SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Pravin Kothari
          Founder & CEO

Co-founder ArcSight (acquired by HP)
     Founder, Agiliance (IT-GRC)
  Co-founder Impresse.com (B2B)




        October 2011
Cloud Adoption & Innovation
Expanding from Mid-market to Enterprise




    Public Cloud
  Services $176B in
   2015 (Gartner)
 26% Growth in 2010




                                          2
Cloud Computing – What’s the risk..
 Escalating Security Breaches




Dropbox confirms security glitch—
                                                  RSA Breach
                                                  RSA had a huge breach this week. Attackers stole
no password required                              information for 40 million two-factor authentication
Web-based storage firm Dropbox confirmed this     accounts. And the ones affected most may be
afternoon that a security breach allowed any      countless enterprise and cloud-based services
password to be used to access any user account.   in the public and private sector




Twitter breach revives cloud security fears
The breach of a hosted Google Apps application
used by Twitter employees has heightened
concerns over the security of cloud computing
Cloud Computing in Enterprise
Tug of War Between Business Users & Security
   Business Execs Desire       Security/Compliance Execs
    More Cloud Services          Have Cloud Concerns

                                       Lack of Control
       Agility & Flexibility
                                         & Visibility

                                        Data Privacy,
          Reduce cost
                                       Data Residency

     Minimal Administration        Regulatory Compliance

      Best-of-breed apps,          Emerging Cloud Threats
     Mobility & Social Media




                                                            4
Survey
 Public cloud services in your enterprise?
    1.   In use enterprise wide
    2.   In use in a few projects / departments
    3.   Expected in 6mos
    4.   Sometime in future

 Private or Public cloud in your enterprise?
    1. Private
    2. Hybrid
    3. Public

 Cloud services in your enterprise?
    1.   Email and office collaboration e.g. Google Apps, Microsoft
    2.   Storage & backup Box.net, Dropbox
    3.   SaaS e.g. Salesforce.com
    4.   IaaS e.g. Amazon
    5.   PaaS e.g. Force.com, Amazon S3/SimpleDB…, Google App Engine




                                                             CipherCloud Confidential   5
CipherCloud Encryption Gateway
Encrypt Sensitive Data On-the-fly Before it Leaves Your Network




                                                        Unified Policies
                                                       Across All Clouds




                                              In-line Gateway
                                              Encryption & Tokenization
                                              Format-&-Function preserved
                                              Customer retains Keys
                                              No impact on usability


                                                       CipherCloud Confidential   6
LIVE PRODUCT DEMO
Sample Customer Use Cases
    Organization                             Pain-points Addressed                                  Drivers
New Democratic Party of
Canada
                                   24M Canadian voters identities going to the US cloud                    R
Multi-national Investment   Highly sensitive M&A information going to cloud – most concerned
Bank                                       about insider threat at cloud provider                     P, S
Insurance Company           Requires all customer PHI data to be stored encrypted in the cloud        P, C
                            Customers uploaded tax & income documents need to be scanned
Mortgage Bank
                                             for malware and encrypted                                P, S
Health Insurance - Public     Physicians needed a new effective collaborative tool, to improve
Sector                      communications while also reducing data breaches (HIPAA, FISMA)           P, C
F100 Technology                  PCI required encryption of credit card and other PII data                 C
Personal care product
Manufacturer, Germany
                              Their retailer-resellers required compliance over uploaded data         R, C




                       R: Data Residency         P: Data Privacy         C: Compliance           S: Security


                                                                                CipherCloud Confidential       8
Open & Extensible Platform to build Ecosystem
Rapid Development of 3rd-Party Cloud/App Plug-ins




                                             Private
                                             Cloud


            Ownership




                        Out-of-the-box       Open
    CipherCloud
                            Cloud           Plug-in
      Gateway
                         Integration      Framework




                                            CipherCloud Confidential   9
CipherCloud Technology Summary
Patent-pending Technology
 Comprehensive data protection for all clouds
     Encryption, Tokenization, Key ownership
     Malware Detection & Cloud-Audit (Q4’11)
 Wire speed, Zero latency
 Strong security, 3rd-party tested
 Mobile support
 Fast deployment




              “We are impressed by CipherCloud's robust technology, security
              and performance.” - Canadian New Democratic Party
                                                           CipherCloud Confidential   10
Customer Benefits
Comprehensive Cloud Data Protection
 Protect against emerging cloud threats
 Eliminate data privacy and security concerns
 Satisfy compliance and data-residency requirements
 Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)
    Data Breach cost estimated at $214 per customer record*
        e.g. Over $2M for 10K records

 Accelerate cloud adoption
    Significant cost savings migrating on-premise apps to cloud




                                                        *The Ponemon Institute

                 “Without CipherCloud, we won’t be able to use cloud.”
                     Customer interview in SearchCloudSecurity.com               11
Proven Management Team
Pravin Kothari, CISSP, CISA                      Varun Badhwar, CISSP, CISA
Founder & CEO                                    VP Product Marketing & Alliances
Co-founder ArcSight (IPO, $1.6B exit)            Global ISV Security Salesforce.com
Founder, Agiliance (IT-GRC Leader)               Risk Advisory KPMG
Co-founder Impresse.com (B2B)

Chakra Yadavalli, CISA                           Michael Kochanik
VP Engineering, Chief Architect                  VP Worldwide Sales
Head of IDC Agiliance (IT-GRC)                   VP Sales & GM CollabNet
Chief Architect, Phulaxis (ERP SoD)              Director Geodesic Systems; IKOS Systems


              Sun-Microsoft - Dev Ghoshal        Fifth Third Bank ex-CISO Bob West
 Expert
              KPMG Partner- Shahed Latif         Kaiser Director Risk –Ramy Houssaini
Advisory
              AIG CISO– Paul de Graaff           Qualys Founder – Gilles Samoun
 Board
              Prudential ex-CISO- Ken Tymisnki   Marriott ex-VP, Info Protection -Chris Zoladz


Investors


                                                                                                 12
Honors and Awards
 Gartner Cool Vendor in Cloud Security Services 2011
 Most Innovative Company Finalist, RSA Conference 2011
 Best in Security , Under The Radar 2011 Judge & Audience Choice Winner
 Best in Software & Cloud , TiEcon 2011 Innovation Expo Winner
 2011 SINET 16 Innovators (Oct 25, 2011, DC)
 Best Startup in America West, Global Security Challenge (Oct 27, 2011 London)




                                                                              13

Weitere ähnliche Inhalte

Was ist angesagt?

CloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsCloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsChris Purrington
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualVMware Tanzu
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Vince Santo
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...Amazon Web Services
 
Avner algom feb 7 2012
Avner algom feb 7 2012Avner algom feb 7 2012
Avner algom feb 7 2012Avner Algom
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Lokesh Agarwal
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for SlackSachin Yadav
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009mattdriscoll
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the CloudHorst Walther
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarBosnia Agile
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackRon Batra
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]KVH Co. Ltd.
 

Was ist angesagt? (20)

CloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William FellowsCloudCamp London 3 - 451 Group - William Fellows
CloudCamp London 3 - 451 Group - William Fellows
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010Cloud Seminar Feb 4 2010
Cloud Seminar Feb 4 2010
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
Avner algom feb 7 2012
Avner algom feb 7 2012Avner algom feb 7 2012
Avner algom feb 7 2012
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021
 
Virtual Instruments Presentation
Virtual Instruments PresentationVirtual Instruments Presentation
Virtual Instruments Presentation
 
Cloud Security (CASB) for Slack
Cloud Security (CASB) for SlackCloud Security (CASB) for Slack
Cloud Security (CASB) for Slack
 
Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009Arc Sight Info Documents 7 2009
Arc Sight Info Documents 7 2009
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Identity Management for the Cloud
Identity Management for the CloudIdentity Management for the Cloud
Identity Management for the Cloud
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana Seliškar
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications Track
 
Are you ready for the private cloud? [WHITEPAPER]
Are you ready for the  private cloud? [WHITEPAPER]Are you ready for the  private cloud? [WHITEPAPER]
Are you ready for the private cloud? [WHITEPAPER]
 

Ähnlich wie Cloud Adoption & Innovation Survey Results

Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Charting a path to the cloud final
Charting a path to the cloud finalCharting a path to the cloud final
Charting a path to the cloud finalScott Clinton
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comDeepu S Nath
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in ThailandIMC Institute
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Mark Silverberg
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesDinis Cruz
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing presentJames Sutter
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxcVidya Networks
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 

Ähnlich wie Cloud Adoption & Innovation Survey Results (20)

Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
Charting a path to the cloud final
Charting a path to the cloud finalCharting a path to the cloud final
Charting a path to the cloud final
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Basics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.comBasics of cloud computing & salesforce.com
Basics of cloud computing & salesforce.com
 
Cloud Computing Direction in Thailand
Cloud Computing  Direction in ThailandCloud Computing  Direction in Thailand
Cloud Computing Direction in Thailand
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted FilesGlasswall - Safety and Integrity Through Trusted Files
Glasswall - Safety and Integrity Through Trusted Files
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Cloud Adoption & Innovation Survey Results

