SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Manju Srinivas
/@manjusrinivas
What are we discussing today?
◊ Introduction to Cloud Computing
◊ Security and Compliance
◊ Evaluating Cloud computing
◊ Business Cases
◊ Amazon Web Service (AWS) Lab
Introduction to
Cloud Computing
What’s this Cloud computing?
“Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of
configurable computing resources (networks, servers, storage,
applications, services…) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction.”
- NIST Special Publication
Private Cloud
Public /
External
On-Premises / Internal Off-Premises / External
Hybrid
Community
Deployment Models
Service Models & Cloud Vendors
Software as a Service
(SaaS)
Infrastructure as a
Service (IaaS)
Platform as a Service
(PaaS)
Why are customers adopting cloud computing?
 Variable expense Replace capital expenditure with variable expense
 Economies of scale Lower variable expense than companies can achieve
themselves
 Elastic capacity No need to guess capacity requirements and over-
provision
 Speed and agility Infrastructure in minutes, not weeks and months!
 Focus on business Not undifferentiated heavy IT lifting
 Global Reach Go global in minutes and reach global audience
Benefits & Limitations
* Cost (pay per use, reduced hosting cost…)
* Automated (updates, backups…)
* Flexibility (On demand, scalable…)
* Multi tenant (shared resources, green comp)
* Mobility (Access from any Web device)
* Security
* Location of data
* Compliance and Privacy (regulations…)
* Internet Dependency / Speed
* Service Levels
* Migration / Vendor Lock-in
Security & Compliance
Cloud Architecture Example
What should be secured in Cloud?
• All the components in
the Cloud – Network,
Storage, Database,
Operating System,
virtualization, load
balancing –
everything should be
secured.
• Cloud computing
security is no
different than regular
security.
Security Risks and Mitigations
Risk
• Data loss / leakage
• Shared technology /
vulnerabilities
• Insecure application
interfaces
• Malicious insiders
• Unknown risk profile /
accounts
• Account, service and
traffic hijacking
Mitigation
• Strong Authentication,
auditing etc.
• Operations procedure,
security practices etc.
• Secured design
(Firewalls…)
• Staff vetting
• Validation of
credentials, active
monitoring of traffic
Compliance
• Numerous regulations pertain to storage and use of
data - PCI DSS, HIPAA and Sarbanes–Oxley (SOX) Act
• Business continuity and data recovery
• Logs and audit trails
• Data or Datacenter location jurisdiction
• Legal and contractual issues
Evaluating
Cloud Computing (Service) Provider
Evaluating Cloud Computing Implementation
Cost
Benefits
Business
SLA
Business Cases
Service
Supplier
Evaluation
Things to check/ask before implementing
• How good is the security of Cloud DC?
• How much will I save? (CapEx, Software licensing…)
• Time to build new system
• Maintenance strategies (outages, patches…)
• Latency comparison between Cloud and own DC
• Comparative study of various cloud providers
• Demand for trial period
• Compliance (ISO standards etc.)
• Service Levels (Uptime, time to resolution…)
Cloud Provider – Tenant Responsibility Matrix
SaaS PaaS IaaS Data Center
Data Provider Tenant Tenant Tenant
Application Provider Tenant Tenant Tenant
OS Provider Provider Tenant Tenant
Virtualization Provider Provider Provider Tenant / NA
Network Provider Provider Provider Tenant
Physical Provider Provider Provider Tenant
Business Case Studies
Business Case #1 on Elasticity – Amazon.com
Contd…
Contd…
Contd…
Contd…
Provisioned capacity Real capacity
Time for AWS Hands-on
Cloud Computing Overview

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (18)

IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Health Data Management - Clear Data - 5 reasons hospital CIOs are extending t...
Health Data Management - Clear Data - 5 reasons hospital CIOs are extending t...Health Data Management - Clear Data - 5 reasons hospital CIOs are extending t...
Health Data Management - Clear Data - 5 reasons hospital CIOs are extending t...
 
Saas & DBaas
Saas & DBaasSaas & DBaas
Saas & DBaas
 
Infrastructure as a Service
Infrastructure as a ServiceInfrastructure as a Service
Infrastructure as a Service
 
Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)Introduction to Infrastructure as a Service (IaaS)
Introduction to Infrastructure as a Service (IaaS)
 
Info sheet-Cloud
Info sheet-CloudInfo sheet-Cloud
Info sheet-Cloud
 
Core Concept: Software Defined Everything
Core Concept: Software Defined EverythingCore Concept: Software Defined Everything
Core Concept: Software Defined Everything
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Webinar: Cut Disaster Recovery Expenses – Improve Recovery Times
Webinar: Cut Disaster Recovery Expenses – Improve Recovery TimesWebinar: Cut Disaster Recovery Expenses – Improve Recovery Times
Webinar: Cut Disaster Recovery Expenses – Improve Recovery Times
 
