  Security, Endpoint Protection, Mobile
  Security, Network Security, Risk and
  Compliance, Security Software as a Service
  (Security SaaS), and Security Management.
McAfee acquired by Intel
• On August 19, 2010 Intel acquired McAfee for
  $7.68 billion in a cash deal. In FY2010, the
  company reported total revenue of US$2.1
  billion. However, in FY2010, the revenue from
  the Cloud Security segment was low, at only
  around US$25 million.
McAfee Cloud Security Program
McAfee Security-as-a-Service delivers
complete endpoint, email, web, and network
protection through the cloud, saving your IT
department time, effort, and costs. As part of
our Security Connected framework that
delivers comprehensive security and
integrated management, McAfee Security
SaaS leverages the power of the cloud to help
organizations realize faster time-to-protection
to secure their business.
McAfee SaaS Includes

•   McAfee SaaS Email Protection
•   McAfee SaaS Integrated Suites
•   McAfee SaaS Endpoint Protection
•   McAfee SaaS Vulnerability Management
•   McAfee SaaS Web Protection
SWOT Analysis
Strengths                                 Weakness
•   The company’s cloud access control    •   Despite being an established
    solution allows control over the          traditional security solution
    entire lifecycle of cloud access          provider with a wide geographic
    security, providing solutions such        presence, the company is slow to
    as SSO, provisioning, strong              gain share in the cloud security
    authentication and audit.                 space
•   Its solution helps in auto-           •   Some pure-play companies such as
    synchronization of identity data          Symplified are witnessing much
    between enterprise and cloud              higher growth in the Cloud Identity
    applications for change                   Management market
    management scenarios                  •   Some of its competitors, such as
•   Centralized management and                Trend Micro, provides better key
    reporting are provided through            management options/features
    integration with the McAfee ePolicy
    Orchestrator platform
SWOT Analysis
Opportunities                      Threats
• The company has a very long      • Threat from pure-play vendors
  list of partners from various      such as Zscaler, Vshield from
  geographic locations, which it     VMware and Symplified that
  can leverage to expand             have high growth rates
• It recently launched its cloud   • Threat to its market share
  security platform, which           from other traditional security
  secures all content and data       solution providers that are
  traffic including email, web       expected to aggressively push
  and identity traffic;              for expansion in this market
  thus, providing a unified
  solution
Some Key Competitors
• Trend Micro SecureCloud, and Trend Micro Deep
  Security
• CA Access Control, and CA Identity Manager
• Symplified Mobile Edition, Symplified Access
  Manager, and Symplified Identity Manager
• CloudPassage cloud server exposure
  management
• Okta Cloud Services Platform
• GuardTime Keyless Signature Server
• CipherCloud Data Protection for Salesforce
Major Customers
•    AT&T Global Network Services Client
•    Citrix
•    Microsoft VPN
•    Juniper Networks
•    Verizon
                        Other Information
    Knowledge base Website
    https://kc.mcafee.com/corporate/index?page=home
    Security as a service by Mcafee
    http://www.mcafee.com/us/products/security-as-a-
    service/index.aspx
Netflix
Netflix is a commercial entertainment web based
   company, by online subscriptions they provide
   website TV shows and movies to subscribers with
   the online streaming technology and also send
   DVD’s using US mail service.
In 2010, Netflix started migrating its infrastructure
   to Amazon EC2. At present Netflix has over 1
   Petabyte of data stored on Amazon, and the data
   are sent to content delivery networks such as
   Akamai, Limelight etc., that feed the content to
   local ISPs.
What Netflix is now?

