SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Security As A Service In Cloud(SECaaS)

               Presented By
               Vivek Mehta
            Bismillah Rawthar
Various Cloud Services
 1. Software As A Service(SaaS)
    •   provider licenses an application to customers either as a
        service on demand, through a subscription, in a “pay-as-
        you-go” model, or (increasingly) at no charge.
    •   Characteristic Of SaaS
          Web access to commercial software.
          Software is managed from a central location
          Software delivered in a “one to many” model.
          Users not required to handle software upgrades and
           patches.
Various Cloud Services
 2. Platform As A Service(PaaS)
    • a computing platform that allows the creation of web
      applications quickly and easily and without the complexity
      of buying and maintaining the software and infrastructure
      underneath it.
    • Characteristic Of PaaS
        Multi-Tenant Architecture.
        Services to develop, test, deploy, host and maintain
          applications in the same integrated development
          environment.
        All the varying services needed to fulfill the application
          development process.
Various Cloud Services
 3. Infrastructure As A Service(IaaS)
    • is a way of delivering Cloud Computing infrastructure –
      servers, storage, network and operating systems – as an on
      demand service.
    • Rather than purchasing servers, software, datacenter space
      or network equipment, clients instead buy those resources
      as a fully outsourced service on demand.
    • Characteristics Of IaaS
         Resources are distributed as a service.
         Generally includes multiple users on a single piece of
          hardware.
Various Cloud Services
 4. Storage As A Service(STaaS)
    •   is a business model in which a large service provider rents space in their
        storage infrastructure on a subscription basis.
 5. Security As A Service(SECaaS)
    •   is a business model in which a large service provider integrates their
        security services into a corporate infrastructure on a subscription basis.
    •   security services include authentication, anti-virus, anti-
        malware/spyware, intrusion detection, and security event management,
        among others.
    •   Cloud providers provide various services for protection i.e. to protect an
        individual computer or an organization’s network.
    •   The various application/product that they offer falls under the category
        of SECaaS.
Various Cloud Services
Top 10 Companies That Provide Cloud Services
  1. Amazon Web Services
  2. Rackspace
  3. CenturyLink/Savvis
  4. Salesforce.com
  5. Verizon/Terremark
  6. Joyent
  7. Citrix
  8. Bluelock
  9. Microsoft
  10. VMware
Why Cloud-Based Security Is Required?
 • the increase in use of cloud-based services, such as
   salesforce.com or Google Apps, means that many mobile IT
   users will be accessing business data and services without
   traversing the corporate network. This will increase the need for
   enterprises to place security controls between mobile users and
   cloud-based services.
 • the use of peer-to-peer in-the-cloud computing will also make
   enterprises more vulnerable to some security risks by reducing
   the cost of brute force attacks. Inexpensive cloud-based
   processing will make it easier and cheaper to break encryption
   keys or find vulnerabilities in software, and financially motivated
   criminals will certainly seek to take advantage of that.
Why Cloud-Based Security Is Required?
 • Most threats never hit the on-premises network.
 • Reduced total cost of ownership.
 • Easier support for mobile and remote users.
 • Rapid deployment of services.
 • Extending the life of on-premises solutions.
SECaaS Are Provided For The Following Area
 1.   Identity and Access Management.
 2.   Data Loss Prevention.
 3.   Web Security.
 4.   Security Assessment.
 5.   Intrusion management.
 6.   Encryption.
 7.   Network Security.
 8.   Business Continuity And Disaster Recovery.
 9.   Security information And Event Management.
Various Services/Products
 1. Altor VF By Altor Networks
    •   Altor Virtual Firewall is a software security appliance that runs in a
        virtualized environment and enforces security policy on a per virtual
        machine basis. Data center administrators can now pinpoint a broad
        range of virtual network security compromises and easily create
        roles-based security policies. Security policies can be continuously
        enforced on individual virtual machines, even as they move
        throughout the virtualized data center.
 2. AppGate Security Server - By Cryptzone Group AB
    •   The AppGate is a secure access system that protects servers (virtual,
        physical or virtualized) with an inbuilt application layer firewall. It
        includes encryption of all communication between workstations,
        mobile phones and the AppGate Server. The granular and role based
        access makes it possible for system administrators to give specific
        access.
Various Services/Products
 3. BIObeans - By TouchTier Technology Pte Ltd
    • BIObeans is a scalable Biometric-Secured Identification &
      Authentication Solution, built upon service-oriented architecture (SOA)
      using onboard biometric finger print sensors and commercially available
      off-the-shelf hardware. BIObeans provides an advantage when it goes
      for hundreds of thousands of users deployment with control to one
      identity per person.
 4. CipherCloud - By CipherCoud, Inc
    • CipherCloud provides a solution to address data privacy, sovereignty,
      security and regulatory challenges with cloud adoption. It leverages
      strong encryption to protect sensitive data in real-time before it's sent
      to the cloud. It does not require any change to cloud applications, and
      doesn’t impact functionality, performance, or user experience.
Various Services/Products
 5. DefensePro - By Radware, Ltd
    • Radware's DefensePro is a real-time Intrusion Prevention System (IPS)
      that maintains your business continuity by protecting your IP
      infrastructure against existing and emerging network-based threats that
      can't be detected by traditional IPS' such as application misuse threats,
      SSL attacks and VoIP service misuse.
 6. McAfee Total Protection - By McAfee, Inc
    • McAfee Total Protection service provides total desktop protection
      including anti-virus, anti-spyware, firewall and basic email virus
      protection in one, integrated package with automatic security updates
      and a single reporting and configuration console via the McAfee Web-
      based Security Center.
Thank You
 And Finally

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...Shashi soni
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingAmazon Web Services
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsSonia Nagpal
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud ComputingNephoScale
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Edureka!
 

Was ist angesagt? (20)

cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
cloude computing
cloude computingcloude computing
cloude computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Client Server Architecture ppt
Client Server Architecture pptClient Server Architecture ppt
Client Server Architecture ppt
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
 
Common Standards in Cloud Computing
Common Standards in Cloud ComputingCommon Standards in Cloud Computing
Common Standards in Cloud Computing
 

Andere mochten auch

Security Service Management
Security Service ManagementSecurity Service Management
Security Service ManagementSakti Sumarna
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...Amazon Web Services
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a ServiceUS-Ignite
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service BriefNishongo Gangchil
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedmounika k
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceGeorge Fares
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A ServiceMichael Davis
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Javier Losa
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOCSolar Security
 

Andere mochten auch (14)

Security Service Management
Security Service ManagementSecurity Service Management
Security Service Management
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service Brief
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
 

Ähnlich wie Security As A Service In Cloud(SECaaS)

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud ComputingStuart Braud
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideHTS Hosting
 
[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it departmentAgusto Sipahutar
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud StackRapidScale
 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforeSysfore Technologies
 
CIT-382 Cloud Technology
CIT-382 Cloud TechnologyCIT-382 Cloud Technology
CIT-382 Cloud TechnologyLuisDeLeon74
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfpreetajain
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology Mekhi Da ‘Quay Daniels
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigmNazneen Sheikh
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 

Ähnlich wie Security As A Service In Cloud(SECaaS) (20)

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud Computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
 
[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CIT-382 Cloud Technology
CIT-382 Cloud TechnologyCIT-382 Cloud Technology
CIT-382 Cloud Technology
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 

Mehr von أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticأحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognitionأحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorأحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interactionأحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

Mehr von أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Security As A Service In Cloud(SECaaS)

