SlideShare una empresa de Scribd logo
1 de 54
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
Jean-François Pujol
Cisco Systems
Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
… and one other
Public Cloud
Private Cloud
Virtual Private
Cloud
Hybrid Cloud
Community
Cloud
Quick reminder :
Cloud Deployment Model
Public Cloud
Cloud infrastructure made available to the
general public.
Private Cloud
Cloud infrastructure operated solely for an
organization.
Virtual Private
Cloud
Cloud services that simulate the private
cloud experience in public cloud
infrastructure
Hybrid Cloud
Cloud infrastructure composed of two or
more clouds that interoperate or federate
through technology
Community
Cloud
Cloud infrastructure shared by several
organizations and supporting a specific
community
NIST
Deployment
Models
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 3
Public vs. Private Cloud Security
While the technology basement remains the same, we
may consider two different approaches to the problem :
  Public Cloud :
– Delegation versus Trust
  Private Cloud :
– Abstraction / Virtualization versus Complexity
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 4
Considerations about the
Public Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 5
The New World : Shifting Borders
IT Consumerization
Device
Border
Mobile
Worker
Location
Border
Internal Applications
IaaS,SaaS
Application As A Service
Application
Border
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 6
The (not so) New World : Location Border
Mobile
Worker
Location
Border
Internal Applications
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 7
Traditional Corporate Border
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 8
Now with Mobile Users and VPNs
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 9
With Mobile Users when
not protected by VPNs…
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 10
The New World : Application Border
Internal Applications
IaaS,SaaS
Application As A Service
Application
Border
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
...Everything is Cloud
The Consumer’s View of Cloud
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 12
These Cloudy Days …
  Internet is reliable
  Cloud services are well known in the consumer market,
and the consumer market creates some pressure in the
enterprise world.
  Is LinkedIn a consumer/personal or business service ?
  Enterprises are turning every single task into a process.
It creates a strong traction for adopting services (OPEX
vs CAPEX)
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 13
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 14
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 16
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 17
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 18
Organizations don’t have even the
choice …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 19
First security concern
  Enterprises are using unmanaged cloud services today
– in a more or less control way
  On public and (almost) free consumer platforms :
– No real control over the corporate image
– Risks of information leakage
– Risks of misleading
– Risks of Social Engineering attacks
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 20
Global trend for outsourcing
  Every business process is analyzed :
– Down to a single application
– Down to any individual
  If you can define it, measure it, and it is not a core
business activity, you want to outsource it
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 21
Can you afford to manage the risk ?
Imagine you have :
  A couple of consultants
  Employees under temporary contract
  A complete department is outsourced (Dev, Marketing,
etc…)
  Datacenter exploitation is outsourced
  Networks, servers, premises, and people are
outsourced
  Cloud based services
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 22
Key to Broader Adoption of Cloud: Trust
Before the Economics of Cloud Computing Can be Considered,
Organizations Require a Trusted Service Infrastructure
Security Control
Service-Level
Management
Compliance
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID
Enterprise Deployment Models
Distinguishing between Ownership and Control
Ownership
Control
Internal Resources
All cloud
resources
owned by or
dedicated to
enterprise
External Resources
All cloud
resources owned
by providers;
used by many
customers
Private Cloud
Cloud definition/
governance
controlled by
enterprise
Public Cloud
Cloud definition/
governance
controlled by
provider
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 24
Data
App
VM
Server
Storage
Network
Dedicated IT
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Data
App
VM
Server
Storage
Network
Hosting Provider Public Iaas Public Paas Public Saas
Organization shares control
with service providerOrganization has control Service provider has control
Control and Trust evolve with cloud
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 25
What This Means To Security
Amazon EC2 - IaaS
The lower down the stack the Cloud provider
stops, the more security you are tactically
responsible for implementing & managing
yourself.
Salesforce - SaaS
Google AppEngine - PaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 26
The Cloud Security Alliance’s 13 Critical Areas Of Focus for Cloud:
1. Architecture & Framework
Governing the Cloud Operating the Cloud
2. Governance & Risk Mgmt 8. Traditional BCM, DR
3. Legal & Electronic Discovery 9. Datacenter Operations
5. Compliance & Audit 10. Incident Response
6. Information Lifecycle Mgmt 11. Application Security
7. Portability & Interoperability 12. Encryption & Key Mgmt
13. Identity & Access Mgmt
www.cloudsecurityalliance.org
Cloud Security Alliance - Guidance
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 27
The Cloud Security Alliance’s Top Threats to Cloud Computing V1.0 :
www.cloudsecurityalliance.org
Cloud Security Alliance
Top Threats to Cloud Computing
1. Abuse and Nefarious Use of Cloud
2. Insecure Interfaces and APIs
3. Malicious Insiders
4. Shared Technology
5. Data Loss or
6. Account or Service Hijacking
7. Unknown Risk Profile
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 28
Some important factors to consider
for the service
 Single Tenancy / Multi-tenancy
 Isolated Data / Co-mingled Data
 Dedicated Security / Socialist Security
 On-premise / Off-premise
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 29
CloudAudit & the A6 Deliverable
 Provide a common interface
and namespace that allows
cloud computing providers to
automate the Audit, Assertion,
Assessment, and Assurance
(A6) of their environments
 Allow authorized consumers of
services to do likewise via an
open, extensible and secure
interface and methodology.
http://www.cloudaudit.org
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 30
That is the question …
 May your private organization be potentially
more secure than a public cloud service ?
 (and/or cheaper …)
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 31
Saleforce.com
82 000 + customers …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 32
Saleforce.com
82 000 + customers …
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 33
Could you Trust Force.com ?
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 34
Force.com Security Literature
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 35
Security recommendations
  1# educate your users
  2# Identify your primary security contact
  3# Secure Employee Systems
  4# Implement IP restrictions
  5# strengthen password policies
  6# require secure sessions
  7# Decrease session timeout value
Reference: http://wiki.developerforce.com/index.php/
An_Overview_of_Force.com_SecuritySecurity
Webinar : https://salesforce.acrobat.com/securitywebinar
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 36
The New World : Device Borders
IT Consumerization
Device
BorderInternal Applications
Are they still corporate assets ?
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 37
Desktop Virtualization is part of the
Security Journey
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 38
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Coffee
Shop
Customers
Airport
Mobile
User Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
Concern: Security in a Cloud World
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 39
Branch
Office
Corporate
Office
Home
Office
SaaS Access Control
Regaining Visibility and Control Through Identity
SAML-
basedAnyConnect
Secure
Mobility Client
Visibility | Centralized Enforcement | Single Source Revocation
Redirect @ Login
SaaS
Single
Sign On
Web
Security
Appliance
Directory
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 40
AnyConnect Secure Mobility Vision
On-Premise Gateway or Cloud Policy Enforcement
Cisco
Cisco
Web Security Appliance
ASA
The image cannot be
displayed. Your
computer may not have
enough memory to open
the image, or the image
may have been
corrupted. Restart your
computer, and then
open the file again. If
the red x still appears,
you may have to delete
the image and then
insert it again.
Social Networking
Enterprise SaaS
News
EmailIntegration
of ScanSafe’s client
ON-PREMISE
AnyConnect
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 41
Mobile Users and Secured Cloud Access
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
Enterprise SaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 42
Non Secured Users Should Be Filtered
Out
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
Attackers
Home Office
Mobile
User
Enterprise SaaS
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 43
Public Services Access Can Be
Filtered Out
https://na1.salesforce.com/help/doc/en/salesforce_security_impl_guide.pdf
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 44
Considerations about the
Private Cloud Security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 45
Trusted
Controlled
Reliable
Secure
CLOSED
First days of a Private Cloud
Anchored on Trust & Control
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 46
Highly Virtualized
Data Centers and
Cloud Computing
Trusted
Controlled
Reliable
Secure
Flexible
Dynamic
On-demand
Efficient
Cloud Computing
Targeting Agility and Efficiency
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 47
Virtualization & Cloud Driving New
Requirements in Data Center
VDC-1
VDC-2
Hypervisor
App
OS
App
OS
App
OS
Dedicated
Network
Services
Firewall SLB/ADC WAN Opt
Virtual Service Nodes (VSNs)
• Virtual appliance form factor
• Dynamic Instantiation/Provisioning
• Service transparent to VM mobility
• Support scale-out
• Large scale multi-tenant operation
• Application-specific
services
• Form factors:
•  Appliance
•  Switch module
Virtual Network Services
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 48
Fully Inter-connected Network Services
Vision
ASA	
  