•   24+ million members globally
•   Streaming in 47 countries
•   Watch on more than 700 Devices
•   33% of US peak evening Internet traffic
Why Did Netflix moved to Cloud
• Netflix is growing and adding subscribers at an
  unprecedented rate. The company is expanding
  into global markets, and an ever-growing array of
  Netflix-ready devices is spurring streaming
  service to even faster growth. At the heart of
  Netflix technology is the Cloud Computing
  platform, which serves as the distributed systems
  foundation for Netflix application
  development, and powers the movie viewing
  experience for millions of customers every day.
Netflix Cloud Security Strategy
•   New deployments and upgrades
•   Capacity planning & procurement
•   Key management
•   Detecting instance changes
•   Application ownership, management
•   Patching, updating
•   Availability, in a failure-prone environment
•   Embedding security controls
•   Least privilege enforcement
•   Testing/auditing for conformance
•   Consistency, conformity in build and launch
•   Continuous, aggressive monitoring, testing
Questions??
If you are interested in this presentation, I am
   uploading this on slideshare.com. You can find
   it by searching my name Venkatesh Chary.
Below is link for reference:

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cloud security
Cloud securityCloud security
Cloud security
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Public cloud
Public cloudPublic cloud
Public cloud
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web ServicesCloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Eucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebulaEucalyptus, Nimbus & OpenNebula
Eucalyptus, Nimbus & OpenNebula
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud security
Cloud security Cloud security
Cloud security
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
SaaS Presentation
SaaS PresentationSaaS Presentation
SaaS Presentation
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
 

Destacado

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsBasavaraj Galagi
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesThoughtWorks Studios
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Destacado (17)

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Web Security
Web SecurityWeb Security
Web Security
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of Things
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and Challenges
 
Web Security
Web SecurityWeb Security
Web Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Similar a Cloud Security Market Growth Analysis 2012-2014

Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Adewole Shitta-bey
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 

Similar a Cloud Security Market Growth Analysis 2012-2014 (20)

cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 

Último

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Cloud Security Market Growth Analysis 2012-2014

