SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Securing Cloud Services John Rhoton Distinguished Technologist HP EDS CTO Office June 2009
[object Object],[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],[object Object],[object Object],Agenda
So, What is Cloud Computing? ,[object Object],[object Object],[object Object],[object Object],“ A large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of re-sources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized SLAs.” Vaquero, Rodero-Merino, Caceres, Lindner
Cloud Attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Private versus Public Cloud
Innovation & Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Massive Scale-out and the Cloud 17 Decmeber 2008 ,[object Object],Enterprise Class Global class On-premise Hybrid/off-premise 100s -1000s of nodes 10,000+  nodes Proprietary Commodity HW resiliency SW resiliency Max performance Max efficiency Silo’ed Resources Shared Resources Cost-Center Clusters Grids/Cloud Value/ Revenue-Center Static Elastic Shared storage Replicated storage Facility costs Power Usage Efficiency
Market context A service-centric perspective sheds light on all value chain constituents S S S External services In-house  services Cloud services Massive scale-out  infrastructure Global-class  software Enterprise-class software Dedicated and shared infrastructure Enterprise-class software Dedicated and shared  infrastructure ,[object Object],Business users Cloud service provider Hosted  / outsourced  service provider IT organization internal service provider Business  outcome
Cloud Model Integration Operation Governance Hardware Computation Storage Memory Colocation Real Estate Cooling Power Bandwidth Virtualisation Provisioning Billing Virtualisation Platform Programming Language Development Environment APIs Application CRM UC Email ....... .......
Cloud Landscape Governance Operation Integration Infrastructure Platform Software
Why Cloud Computing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Agenda
Security Benefits and Opportunities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
[object Object],[object Object],[object Object],[object Object],Agenda
Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Governance June 19, 2009
Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Data Privacy June 19, 2009
Resilience ,[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee User … … … The  Internet
Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud  Provider #1 Cloud  Provider #2 Internal Cloud CRM Service … Service 3 Backup Service  ILM Service Service Service Service Business Apps/Service Employee … … … The  Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities  and Services Can be  Outsourced in The Cloud  …
Lock-in ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Rogue Clouds ,[object Object],[object Object],[object Object],[object Object],June 19, 2009
Cloud Security Activity and Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
[object Object],[object Object],[object Object],[object Object],Agenda
An infrastructure utility underpins both dedicated and “as a service” applications Business outcomes Technology-enabled   services Internally hosted ,[object Object],Externally hosted Infrastructure as a service Business outcome Cloud  Infrastructure Utility Enterprise  Infrastructure Utility Enterprise-class applications  Global-class cloud services
HP delivers on the Business Technology Ecosystem A sampling of HP product and services Business outcomes Technology-enabled   services ,[object Object],Business outcome Externally hosted Infrastructure as a service Infrastructure Utility homogeneous, centralized design Infrastructure Utility   heterogeneous, distributed design Enterprise-class applications  Global-class cloud services  EDS Application Services Performance / Quality Center Security Center Service Manager Catalog Business Service Automation Insight Orchestration Business Service Management Proliant / Integrity ProCurve Storage Works Insight Dynamics - VSE Proliant BL2x220c StorageWorks ExDS9100 Portable Optimized Datacenter Snapfish, BookPrep, MagCloud Business Availability Center Quality and Security Centers Cloud Assure Concierge Services Project & Portfolio Management
HP delivers value across the business technology ecosystem Jun 19, 2009 We build it Leading data center design company We power it With leading servers, storage and networking We design it Expertise in application architecture & frameworks We automate it  With virtualization and management software We secure it  Through HP Secure Advantage program We support it  With tens of thousands of IT professionals We govern it  HP wrote the books on service management We measure it  HP can measure the fiscal impact of services  We deliver it Through purchased, financed, outsourced, cloud ,[object Object]
HP Secure Advantage: Making security a business enabler June 19, 2009 Business   Outcomes  People and process The secure end-to-end business advantage ,[object Object],Products   ––  Partners  ––   Solutions Protect resources Protect data Provide validation Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],HP provides low-cost/high-quality solution delivery combining expert knowledge and security products from the desktop to the data center using proven methodologies with global resources. Reduce Complexity Standardized • Integrated • Consulting • Managed • In/Outsourced • Pre-integrated solutions with major security players , & the HP Secure Advantage portfolio, along with the flexibility to leverage services globally to consult, deploy or manage these solutions, reduces complexity for our customers.  Reduce Risk HP uses its internal best practices, developed in HP Labs and HP Services to create and commercialize security solutions and services for customers across the world.
HP Secure Advantage services portfolio Enablement to Management services from Desktop to Datacenter. Endpoint  Security Network Security Data Center Security Security  Operations Business Continuity & Recovery Risk Management & Compliance Infrastructure  Security Governance, Risk & Compliance Mgmt Data Protection  & Privacy Mgmt Identity & Access  Management Identity &  Access Mgmt Data  Security Content  Security Application Security ,[object Object],Provide validation Protect data Governance, Risk & Compliance Management Infrastructure Security Identity & Access  Management Data Protection & Privacy Management Protect resources
HP Secure Advantage- Product Portfolio -1 ,[object Object],Categories Domains HP Secure Advantage Products Infrastructure Security Network Security HP ProCurve Network Access Control HP ProCurve Network Immunity Manager HP ProCurve ONE network security solutions Endpoint Security HP ProtectTools HP Business Service Automation - Client Automation Center HP Secure Document  Advantage Family  Data Center Security HP Insight Dynamics - VSE HP NetTop HP-UX 11i (CC EAL4+, HIDS) HP Linux (CC EAL4+) HP OpenVMS HP NonStop Safeguard HP Neoview Security Data Protection & Privacy Management Data Security HP Secure Key Manager HP Atalla Key Block, NSP HP ProtectTools Drive Encryption HP Storage Media Encryption Fabric Switch HP XP Disk Array Encryption  HP LTO-4 Tape Encryption HP Data Protector HP-UX EVFS HP NonStop Volume Level Encryption HP Medical Archive Solution Content Security HP BladeSystem content security solutions Application Security HP Application Security Center
HP Secure Advantage – Product Portfolio - 2 ,[object Object],Categories Domains HP Secure Advantage Products Governance Risk & Compliance Mgmt Risk Management & Compliance HP Compliance Log Warehouse HP TRIM (e-Discovery) HP Integrated Archival Platform (ILM/archiving for Email, Database, File) HP Business Service Automation - Data Center Automation Center (Server Automation, Network Automation) HP Medical Archive Solution HP Dragon HP Application Security Center Security Operations HP Business Service Automation - Data Center Automation Center (Server Automation, Network Automation, Live Network, Release Control) and Client Automation Center HP IT Service Management (Asset Manager, Decision Center etc) HP UCMDB, DDM HP Proliant Essentials Vulnerability & Patch Management Pack HP Systems Insight Manager HP Compliance Log Warehouse Business Continuity& Recovery HP Business Service Management Identity & Access Management Identity & Access Management HP ProCurve Identity Driven Manager HP Icewall HP-UX, Linux, NonStop etc
HP Secure Advantage Solutions  HP Servers, Storage, Networking, PC’s, Printers HP Software – HP Application Center, Business Service Automation, Change  Management  Services and Support Assessment,   Deployment,  hosting, managed services  HP  Secure Advantage  Comprehensive solutions consisting of  HP hardware, software, services and expertise to mitigate risk  Better business outcomes 06/19/09 © 2009 Hewlett-Packard Development Company, L.P. Leveraging 37 years’ experience of delivering secure transactions across the world for 1000s of customers  ,[object Object]
Practical advice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],June 19, 2009
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation cloud management platform
Presentation   cloud management platformPresentation   cloud management platform
Presentation cloud management platformxKinAnx
 