SIA
Nexus 1000V
SIA
Inter-connected
services across
physical and virtual
environments
SIA: Service Insertion Architecture
VSN
vPath
SIA
SIA
Distribution Layer
Services
Virtual Network
Services
VSN
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 49
Data Center Security Challenges
  Virtualization
  Applications
  Data Loss
  Compliance
  Availability
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 50
Cloud-Specific Issues Emerging
 Organizational & Operational Misalignment
 Monoculture of Operating Systems, Virtualized
Components & Platforms
 Privacy Of Data/Metadata, Exfiltration and
Leakage
 Inability to Deploy Compensating or Detective
Controls
 Segmentation & Isolation In Multi-tenant
environments...
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 51
Cloud Happiness
  Centralized Data (sort of...)
  Segmented data/applications
  Better Logging/Accountability
  Standardized images for asset deployment
  Better Resilience to attack & streamlined incident
response
  More streamlined Audit and Compliance
  Better visibility to process
  Faster deployment of applications, services, etc.
The Cloud can provide the following security benefits:
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 52
Key Takeaways
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 53
Key Takeaways
(From A Customer’s Perspective)
  Have a risk assessment methodology, classify assets and
data.
  Interrogate vendors and providers; use the same diligence that
you would for outsourced services today; focus on resilience/
recovery, SLA’s, confidentiality, privacy and segmentation.
  The challenge is to match business/security requirements
against the various *aaS model(s)
  Each of the *aaS models provides a delicate balance of
openness, flexibility, control, security and extensibility
  Regardless of the model, you are still responsible for some
element of security
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 54
References
  Cloud literature on Cisco.com
http://www.cisco.com/en/US/netsol/ns976/index.html
  Cloud Computing Google Groups:
  Cloud Computing
http://groups.google.com/group/cloud-computing
  Cloud Computing Interoperability Forum
http://groups.google.com/group/cloudforum
  Cloud Storage
http://groups.google.com/group/cloudstorage
  Attend a local
  Join the Cloud Security Alliance & CloudAudit...
© 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 55

