SlideShare a Scribd company logo
1 of 15
Alexandra Instituttet Cloud computing Security 6/5/2011
Alexandra Institute Cloud computingSecurity
What Is Cloud Computing?
Cloud Benefits
B2B Scenario
B2B2C Scenario (Business to Business to Customer)
Innovation In Assembly Scenario
Cloud Computing Evolution
Cloud Service Models http://www.katescomment.com/iaas-paas-saas-definition/
Multi-Tenancy
Alexandra Institute Cloud computing Security
14 Specific Cloud Computing Security Challenges* Migrating PII & sensitive data to the cloud ,[object Object]
Exposure of data to foreign government & data
Subpoenas
Data retention & records management issues

More Related Content

What's hot

Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9John Varghese
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory complianceUlf Mattsson
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution BriefJoseph DeFever
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Bitglass
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueVijayananda Mohire
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - SymantecHarry Gunns
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New HopeBitglass
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...Elasticsearch
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
 

What's hot (20)

Dome9 Public Cloud Security
Dome9 Public Cloud SecurityDome9 Public Cloud Security
Dome9 Public Cloud Security
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Elastic Security Solution Brief
Elastic Security Solution BriefElastic Security Solution Brief
Elastic Security Solution Brief
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
A safety design of
A safety design ofA safety design of
A safety design of
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Content is King - Symantec
Content is King - SymantecContent is King - Symantec
Content is King - Symantec
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Cloud security
Cloud securityCloud security
Cloud security
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...The Journey from Zero to SOC: How Citadel built its Security Operations from ...
The Journey from Zero to SOC: How Citadel built its Security Operations from ...
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 

Viewers also liked

Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Alexandra Instituttet
 
Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Alexandra Instituttet
 
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"Alexandra Instituttet
 
øLmave eller bare insulinresistent
øLmave   eller bare insulinresistentøLmave   eller bare insulinresistent
øLmave eller bare insulinresistentEdb Huset a/s
 
2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"Alexandra Instituttet
 
Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Alexandra Instituttet
 
Customer Experience Maturity Assessment
Customer Experience Maturity AssessmentCustomer Experience Maturity Assessment
Customer Experience Maturity AssessmentMac Wheeler
 
Gartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing ClientsGartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing Clientsfranzel77
 
Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Jesse Gant
 
Top 10 utilities interview questions with answers
Top 10 utilities interview questions with answersTop 10 utilities interview questions with answers
Top 10 utilities interview questions with answerslibbygray000
 
Defining product marketing
Defining product marketingDefining product marketing
Defining product marketingGerardo A Dada
 

Viewers also liked (19)

Mobileappdev fah
Mobileappdev fahMobileappdev fah
Mobileappdev fah
 
Apriori data mining in the cloud
Apriori data mining in the cloudApriori data mining in the cloud
Apriori data mining in the cloud
 
Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012Big data visualisation workshop, 5 Dec. 2012
Big data visualisation workshop, 5 Dec. 2012
 
Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"Innovations & it i turisterhvervet "Fremtidens oplevelser"
Innovations & it i turisterhvervet "Fremtidens oplevelser"
 
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
Innovation & it i turisterhvervet "Interaktive oplevelser i byrummet"
 
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
Innovation & it i turisterhvervet "Tendenser og forbrugerbehov"
 
Teknologikaravanen - katalog
Teknologikaravanen - katalogTeknologikaravanen - katalog
Teknologikaravanen - katalog
 
Sund Innovation i Randers
Sund Innovation i RandersSund Innovation i Randers
Sund Innovation i Randers
 
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
2010 Sorø "Internet of Things, Cloud Computing & Sikkerhed"
 
øLmave eller bare insulinresistent
øLmave   eller bare insulinresistentøLmave   eller bare insulinresistent
øLmave eller bare insulinresistent
 
2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"2010 Sorø "Det der med innovation i danske virksomheder"
2010 Sorø "Det der med innovation i danske virksomheder"
 
Forretningsudvikling og Innovation
Forretningsudvikling og InnovationForretningsudvikling og Innovation
Forretningsudvikling og Innovation
 
Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"Innovation & it i turisterhvervet "Kommunikation og interaktion"
Innovation & it i turisterhvervet "Kommunikation og interaktion"
 
Customer Experience Maturity Assessment
Customer Experience Maturity AssessmentCustomer Experience Maturity Assessment
Customer Experience Maturity Assessment
 
Gartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing ClientsGartner for Product Management and Marketing Clients
Gartner for Product Management and Marketing Clients
 
Product and UX - are the roles blurring?
Product and UX - are the roles blurring?Product and UX - are the roles blurring?
Product and UX - are the roles blurring?
 
Top 10 utilities interview questions with answers
Top 10 utilities interview questions with answersTop 10 utilities interview questions with answers
Top 10 utilities interview questions with answers
 
Defining product marketing
Defining product marketingDefining product marketing
Defining product marketing
 
Strategic Role - Product Management
Strategic Role - Product ManagementStrategic Role - Product Management
Strategic Role - Product Management
 

Similar to Alexandra Institute Cloud Computing Security Challenges

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial servicesMoshe Ferber
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Eyal Estrin
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in CloudLenin Aboagye
 

Similar to Alexandra Institute Cloud Computing Security Challenges (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 

More from Alexandra Instituttet

Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Alexandra Instituttet
 
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"Alexandra Instituttet
 
2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"Alexandra Instituttet
 
2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"Alexandra Instituttet
 
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"Alexandra Instituttet
 
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"Alexandra Instituttet
 
Midt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktMidt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktAlexandra Instituttet
 
Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Alexandra Instituttet
 
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet
 
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenKontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenAlexandra Instituttet
 
Find nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGFind nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGAlexandra Instituttet
 
Sund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterSund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterAlexandra Instituttet
 

More from Alexandra Instituttet (16)

Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
Innovation & it i turisterhvervet "Præsentation Alexandra Instituttet"
 
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
2010 Sorø "Kontekst-sensitiv teknologi – GPS er kun begyndelsen"
 
2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"2010 Sorø "Velkommen i evv’s univers"
2010 Sorø "Velkommen i evv’s univers"
 
2010 Sorø "Ekko af byen"
2010 Sorø "Ekko af byen"2010 Sorø "Ekko af byen"
2010 Sorø "Ekko af byen"
 
2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"2010 Sorø "Fra spæd idé til Discovery Channel"
2010 Sorø "Fra spæd idé til Discovery Channel"
 
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
2010 Sorø "Erhvervsudvikling og Alexandra Instituttet i Region Sjælland"
 
2010 Sorø "Åbning i Sorø"
2010 Sorø "Åbning i Sorø"2010 Sorø "Åbning i Sorø"
2010 Sorø "Åbning i Sorø"
 
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
2010 Sorø "Innovative alliancer flytter grænser – skal din virksomhed være med?"
 
Midt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunktMidt- og vestjysk it-satsning – oplæg til vendepunkt
Midt- og vestjysk it-satsning – oplæg til vendepunkt
 
Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling Perspektiverne i den lokale erhvervsudvikling
Perspektiverne i den lokale erhvervsudvikling
 
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekterAlexandra Instituttet som samarbejdspartner i udviklingsprojekter
Alexandra Instituttet som samarbejdspartner i udviklingsprojekter
 
Massive Data
Massive DataMassive Data
Massive Data
 
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsenKontekst-sensitiv teknologi – GPS er kun begyndelsen
Kontekst-sensitiv teknologi – GPS er kun begyndelsen
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Find nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTINGFind nye forretningsmuligheder med IT-I-ALTING
Find nye forretningsmuligheder med IT-I-ALTING
 
Sund Innovation i Randers Sundhedscenter
Sund Innovation i Randers SundhedscenterSund Innovation i Randers Sundhedscenter
Sund Innovation i Randers Sundhedscenter
 

Recently uploaded

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Alexandra Institute Cloud Computing Security Challenges

Editor's Notes

  1. Generally, SaaS provides the most integrated functionality built directly into the offering, with the least consumer extensibility, and a relatively high level of integrated security (at least the provider bears a responsibility for security).PaaS is intended to enable developers to build their own applications on top of the platform. As a result it tends to be more extensible than SaaS, at the expense of customerready features. This tradeoff extends to security features and capabilities, where the built-in capabilities are less complete, but there is more flexibility to layer on additional security.IaaS provides few if any application-like features, but enormous extensibility. This generally means less integrated security capabilities and functionality beyond protecting the infrastructure itself. This model requires that operating systems, applications, and content be managed and secured by the cloud consumer.