  • 1. Security As A Service In Cloud(SECaaS) Presented By Vivek Mehta Bismillah Rawthar
  • 2. Various Cloud Services 1. Software As A Service(SaaS) • provider licenses an application to customers either as a service on demand, through a subscription, in a “pay-as- you-go” model, or (increasingly) at no charge. • Characteristic Of SaaS Web access to commercial software. Software is managed from a central location Software delivered in a “one to many” model. Users not required to handle software upgrades and patches.
  • 3. Various Cloud Services 2. Platform As A Service(PaaS) • a computing platform that allows the creation of web applications quickly and easily and without the complexity of buying and maintaining the software and infrastructure underneath it. • Characteristic Of PaaS Multi-Tenant Architecture. Services to develop, test, deploy, host and maintain applications in the same integrated development environment. All the varying services needed to fulfill the application development process.
  • 4. Various Cloud Services 3. Infrastructure As A Service(IaaS) • is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on demand service. • Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand. • Characteristics Of IaaS Resources are distributed as a service. Generally includes multiple users on a single piece of hardware.
  • 5. Various Cloud Services 4. Storage As A Service(STaaS) • is a business model in which a large service provider rents space in their storage infrastructure on a subscription basis. 5. Security As A Service(SECaaS) • is a business model in which a large service provider integrates their security services into a corporate infrastructure on a subscription basis. • security services include authentication, anti-virus, anti- malware/spyware, intrusion detection, and security event management, among others. • Cloud providers provide various services for protection i.e. to protect an individual computer or an organization’s network. • The various application/product that they offer falls under the category of SECaaS.
  • 7. Top 10 Companies That Provide Cloud Services 1. Amazon Web Services 2. Rackspace 3. CenturyLink/Savvis 4. Salesforce.com 5. Verizon/Terremark 6. Joyent 7. Citrix 8. Bluelock 9. Microsoft 10. VMware
  • 8. Why Cloud-Based Security Is Required? • the increase in use of cloud-based services, such as salesforce.com or Google Apps, means that many mobile IT users will be accessing business data and services without traversing the corporate network. This will increase the need for enterprises to place security controls between mobile users and cloud-based services. • the use of peer-to-peer in-the-cloud computing will also make enterprises more vulnerable to some security risks by reducing the cost of brute force attacks. Inexpensive cloud-based processing will make it easier and cheaper to break encryption keys or find vulnerabilities in software, and financially motivated criminals will certainly seek to take advantage of that.
  • 9. Why Cloud-Based Security Is Required? • Most threats never hit the on-premises network. • Reduced total cost of ownership. • Easier support for mobile and remote users. • Rapid deployment of services. • Extending the life of on-premises solutions.
  • 10. SECaaS Are Provided For The Following Area 1. Identity and Access Management. 2. Data Loss Prevention. 3. Web Security. 4. Security Assessment. 5. Intrusion management. 6. Encryption. 7. Network Security. 8. Business Continuity And Disaster Recovery. 9. Security information And Event Management.
  • 11. Various Services/Products 1. Altor VF By Altor Networks • Altor Virtual Firewall is a software security appliance that runs in a virtualized environment and enforces security policy on a per virtual machine basis. Data center administrators can now pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. 2. AppGate Security Server - By Cryptzone Group AB • The AppGate is a secure access system that protects servers (virtual, physical or virtualized) with an inbuilt application layer firewall. It includes encryption of all communication between workstations, mobile phones and the AppGate Server. The granular and role based access makes it possible for system administrators to give specific access.
  • 12. Various Services/Products 3. BIObeans - By TouchTier Technology Pte Ltd • BIObeans is a scalable Biometric-Secured Identification & Authentication Solution, built upon service-oriented architecture (SOA) using onboard biometric finger print sensors and commercially available off-the-shelf hardware. BIObeans provides an advantage when it goes for hundreds of thousands of users deployment with control to one identity per person. 4. CipherCloud - By CipherCoud, Inc • CipherCloud provides a solution to address data privacy, sovereignty, security and regulatory challenges with cloud adoption. It leverages strong encryption to protect sensitive data in real-time before it's sent to the cloud. It does not require any change to cloud applications, and doesn’t impact functionality, performance, or user experience.
  • 13. Various Services/Products 5. DefensePro - By Radware, Ltd • Radware's DefensePro is a real-time Intrusion Prevention System (IPS) that maintains your business continuity by protecting your IP infrastructure against existing and emerging network-based threats that can't be detected by traditional IPS' such as application misuse threats, SSL attacks and VoIP service misuse. 6. McAfee Total Protection - By McAfee, Inc • McAfee Total Protection service provides total desktop protection including anti-virus, anti-spyware, firewall and basic email virus protection in one, integrated package with automatic security updates and a single reporting and configuration console via the McAfee Web- based Security Center.
  • 14. Thank You And Finally