Más contenido relacionado

La actualidad más candente

Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
Best Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrBest Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrAmazon Web Services
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack FundamentalsCenk Ersoy
 
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudHybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudAleksandar Francuz
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)Jatinder Randhawa
 
Cloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalCloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalSukumar Nayak
 
The SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxThe SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxUmooraMinhaji
 
Overview of Azure Arc enabled Kubernetes
Overview of Azure Arc enabled KubernetesOverview of Azure Arc enabled Kubernetes
Overview of Azure Arc enabled KubernetesPieter de Bruin
 

La actualidad más candente (20)

Cloud security
Cloud security Cloud security
Cloud security
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
Best Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff BarrBest Practices for Architecting in the Cloud - Jeff Barr
Best Practices for Architecting in the Cloud - Jeff Barr
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack Fundamentals
 
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to CloudHybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
Hybrid- and Multi-Cloud by design - IBM Cloud and your journey to Cloud
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Fundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWSFundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWS
 
Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)Aws overview (Amazon Web Services)
Aws overview (Amazon Web Services)
 
Cloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalCloud Services Integration Automation-External
Cloud Services Integration Automation-External
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
The SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptxThe SQL Server 2022 Workshop.pptx
The SQL Server 2022 Workshop.pptx
 
Overview of Azure Arc enabled Kubernetes
Overview of Azure Arc enabled KubernetesOverview of Azure Arc enabled Kubernetes
Overview of Azure Arc enabled Kubernetes
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 

Destacado

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overviewFabio Pietrosanti
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
StarLink Award certificate
StarLink Award certificateStarLink Award certificate
StarLink Award certificateWael Emam
 
Sample Slides from the Impactful Presentation Skills Workshop
Sample Slides from the Impactful Presentation Skills WorkshopSample Slides from the Impactful Presentation Skills Workshop
Sample Slides from the Impactful Presentation Skills WorkshopMohit Chhabra
 
Persuasive Communication at IILM, Gurgaon
Persuasive Communication at IILM, GurgaonPersuasive Communication at IILM, Gurgaon
Persuasive Communication at IILM, GurgaonMohit Chhabra
 
Data Center Trends 2014
Data Center Trends 2014Data Center Trends 2014
Data Center Trends 2014Belden Inc
 
High Impact Presentation
High Impact PresentationHigh Impact Presentation
High Impact PresentationRitu Chiradeep
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next PresentationSOAP Presentations
 