  • 1. Cloud Security Group Assignment Venkatesh Chary Arun Krishna
  • 2. What is Cloud Security? Cloud Security • Agility • Gate-keeper • Self-service • Standards • Scale • Control • Automation • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
  • 3. Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million
  • 4. Global Cloud Security Market Growth Analysis 2012-2014 (US$ million) 1200 41.4% Compound annual growth 1000 800 600 963.4 400 629.6 200 425.4 0 2012 2013 2014
  • 5. Global Geographies • The Americas • Europe, the Middle East and Africa; European Medicines Evaluation Agency. (EMEA) • Asia Pacific (APAC)
  • 6. Global Cloud Security Market in Percentage 2012 2014 2.5 4 Global Global Cloud Cloud Security Security Market Market Global Global Security Security 97.5 Market Market 96
  • 7. End-Users/Customers • Large Enterprises • Government Agencies • Cloud Service Providers (CSPs) • Medium-sized Enterprises
  • 8. Global Cloud Security Market by End- User Segmentation 5 Large Enterprises 9 Government Agencies 38 17 Cloud Service Providers Medium Enterprises Other/Third Party Vendors 31
  • 9. Trends associated with Cloud Security • Increasing Partnerships between CSPs and Security Solution Providers Expected • Increasing Emergence of Cloud Service-specific Security Solution Providers • Identity Management and Encryption to Remain the Top Cloud Security Solutions Offered • Increasing Availability of Cloud Security Solutions for Small and Medium-sized Businesses (SMBs) • Emergence of Strong Cloud Security Standard and Guidelines
  • 10. Why is Cloud Security Important • Increasing Usage of Cloud Services in Non- traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility
  • 11. What are the challenges? • CSPs believe that Security is End-users’ Issue • Lack of Awareness about Cloud Security • Inconsistent Network Connection Issues • Lack of Proper Cloud Security Standards
  • 12. What End-users/customers expect from Cloud Security • Strong Overall Security Offered • Suite of Security Solutions Offered • Encryption Key Management Features Offered • Availability of Fine Granular Control
  • 13. McAfee Inc. • McAfee Inc., founded in 1987, is a leading provider of network security solutions. The company is listed on the New York Stock Exchange and is based in California, US. The company provides security services across the globe. The company’s security products are for sectors such as Data Protection, Email and Web Security, Endpoint Protection, Mobile Security, Network Security, Risk and Compliance, Security Software as a Service (Security SaaS), and Security Management.
  • 14. McAfee acquired by Intel • On August 19, 2010 Intel acquired McAfee for $7.68 billion in a cash deal. In FY2010, the company reported total revenue of US$2.1 billion. However, in FY2010, the revenue from the Cloud Security segment was low, at only around US$25 million.
  • 15. McAfee Cloud Security Program McAfee Security-as-a-Service delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs. As part of our Security Connected framework that delivers comprehensive security and integrated management, McAfee Security SaaS leverages the power of the cloud to help organizations realize faster time-to-protection to secure their business.
  • 16. McAfee SaaS Includes • McAfee SaaS Email Protection • McAfee SaaS Integrated Suites • McAfee SaaS Endpoint Protection • McAfee SaaS Vulnerability Management • McAfee SaaS Web Protection
  • 17. SWOT Analysis Strengths Weakness • The company’s cloud access control • Despite being an established solution allows control over the traditional security solution entire lifecycle of cloud access provider with a wide geographic security, providing solutions such presence, the company is slow to as SSO, provisioning, strong gain share in the cloud security authentication and audit. space • Its solution helps in auto- • Some pure-play companies such as synchronization of identity data Symplified are witnessing much between enterprise and cloud higher growth in the Cloud Identity applications for change Management market management scenarios • Some of its competitors, such as • Centralized management and Trend Micro, provides better key reporting are provided through management options/features integration with the McAfee ePolicy Orchestrator platform
  • 18. SWOT Analysis Opportunities Threats • The company has a very long • Threat from pure-play vendors list of partners from various such as Zscaler, Vshield from geographic locations, which it VMware and Symplified that can leverage to expand have high growth rates • It recently launched its cloud • Threat to its market share security platform, which from other traditional security secures all content and data solution providers that are traffic including email, web expected to aggressively push and identity traffic; for expansion in this market thus, providing a unified solution
  • 19. Some Key Competitors • Trend Micro SecureCloud, and Trend Micro Deep Security • CA Access Control, and CA Identity Manager • Symplified Mobile Edition, Symplified Access Manager, and Symplified Identity Manager • CloudPassage cloud server exposure management • Okta Cloud Services Platform • GuardTime Keyless Signature Server • CipherCloud Data Protection for Salesforce
  • 20. Major Customers • AT&T Global Network Services Client • Citrix • Microsoft VPN • Juniper Networks • Verizon Other Information Knowledge base Website https://kc.mcafee.com/corporate/index?page=home Security as a service by Mcafee http://www.mcafee.com/us/products/security-as-a- service/index.aspx
  • 21. Netflix Netflix is a commercial entertainment web based company, by online subscriptions they provide website TV shows and movies to subscribers with the online streaming technology and also send DVD’s using US mail service. In 2010, Netflix started migrating its infrastructure to Amazon EC2. At present Netflix has over 1 Petabyte of data stored on Amazon, and the data are sent to content delivery networks such as Akamai, Limelight etc., that feed the content to local ISPs.
  • 22. What Netflix is now? • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 Devices • 33% of US peak evening Internet traffic
  • 23. Why Did Netflix moved to Cloud • Netflix is growing and adding subscribers at an unprecedented rate. The company is expanding into global markets, and an ever-growing array of Netflix-ready devices is spurring streaming service to even faster growth. At the heart of Netflix technology is the Cloud Computing platform, which serves as the distributed systems foundation for Netflix application development, and powers the movie viewing experience for millions of customers every day.
  • 24. Netflix Cloud Security Strategy • New deployments and upgrades • Capacity planning & procurement • Key management • Detecting instance changes • Application ownership, management • Patching, updating • Availability, in a failure-prone environment • Embedding security controls • Least privilege enforcement • Testing/auditing for conformance • Consistency, conformity in build and launch • Continuous, aggressive monitoring, testing
  • 25. Questions?? If you are interested in this presentation, I am uploading this on slideshare.com. You can find it by searching my name Venkatesh Chary. Below is link for reference: