SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
Gerald Tang
Director, Strategic Business Development
Designing Enterprise Security
into Cloud Data Centre
7/4/2013 Confidential | Copyright 2012 Trend Micro Inc.
Singapore
Telecommunications
Limited Overview
SingTel Group at a Glance
S$4.60 billion
operating revenue
S$827 million
net profit
3All financial figures are for the quarter ended 31 December 2012
S$666 million
free cash flow
Over 450 million mobile customers
across Asia and Africa
SingTel Group: Goals
Reinvent core carriage business
Turbo-charge regional capabilities in ICT
services
Drive new growth platforms that
leverage and strengthen the core
4
6
To be the leading ICT
services provider
for businesses in Asia
Pacific
Vision Provide businesses with one-stop, end-to-
end ICT solutions
A network of offices in 40 cities across 22
countries and territories
Revenue is for the quarter ended 31 December 2012
Revenue
S$1.6 billion
250,000 business
cloud users in
Singapore
Our Business : Group Enterprise
Cloud Awards and Recognitions
CLOUD AWARDS
2012 Frost & Sullivan APAC ICT Award
Telecom Cloud Service Provider of the Year
NWA Information Management Awards 2012 Best
Security-as-a-Service
2012/ 2011
Asia Communication Awards 2012
Best Cloud Service (2011 & 2012)
According to IDC ..
Today, Governments and Very Large Enterprises are
slow to adopting cloud as part of their overall IT
strategy due to heightened concerns on SECURITY.
BUT
In 2015, Governments and Very Large Enterprises will
be moving to the cloud because of SECURITY
concerns.
WHY ???
7/4/201 1
IDC Analysts shared ..
“..Major security vendors will have much
more substantial investments in helping
enterprises to secure their data and
applications in the cloud than the traditional
data centre…’ shared by a CIO in couple of weeks back at
an opening address to government attendees.
GARTNER REPORTS THAT TREND MICRO
SECURITY SOLUTION FOR VIRTUALISATION
AND THE CLOUD IS AT LEAST 18 MONTHS
AHEAD OF ITS NEAREST COMPEITITOR
Designing Enterprise Security
into Cloud Data Centre
Enterprise Requirements for the Cloud
• Enterprises today are looking at 3 key areas (Enterprise
Grade Quality, Service Guarantee & Service Support) in
the Cloud and SingTel is addressing them with :
– Enterprise-grade Quality through partnering Enterprise Security
Vendor like Trend Micro delivering the expected Service
Guarantees.
– Coupled with Trend Micro strong regional presence and Service
and Support to the SingTel deployment and operational support
team, SingTel believes we are setting a NEW benchmark for the
new Enterprise and Enterprise Clouds.
Security
Virtual
Appliance
VM VM VM
With Agentless Security
VM
Physical, Virtualization and Cloud Security
Enterprise Security Requirements -
Layered, Virtualization-Aware Security in One Platform
VM VM VM VMVM VM
Consolidate servers, enable VDI, and support consumerization
Integrated Modules:
• Antivirus
• Integrity Monitoring
• Intrusion Prevention
• Web Application Protection
• Application Control
• Firewall
• Log Inspection
Simplified
Management
Higher
Density
Optimized
Resources
Stronger
Security
Patient Medical Records
Credit Card Payment
Information
Sensitive Research ResultsSocial Security Numbers
• Unreadable for unauthorized users
• Control of when and
where data is accessed
• Server validation
• Custody of keys
Encryption
with Policy-based
Key Management
Cloud Security
Modular Protection
• Self-defending VM security
• Agentless and agent-based
• One management portal for all
modules, all deployments
Cost Reduction & Consolidation1 Cloud Security
Trend Micro Cloud Security Offerings
Integration ensures servers have up-to-date
security before encryption keys are released
VM
VMware Virtualization
Security
Virtual
Appliance
VM VM VM VM
• Agentless security
• Layered server security
• Encryption for vSphere
Private Cloud
• Agentless security
• Layered server
security
Security
Virtual
Appliance
VM VM VM
Public Cloud
Server security console
• Shared policy profile
• Virtual patching
VM
VM VM VMVM
• Encryption for vCloud
• Compliance support
(FIM, Encryption, etc.)
Encryption console
• Shared policy profile
• Key ownership
• Agent-based security
• Layered server security
• Encryption for leading cloud providers
• Compliance support (FIM, Encryption, etc.)
VM
Cost Reduction & Consolidation1 Virtualization and Cloud Security
Case Study - Multiple Envrionment Deployment
Why we partner Trend Micro ??
• Market leadership and trusted security partner.
• One stop security solution partner for all Network,
Datacentre, Server, Application extending from
Virtualisation to the Cloud.
• Smart protection against theft and loss..
• Simple yet flexible to manage and deploy..
• Security that fits an evolving ecosystem..