Destacado (11)

Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview2010: Mobile Security - Intense overview
2010: Mobile Security - Intense overview
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
StarLink Award certificate
StarLink Award certificateStarLink Award certificate
StarLink Award certificate
 
Sample Slides from the Impactful Presentation Skills Workshop
Sample Slides from the Impactful Presentation Skills WorkshopSample Slides from the Impactful Presentation Skills Workshop
Sample Slides from the Impactful Presentation Skills Workshop
 
Persuasive Communication at IILM, Gurgaon
Persuasive Communication at IILM, GurgaonPersuasive Communication at IILM, Gurgaon
Persuasive Communication at IILM, Gurgaon
 
Data Center Trends 2014
Data Center Trends 2014Data Center Trends 2014
Data Center Trends 2014
 
High Impact Presentation
High Impact PresentationHigh Impact Presentation
High Impact Presentation
 
10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation10 Powerful Body Language Tips for your next Presentation
10 Powerful Body Language Tips for your next Presentation
 

Similar a Presentation cisco cloud security

Presentation capturing the cloud opportunity
Presentation   capturing the cloud opportunityPresentation   capturing the cloud opportunity
Presentation capturing the cloud opportunityxKinAnx
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offerxKinAnx
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsHarshitParkar6677
 
Computing solutions
Computing solutionsComputing solutions
Computing solutionsToufik Kaci
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
Cloud Computing Security Frameworks - our view from exoscale
Cloud Computing Security Frameworks - our view from exoscaleCloud Computing Security Frameworks - our view from exoscale
Cloud Computing Security Frameworks - our view from exoscaleAntoine COETSIER
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 

Similar a Presentation cisco cloud security (20)

5787355.ppt
5787355.ppt5787355.ppt
5787355.ppt
 
Presentation capturing the cloud opportunity
Presentation   capturing the cloud opportunityPresentation   capturing the cloud opportunity
Presentation capturing the cloud opportunity
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Presentation cloud, the whole offer
Presentation   cloud, the whole offerPresentation   cloud, the whole offer
Presentation cloud, the whole offer
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
Cloud Computing Security Frameworks - our view from exoscale
Cloud Computing Security Frameworks - our view from exoscaleCloud Computing Security Frameworks - our view from exoscale
Cloud Computing Security Frameworks - our view from exoscale
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 

Más de xKinAnx

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep divexKinAnx
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudxKinAnx
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...xKinAnx
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directionsxKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudxKinAnx
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...xKinAnx
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...xKinAnx
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rolloutxKinAnx
 

Más de xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Último

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Presentation cisco cloud security