Dave's Cloud
Dave's CloudDave's Cloud
Dave's Cloud
 
Managed Services Cloud Computing
Managed Services Cloud Computing Managed Services Cloud Computing
Managed Services Cloud Computing
 
An overview of cloud storage providers
An overview of cloud storage providersAn overview of cloud storage providers
An overview of cloud storage providers
 
Cloud computing concept & design
Cloud computing concept & designCloud computing concept & design
Cloud computing concept & design
 
2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack2nd Anniversary Datacomm Cloud Business- Azure Stack
2nd Anniversary Datacomm Cloud Business- Azure Stack
 
Virtualize
VirtualizeVirtualize
Virtualize
 
IT Resilience Use Case
IT Resilience Use CaseIT Resilience Use Case
IT Resilience Use Case
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 

Ähnlich wie Cloud Computing Overview

Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
EuroCloud
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
Agora Group
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Phil Copperwheat
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
Amazon Web Services
 

Ähnlich wie Cloud Computing Overview (20)

Financial impact of Cloud Computing
Financial impact of Cloud ComputingFinancial impact of Cloud Computing
Financial impact of Cloud Computing
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Logicalis Cloud Briefing
Logicalis Cloud BriefingLogicalis Cloud Briefing
Logicalis Cloud Briefing
 
Architecting SaaS
Architecting SaaSArchitecting SaaS
Architecting SaaS
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Evaluating the Cloud
Evaluating the CloudEvaluating the Cloud
Evaluating the Cloud
 
What is cloud
What is cloudWhat is cloud
What is cloud
 
Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012Radu crahmaliuc 23feb2012
Radu crahmaliuc 23feb2012
 
Cloud strategy briefing 101
Cloud strategy briefing 101 Cloud strategy briefing 101
Cloud strategy briefing 101
 
cloud services and providers
cloud services and providerscloud services and providers
cloud services and providers
 
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
Plenary_three_Cloud_computing_-_is_social_housing_ready_for_it_-_Phil_Copperw...
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]Security & Compliance in the Cloud [2019]
Security & Compliance in the Cloud [2019]
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
 
SaaS & DBaas
SaaS & DBaasSaaS & DBaas
SaaS & DBaas
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Cloud Computing Overview

  • 2. What are we discussing today? ◊ Introduction to Cloud Computing ◊ Security and Compliance ◊ Evaluating Cloud computing ◊ Business Cases ◊ Amazon Web Service (AWS) Lab
  • 4. What’s this Cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (networks, servers, storage, applications, services…) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” - NIST Special Publication
  • 5.
  • 6. Private Cloud Public / External On-Premises / Internal Off-Premises / External Hybrid Community Deployment Models
  • 7. Service Models & Cloud Vendors Software as a Service (SaaS) Infrastructure as a Service (IaaS) Platform as a Service (PaaS)
  • 8. Why are customers adopting cloud computing?  Variable expense Replace capital expenditure with variable expense  Economies of scale Lower variable expense than companies can achieve themselves  Elastic capacity No need to guess capacity requirements and over- provision  Speed and agility Infrastructure in minutes, not weeks and months!  Focus on business Not undifferentiated heavy IT lifting  Global Reach Go global in minutes and reach global audience
  • 9. Benefits & Limitations * Cost (pay per use, reduced hosting cost…) * Automated (updates, backups…) * Flexibility (On demand, scalable…) * Multi tenant (shared resources, green comp) * Mobility (Access from any Web device) * Security * Location of data * Compliance and Privacy (regulations…) * Internet Dependency / Speed * Service Levels * Migration / Vendor Lock-in
  • 12. What should be secured in Cloud? • All the components in the Cloud – Network, Storage, Database, Operating System, virtualization, load balancing – everything should be secured. • Cloud computing security is no different than regular security.
  • 13. Security Risks and Mitigations Risk • Data loss / leakage • Shared technology / vulnerabilities • Insecure application interfaces • Malicious insiders • Unknown risk profile / accounts • Account, service and traffic hijacking Mitigation • Strong Authentication, auditing etc. • Operations procedure, security practices etc. • Secured design (Firewalls…) • Staff vetting • Validation of credentials, active monitoring of traffic
  • 14. Compliance • Numerous regulations pertain to storage and use of data - PCI DSS, HIPAA and Sarbanes–Oxley (SOX) Act • Business continuity and data recovery • Logs and audit trails • Data or Datacenter location jurisdiction • Legal and contractual issues
  • 16. Evaluating Cloud Computing Implementation Cost Benefits Business SLA Business Cases Service Supplier Evaluation
  • 17. Things to check/ask before implementing • How good is the security of Cloud DC? • How much will I save? (CapEx, Software licensing…) • Time to build new system • Maintenance strategies (outages, patches…) • Latency comparison between Cloud and own DC • Comparative study of various cloud providers • Demand for trial period • Compliance (ISO standards etc.) • Service Levels (Uptime, time to resolution…)
  • 18. Cloud Provider – Tenant Responsibility Matrix SaaS PaaS IaaS Data Center Data Provider Tenant Tenant Tenant Application Provider Tenant Tenant Tenant OS Provider Provider Tenant Tenant Virtualization Provider Provider Provider Tenant / NA Network Provider Provider Provider Tenant Physical Provider Provider Provider Tenant
  • 20. Business Case #1 on Elasticity – Amazon.com
  • 25. Time for AWS Hands-on