Más contenido relacionado

La actualidad más candente

CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
Scott Dierks
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
Erik Ginalick
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
Harry Gunns
 
Managing Microsoft Applications with Vistara
Managing Microsoft Applications with VistaraManaging Microsoft Applications with Vistara
Managing Microsoft Applications with Vistara
Vistara
 
Veddio Overview
Veddio OverviewVeddio Overview
Veddio Overview
gregbugay
 
Techgate's Disaster Recovery as a Service Managed Cloud Recovery
Techgate's Disaster Recovery as a Service Managed Cloud RecoveryTechgate's Disaster Recovery as a Service Managed Cloud Recovery
Techgate's Disaster Recovery as a Service Managed Cloud Recovery
Techgate plc
 

La actualidad más candente (20)

CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Why CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud LeaderWhy CenturyLink Savvis Cloud Leader
Why CenturyLink Savvis Cloud Leader
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia Ten Type of Innovation - Universitas Indonesia
Ten Type of Innovation - Universitas Indonesia
 
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...Delivering Business Agility through Datacenter Automation with Citrix NetScal...
Delivering Business Agility through Datacenter Automation with Citrix NetScal...
 
Into the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the CloudInto the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the Cloud
 
Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
What's New in Release 16 EP7
What's New in Release 16 EP7What's New in Release 16 EP7
What's New in Release 16 EP7
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
Web Werks Introduces Tally as a Service (TAAS)
Web Werks Introduces Tally as a Service (TAAS)Web Werks Introduces Tally as a Service (TAAS)
Web Werks Introduces Tally as a Service (TAAS)
 
Managing Microsoft Applications with Vistara
Managing Microsoft Applications with VistaraManaging Microsoft Applications with Vistara
Managing Microsoft Applications with Vistara
 
Veddio Overview
Veddio OverviewVeddio Overview
Veddio Overview
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
Cloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud InfrastructureCloud Managed Services: Cloud Infrastructure
Cloud Managed Services: Cloud Infrastructure
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
 
Techgate's Disaster Recovery as a Service Managed Cloud Recovery
Techgate's Disaster Recovery as a Service Managed Cloud RecoveryTechgate's Disaster Recovery as a Service Managed Cloud Recovery
Techgate's Disaster Recovery as a Service Managed Cloud Recovery
 

Similar a Sing Tel - Designing security into datacenter - Gerald Tang

Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 
Towards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & AtosTowards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & Atos
Csilla Zsigri
 
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
poojalate59
 

Similar a Sing Tel - Designing security into datacenter - Gerald Tang (20)

Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Towards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & AtosTowards Hybrid Strategies - 451 Research & Atos
Towards Hybrid Strategies - 451 Research & Atos
 
Cloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | NetfastCloud Migration and Managed Services | Netfast
Cloud Migration and Managed Services | Netfast
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 
How to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortuneHow to move to the cloud, get it right, stay secure and not cost a fortune
How to move to the cloud, get it right, stay secure and not cost a fortune
 
Richard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise CloudRichard Knight: Real world stories from the frontline of enterprise Cloud
Richard Knight: Real world stories from the frontline of enterprise Cloud
 
Cloud asia 2012
Cloud asia 2012Cloud asia 2012
Cloud asia 2012
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
Ensure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted DataEnsure Cloud Migration Success with Trusted Data
Ensure Cloud Migration Success with Trusted Data
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
Decoding Excellence Unraveling the Impact of Cloud Provider Services on Moder...
 

Más de Minh Le (10)

Blackstone
BlackstoneBlackstone
Blackstone
 
Dien toan dam may nguon mo - Ung dung trung tam du lieu Da Nang
Dien toan dam may nguon mo - Ung dung trung tam du lieu Da NangDien toan dam may nguon mo - Ung dung trung tam du lieu Da Nang
Dien toan dam may nguon mo - Ung dung trung tam du lieu Da Nang
 
Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...
Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...
Chia sẻ kinh nghiệm phát triển hạ tầng CNTT Đà Nẵng - Mạng đô thị (MAN) và Tr...
 