  • 1. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Jean-François Pujol Cisco Systems Cloud Security
  • 2. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID … and one other Public Cloud Private Cloud Virtual Private Cloud Hybrid Cloud Community Cloud Quick reminder : Cloud Deployment Model Public Cloud Cloud infrastructure made available to the general public. Private Cloud Cloud infrastructure operated solely for an organization. Virtual Private Cloud Cloud services that simulate the private cloud experience in public cloud infrastructure Hybrid Cloud Cloud infrastructure composed of two or more clouds that interoperate or federate through technology Community Cloud Cloud infrastructure shared by several organizations and supporting a specific community NIST Deployment Models
  • 3. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 3 Public vs. Private Cloud Security While the technology basement remains the same, we may consider two different approaches to the problem :   Public Cloud : – Delegation versus Trust   Private Cloud : – Abstraction / Virtualization versus Complexity
  • 4. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 4 Considerations about the Public Cloud Security
  • 5. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 5 The New World : Shifting Borders IT Consumerization Device Border Mobile Worker Location Border Internal Applications IaaS,SaaS Application As A Service Application Border
  • 6. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 6 The (not so) New World : Location Border Mobile Worker Location Border Internal Applications
  • 7. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 7 Traditional Corporate Border Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers
  • 8. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 8 Now with Mobile Users and VPNs Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User
  • 9. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 9 With Mobile Users when not protected by VPNs… Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User
  • 10. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 10 The New World : Application Border Internal Applications IaaS,SaaS Application As A Service Application Border
  • 11. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID ...Everything is Cloud The Consumer’s View of Cloud
  • 12. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 12 These Cloudy Days …   Internet is reliable   Cloud services are well known in the consumer market, and the consumer market creates some pressure in the enterprise world.   Is LinkedIn a consumer/personal or business service ?   Enterprises are turning every single task into a process. It creates a strong traction for adopting services (OPEX vs CAPEX)
  • 13. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 13 Organizations don’t have even the choice …
  • 14. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 14 Organizations don’t have even the choice …
  • 15. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 16 Organizations don’t have even the choice …
  • 16. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 17 Organizations don’t have even the choice …
  • 17. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 18 Organizations don’t have even the choice …
  • 18. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 19 First security concern   Enterprises are using unmanaged cloud services today – in a more or less control way   On public and (almost) free consumer platforms : – No real control over the corporate image – Risks of information leakage – Risks of misleading – Risks of Social Engineering attacks
  • 19. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 20 Global trend for outsourcing   Every business process is analyzed : – Down to a single application – Down to any individual   If you can define it, measure it, and it is not a core business activity, you want to outsource it
  • 20. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 21 Can you afford to manage the risk ? Imagine you have :   A couple of consultants   Employees under temporary contract   A complete department is outsourced (Dev, Marketing, etc…)   Datacenter exploitation is outsourced   Networks, servers, premises, and people are outsourced   Cloud based services
  • 21. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 22 Key to Broader Adoption of Cloud: Trust Before the Economics of Cloud Computing Can be Considered, Organizations Require a Trusted Service Infrastructure Security Control Service-Level Management Compliance
  • 22. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco SystemsPresentation_ID Enterprise Deployment Models Distinguishing between Ownership and Control Ownership Control Internal Resources All cloud resources owned by or dedicated to enterprise External Resources All cloud resources owned by providers; used by many customers Private Cloud Cloud definition/ governance controlled by enterprise Public Cloud Cloud definition/ governance controlled by provider
  • 23. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 24 Data App VM Server Storage Network Dedicated IT Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Data App VM Server Storage Network Hosting Provider Public Iaas Public Paas Public Saas Organization shares control with service providerOrganization has control Service provider has control Control and Trust evolve with cloud
  • 24. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 25 What This Means To Security Amazon EC2 - IaaS The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself. Salesforce - SaaS Google AppEngine - PaaS
  • 25. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 26 The Cloud Security Alliance’s 13 Critical Areas Of Focus for Cloud: 1. Architecture & Framework Governing the Cloud Operating the Cloud 2. Governance & Risk Mgmt 8. Traditional BCM, DR 3. Legal & Electronic Discovery 9. Datacenter Operations 5. Compliance & Audit 10. Incident Response 6. Information Lifecycle Mgmt 11. Application Security 7. Portability & Interoperability 12. Encryption & Key Mgmt 13. Identity & Access Mgmt www.cloudsecurityalliance.org Cloud Security Alliance - Guidance
  • 26. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 27 The Cloud Security Alliance’s Top Threats to Cloud Computing V1.0 : www.cloudsecurityalliance.org Cloud Security Alliance Top Threats to Cloud Computing 1. Abuse and Nefarious Use of Cloud 2. Insecure Interfaces and APIs 3. Malicious Insiders 4. Shared Technology 5. Data Loss or 6. Account or Service Hijacking 7. Unknown Risk Profile
  • 27. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 28 Some important factors to consider for the service  Single Tenancy / Multi-tenancy  Isolated Data / Co-mingled Data  Dedicated Security / Socialist Security  On-premise / Off-premise