Hinweis der Redaktion

  1. Broad network access: Cloud Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms such as mobile phones, laptops and PDAs.Measured service: Cloud computing resource usage can be measured, controlled, and reported providing transparency for both the provider and consumer of the utilised service. Cloud computing services use a metering capability which enables to control and optimise resource use. This implies that just like air time, electricity or municipality water IT services are charged per usage metrics – pay per use. The more you utilise the higher the bill. Just as utility companies sell power to subscribers, and telephone companies sell voice and data services, IT services such as network security management, data center hosting or even departmental billing can now be easily delivered as a contractual service.On demand self services: computer services such as email, applications, network or server service can be provided without requiring human interaction with each service provider. Cloud service providers providing on demand self services include Amazon Web Services (AWS), Microsoft, Google, IBM and Salesforce.com. New York Times and NASDAQ are examples of companies using AWS (NIST). Gartner describes this characteristic as service based Rapid elasticity: Cloud services can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any timeResource pooling: The provider’s computing resources are pooled together to serve multiple consumers using multiple-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. The resources include among others storage, processing, memory, network bandwidth, virtual machines and email services. The pooling together of the resource builds economies of scale (Gartner).
  2. Salesforce.com has become the poster child of software as a service Customer Relationship Management (CRM) software solutions. Now the technology pioneer continues a push into the platform as a service (PaaS) market with its Force.com application platform.NetSuite delivers software as a service (SaaS) enterprise-wide business applications, including full-featured financials and accounting, Customer Relationship Management (CRM), inventory, and e-commerce software—all in a fully integration application.Oracle's on demand CRM software allows customers flexibility in how to deploy tehir CRM software based on their specific needs and budget requirements. Hosted and Managed Applications and Software-as-a-Service (SaaS) deployment models are all available.Enterprise Resource Planning (ERP) giant SAP is assertively pushing into the software as a service CRM and ERP markets with its Business ByDesign solution. The on-demand ERP system is showing strong global adoption from both customers and partners.=====================Google has made a name for itself with its Google Apps suite of business and consumer cloud applications and its Google App Engine, the developer platform that lets users build and host Web apps in the cloud in an effortless fashion.Microsoft's cloud platform, Windows Azure, is a little more than a year old and is still gathering momentum. Azure has blossomed into more than just a development play—it's a full-fledged cloud services operating system that also offers service hosting and service management.Flexiant's public cloud platform, FlexiScale, has made the company one of Europe's premier cloud players and an up-and-comer in the U.S. The platform is aimed at SMEs and startups looking to offer streaming video, social networking, IPTV, VoIP or SaaS.GridGain's open-source cloud application platform helps developers build scalable applications that can work natively on managed infrastructure, from a Google Android device to large grids and clouds. The software supports major OSes and provides native support for Java and Scala.=================Amazon Web Services has become the one to beat in the cloud game, and Amazon EC2, its compute capacity play, set the standard for spinning up and taking down cloud capacity quickly and affordably with a pay-as-you-go model.GoGrid prides itself on being the biggest pure-play Infrastructure-as- a-Service company in the world. Its infrastructure lets businesses deploy and manage apps in the cloud platform within minutes and with a flexibility that separates it from the Johnny-comelatelies.While formally known as Rackspace Hosting, Rackspace Cloud is taking over. And with Rackspace's Cloud Servers infrastructure play, the top cloud dog of Texas is rivaling the major players with its select-asize, customizable IaaS backed by Rackspace's own "fanatical support."Late last year, Savvis launched Savvis Symphony, its suite of enterprise-focused cloud solutions to let businesses break free from IT infrastructure. Savvis says its cloud infrastructure can reduce capital expense, improve service levels and keep enterprises at the forefront of cloud innovation.
  3. Payment Card Industry Data Security Standard - PCI DSSHealth Insurance Portability and accountability Act - HIPAA