Slide nagios
Slide nagiosSlide nagios
Slide nagios
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
SK infosec company profile
SK infosec company profileSK infosec company profile
SK infosec company profile
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Cloud computing and OpenStack
Cloud computing and OpenStackCloud computing and OpenStack
Cloud computing and OpenStack
 
Cloud computing and OpenStack
Cloud computing and OpenStackCloud computing and OpenStack
Cloud computing and OpenStack
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Sing Tel - Designing security into datacenter - Gerald Tang

  • 1. Gerald Tang Director, Strategic Business Development Designing Enterprise Security into Cloud Data Centre 7/4/2013 Confidential | Copyright 2012 Trend Micro Inc.
  • 3. SingTel Group at a Glance S$4.60 billion operating revenue S$827 million net profit 3All financial figures are for the quarter ended 31 December 2012 S$666 million free cash flow Over 450 million mobile customers across Asia and Africa
  • 4. SingTel Group: Goals Reinvent core carriage business Turbo-charge regional capabilities in ICT services Drive new growth platforms that leverage and strengthen the core 4
  • 5.
  • 6. 6 To be the leading ICT services provider for businesses in Asia Pacific Vision Provide businesses with one-stop, end-to- end ICT solutions A network of offices in 40 cities across 22 countries and territories Revenue is for the quarter ended 31 December 2012 Revenue S$1.6 billion 250,000 business cloud users in Singapore Our Business : Group Enterprise
  • 7.
  • 8. Cloud Awards and Recognitions CLOUD AWARDS 2012 Frost & Sullivan APAC ICT Award Telecom Cloud Service Provider of the Year NWA Information Management Awards 2012 Best Security-as-a-Service 2012/ 2011 Asia Communication Awards 2012 Best Cloud Service (2011 & 2012)
  • 9.
  • 10. According to IDC .. Today, Governments and Very Large Enterprises are slow to adopting cloud as part of their overall IT strategy due to heightened concerns on SECURITY. BUT In 2015, Governments and Very Large Enterprises will be moving to the cloud because of SECURITY concerns. WHY ??? 7/4/201 1
  • 11. IDC Analysts shared .. “..Major security vendors will have much more substantial investments in helping enterprises to secure their data and applications in the cloud than the traditional data centre…’ shared by a CIO in couple of weeks back at an opening address to government attendees. GARTNER REPORTS THAT TREND MICRO SECURITY SOLUTION FOR VIRTUALISATION AND THE CLOUD IS AT LEAST 18 MONTHS AHEAD OF ITS NEAREST COMPEITITOR
  • 13. Enterprise Requirements for the Cloud • Enterprises today are looking at 3 key areas (Enterprise Grade Quality, Service Guarantee & Service Support) in the Cloud and SingTel is addressing them with : – Enterprise-grade Quality through partnering Enterprise Security Vendor like Trend Micro delivering the expected Service Guarantees. – Coupled with Trend Micro strong regional presence and Service and Support to the SingTel deployment and operational support team, SingTel believes we are setting a NEW benchmark for the new Enterprise and Enterprise Clouds.
  • 14. Security Virtual Appliance VM VM VM With Agentless Security VM Physical, Virtualization and Cloud Security Enterprise Security Requirements - Layered, Virtualization-Aware Security in One Platform VM VM VM VMVM VM Consolidate servers, enable VDI, and support consumerization Integrated Modules: • Antivirus • Integrity Monitoring • Intrusion Prevention • Web Application Protection • Application Control • Firewall • Log Inspection Simplified Management Higher Density Optimized Resources Stronger Security
  • 15. Patient Medical Records Credit Card Payment Information Sensitive Research ResultsSocial Security Numbers • Unreadable for unauthorized users • Control of when and where data is accessed • Server validation • Custody of keys Encryption with Policy-based Key Management Cloud Security Modular Protection • Self-defending VM security • Agentless and agent-based • One management portal for all modules, all deployments Cost Reduction & Consolidation1 Cloud Security Trend Micro Cloud Security Offerings Integration ensures servers have up-to-date security before encryption keys are released
  • 16. VM VMware Virtualization Security Virtual Appliance VM VM VM VM • Agentless security • Layered server security • Encryption for vSphere Private Cloud • Agentless security • Layered server security Security Virtual Appliance VM VM VM Public Cloud Server security console • Shared policy profile • Virtual patching VM VM VM VMVM • Encryption for vCloud • Compliance support (FIM, Encryption, etc.) Encryption console • Shared policy profile • Key ownership • Agent-based security • Layered server security • Encryption for leading cloud providers • Compliance support (FIM, Encryption, etc.) VM Cost Reduction & Consolidation1 Virtualization and Cloud Security Case Study - Multiple Envrionment Deployment
  • 17. Why we partner Trend Micro ?? • Market leadership and trusted security partner. • One stop security solution partner for all Network, Datacentre, Server, Application extending from Virtualisation to the Cloud. • Smart protection against theft and loss.. • Simple yet flexible to manage and deploy.. • Security that fits an evolving ecosystem..