  • 28. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 29 CloudAudit & the A6 Deliverable  Provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their environments  Allow authorized consumers of services to do likewise via an open, extensible and secure interface and methodology. http://www.cloudaudit.org
  • 29. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 30 That is the question …  May your private organization be potentially more secure than a public cloud service ?  (and/or cheaper …)
  • 30. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 31 Saleforce.com 82 000 + customers …
  • 31. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 32 Saleforce.com 82 000 + customers …
  • 32. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 33 Could you Trust Force.com ?
  • 33. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 34 Force.com Security Literature
  • 34. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 35 Security recommendations   1# educate your users   2# Identify your primary security contact   3# Secure Employee Systems   4# Implement IP restrictions   5# strengthen password policies   6# require secure sessions   7# Decrease session timeout value Reference: http://wiki.developerforce.com/index.php/ An_Overview_of_Force.com_SecuritySecurity Webinar : https://salesforce.acrobat.com/securitywebinar
  • 35. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 36 The New World : Device Borders IT Consumerization Device BorderInternal Applications Are they still corporate assets ?
  • 36. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 37 Desktop Virtualization is part of the Security Journey
  • 37. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 38 Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Coffee Shop Customers Airport Mobile User Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service Concern: Security in a Cloud World
  • 38. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 39 Branch Office Corporate Office Home Office SaaS Access Control Regaining Visibility and Control Through Identity SAML- basedAnyConnect Secure Mobility Client Visibility | Centralized Enforcement | Single Source Revocation Redirect @ Login SaaS Single Sign On Web Security Appliance Directory
  • 39. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 40 AnyConnect Secure Mobility Vision On-Premise Gateway or Cloud Policy Enforcement Cisco Cisco Web Security Appliance ASA The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Social Networking Enterprise SaaS News EmailIntegration of ScanSafe’s client ON-PREMISE AnyConnect
  • 40. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 41 Mobile Users and Secured Cloud Access Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User Enterprise SaaS
  • 41. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 42 Non Secured Users Should Be Filtered Out Corporate Border Branch Office Applications and Data Corporate Office Policy Attackers Home Office Mobile User Enterprise SaaS
  • 42. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 43 Public Services Access Can Be Filtered Out https://na1.salesforce.com/help/doc/en/salesforce_security_impl_guide.pdf
  • 43. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 44 Considerations about the Private Cloud Security
  • 44. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 45 Trusted Controlled Reliable Secure CLOSED First days of a Private Cloud Anchored on Trust & Control
  • 45. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 46 Highly Virtualized Data Centers and Cloud Computing Trusted Controlled Reliable Secure Flexible Dynamic On-demand Efficient Cloud Computing Targeting Agility and Efficiency
  • 46. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 47 Virtualization & Cloud Driving New Requirements in Data Center VDC-1 VDC-2 Hypervisor App OS App OS App OS Dedicated Network Services Firewall SLB/ADC WAN Opt Virtual Service Nodes (VSNs) • Virtual appliance form factor • Dynamic Instantiation/Provisioning • Service transparent to VM mobility • Support scale-out • Large scale multi-tenant operation • Application-specific services • Form factors: •  Appliance •  Switch module Virtual Network Services
  • 47. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 48 Fully Inter-connected Network Services Vision ASA   SIA Nexus 1000V SIA Inter-connected services across physical and virtual environments SIA: Service Insertion Architecture VSN vPath SIA SIA Distribution Layer Services Virtual Network Services VSN
  • 48. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 49 Data Center Security Challenges   Virtualization   Applications   Data Loss   Compliance   Availability
  • 49. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 50 Cloud-Specific Issues Emerging  Organizational & Operational Misalignment  Monoculture of Operating Systems, Virtualized Components & Platforms  Privacy Of Data/Metadata, Exfiltration and Leakage  Inability to Deploy Compensating or Detective Controls  Segmentation & Isolation In Multi-tenant environments...
  • 50. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 51 Cloud Happiness   Centralized Data (sort of...)   Segmented data/applications   Better Logging/Accountability   Standardized images for asset deployment   Better Resilience to attack & streamlined incident response   More streamlined Audit and Compliance   Better visibility to process   Faster deployment of applications, services, etc. The Cloud can provide the following security benefits:
  • 51. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 52 Key Takeaways
  • 52. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 53 Key Takeaways (From A Customer’s Perspective)   Have a risk assessment methodology, classify assets and data.   Interrogate vendors and providers; use the same diligence that you would for outsourced services today; focus on resilience/ recovery, SLA’s, confidentiality, privacy and segmentation.   The challenge is to match business/security requirements against the various *aaS model(s)   Each of the *aaS models provides a delicate balance of openness, flexibility, control, security and extensibility   Regardless of the model, you are still responsible for some element of security
  • 53. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 54 References   Cloud literature on Cisco.com http://www.cisco.com/en/US/netsol/ns976/index.html   Cloud Computing Google Groups:   Cloud Computing http://groups.google.com/group/cloud-computing   Cloud Computing Interoperability Forum http://groups.google.com/group/cloudforum   Cloud Storage http://groups.google.com/group/cloudstorage   Attend a local   Join the Cloud Security Alliance & CloudAudit...
  • 54. © 2010 Cisco Systems, Inc. All rights reserved. Cisco Systems 55