  • 1. Pravin Kothari Founder & CEO Co-founder ArcSight (acquired by HP) Founder, Agiliance (IT-GRC) Co-founder Impresse.com (B2B) October 2011
  • 2. Cloud Adoption & Innovation Expanding from Mid-market to Enterprise Public Cloud Services $176B in 2015 (Gartner) 26% Growth in 2010 2
  • 3. Cloud Computing – What’s the risk.. Escalating Security Breaches Dropbox confirms security glitch— RSA Breach RSA had a huge breach this week. Attackers stole no password required information for 40 million two-factor authentication Web-based storage firm Dropbox confirmed this accounts. And the ones affected most may be afternoon that a security breach allowed any countless enterprise and cloud-based services password to be used to access any user account. in the public and private sector Twitter breach revives cloud security fears The breach of a hosted Google Apps application used by Twitter employees has heightened concerns over the security of cloud computing
  • 4. Cloud Computing in Enterprise Tug of War Between Business Users & Security Business Execs Desire Security/Compliance Execs More Cloud Services Have Cloud Concerns Lack of Control Agility & Flexibility & Visibility Data Privacy, Reduce cost Data Residency Minimal Administration Regulatory Compliance Best-of-breed apps, Emerging Cloud Threats Mobility & Social Media 4
  • 5. Survey  Public cloud services in your enterprise? 1. In use enterprise wide 2. In use in a few projects / departments 3. Expected in 6mos 4. Sometime in future  Private or Public cloud in your enterprise? 1. Private 2. Hybrid 3. Public  Cloud services in your enterprise? 1. Email and office collaboration e.g. Google Apps, Microsoft 2. Storage & backup Box.net, Dropbox 3. SaaS e.g. Salesforce.com 4. IaaS e.g. Amazon 5. PaaS e.g. Force.com, Amazon S3/SimpleDB…, Google App Engine CipherCloud Confidential 5
  • 6. CipherCloud Encryption Gateway Encrypt Sensitive Data On-the-fly Before it Leaves Your Network Unified Policies Across All Clouds  In-line Gateway  Encryption & Tokenization  Format-&-Function preserved  Customer retains Keys  No impact on usability CipherCloud Confidential 6
  • 8. Sample Customer Use Cases Organization Pain-points Addressed Drivers New Democratic Party of Canada 24M Canadian voters identities going to the US cloud R Multi-national Investment Highly sensitive M&A information going to cloud – most concerned Bank about insider threat at cloud provider P, S Insurance Company Requires all customer PHI data to be stored encrypted in the cloud P, C Customers uploaded tax & income documents need to be scanned Mortgage Bank for malware and encrypted P, S Health Insurance - Public Physicians needed a new effective collaborative tool, to improve Sector communications while also reducing data breaches (HIPAA, FISMA) P, C F100 Technology PCI required encryption of credit card and other PII data C Personal care product Manufacturer, Germany Their retailer-resellers required compliance over uploaded data R, C R: Data Residency P: Data Privacy C: Compliance S: Security CipherCloud Confidential 8
  • 9. Open & Extensible Platform to build Ecosystem Rapid Development of 3rd-Party Cloud/App Plug-ins Private Cloud Ownership Out-of-the-box Open CipherCloud Cloud Plug-in Gateway Integration Framework CipherCloud Confidential 9
  • 10. CipherCloud Technology Summary Patent-pending Technology  Comprehensive data protection for all clouds  Encryption, Tokenization, Key ownership  Malware Detection & Cloud-Audit (Q4’11)  Wire speed, Zero latency  Strong security, 3rd-party tested  Mobile support  Fast deployment “We are impressed by CipherCloud's robust technology, security and performance.” - Canadian New Democratic Party CipherCloud Confidential 10
  • 11. Customer Benefits Comprehensive Cloud Data Protection  Protect against emerging cloud threats  Eliminate data privacy and security concerns  Satisfy compliance and data-residency requirements  Avoid risk of privacy breaches (e.g. Sony, Epsilon, RSA)  Data Breach cost estimated at $214 per customer record*  e.g. Over $2M for 10K records  Accelerate cloud adoption  Significant cost savings migrating on-premise apps to cloud *The Ponemon Institute “Without CipherCloud, we won’t be able to use cloud.” Customer interview in SearchCloudSecurity.com 11
  • 12. Proven Management Team Pravin Kothari, CISSP, CISA Varun Badhwar, CISSP, CISA Founder & CEO VP Product Marketing & Alliances Co-founder ArcSight (IPO, $1.6B exit) Global ISV Security Salesforce.com Founder, Agiliance (IT-GRC Leader) Risk Advisory KPMG Co-founder Impresse.com (B2B) Chakra Yadavalli, CISA Michael Kochanik VP Engineering, Chief Architect VP Worldwide Sales Head of IDC Agiliance (IT-GRC) VP Sales & GM CollabNet Chief Architect, Phulaxis (ERP SoD) Director Geodesic Systems; IKOS Systems Sun-Microsoft - Dev Ghoshal Fifth Third Bank ex-CISO Bob West Expert KPMG Partner- Shahed Latif Kaiser Director Risk –Ramy Houssaini Advisory AIG CISO– Paul de Graaff Qualys Founder – Gilles Samoun Board Prudential ex-CISO- Ken Tymisnki Marriott ex-VP, Info Protection -Chris Zoladz Investors 12
  • 13. Honors and Awards  Gartner Cool Vendor in Cloud Security Services 2011  Most Innovative Company Finalist, RSA Conference 2011  Best in Security , Under The Radar 2011 Judge & Audience Choice Winner  Best in Software & Cloud , TiEcon 2011 Innovation Expo Winner  2011 SINET 16 Innovators (Oct 25, 2011, DC)  Best Startup in America West, Global Security Challenge (Oct 27, 2011 London) 13