Syn118 Desktop as a Service
Syn118 Desktop as a ServiceSyn118 Desktop as a Service
Syn118 Desktop as a ServicePaul Stansel
 
Desktop-as-a-Service for innovative MSPs
Desktop-as-a-Service for innovative MSPsDesktop-as-a-Service for innovative MSPs
Desktop-as-a-Service for innovative MSPstocario Holding
 
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies
 
IBM Smart Cloud Provisioning Overview
IBM Smart Cloud Provisioning OverviewIBM Smart Cloud Provisioning Overview
IBM Smart Cloud Provisioning OverviewIBM Danmark
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapAmit Gatenyo
 
Cloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalCloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalSukumar Nayak
 
IDC datacenter of the future : Oracle point of view
IDC datacenter of the future : Oracle point of viewIDC datacenter of the future : Oracle point of view
IDC datacenter of the future : Oracle point of viewRiccardo Romani
 
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)itnewsafrica
 
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
Citrix Synergy 2014 - Syn110  Transform IT with CloudCitrix Synergy 2014 - Syn110  Transform IT with Cloud
Citrix Synergy 2014 - Syn110 Transform IT with CloudCitrix
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceCallidus Software
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISSATYAVEER PAL
 
Citrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceCitrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceShapeBlue
 
MARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMarlabs
 
Get your people ready For Cloud Computing
Get your people ready For Cloud ComputingGet your people ready For Cloud Computing
Get your people ready For Cloud ComputingITpreneurs
 

Was ist angesagt? (20)

Azure Hybid
Azure HybidAzure Hybid
Azure Hybid
 
Presentation cloud management platform
Presentation   cloud management platformPresentation   cloud management platform
Presentation cloud management platform
 
Syn118 Desktop as a Service
Syn118 Desktop as a ServiceSyn118 Desktop as a Service
Syn118 Desktop as a Service
 
Desktop-as-a-Service for innovative MSPs
Desktop-as-a-Service for innovative MSPsDesktop-as-a-Service for innovative MSPs
Desktop-as-a-Service for innovative MSPs
 
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
Dell Technologies Portfolio On One Single Page - POSTER - v4 September 2019
 
IBM Smart Cloud Provisioning Overview
IBM Smart Cloud Provisioning OverviewIBM Smart Cloud Provisioning Overview
IBM Smart Cloud Provisioning Overview
 
VMware VForum 2011 - HP
VMware VForum 2011 - HPVMware VForum 2011 - HP
VMware VForum 2011 - HP
 
Upmc tpdev3
Upmc tpdev3Upmc tpdev3
Upmc tpdev3
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
 
Cloud Services Integration Automation-External
Cloud Services Integration Automation-ExternalCloud Services Integration Automation-External
Cloud Services Integration Automation-External
 
IDC datacenter of the future : Oracle point of view
IDC datacenter of the future : Oracle point of viewIDC datacenter of the future : Oracle point of view
IDC datacenter of the future : Oracle point of view
 
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)
Journey to the cloud- A practical approach (November 7, 2012 Innovation Dinner)
 
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
Citrix Synergy 2014 - Syn110  Transform IT with CloudCitrix Synergy 2014 - Syn110  Transform IT with Cloud
Citrix Synergy 2014 - Syn110 Transform IT with Cloud
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
 
Desktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SISDesktop as a Service DaaS in India by BSNL SIS
Desktop as a Service DaaS in India by BSNL SIS
 
VMware vCloud® Air™
VMware vCloud® Air™VMware vCloud® Air™
VMware vCloud® Air™
 
Citrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-ServiceCitrix cloud platform - Journey to IT-as-a-Service
Citrix cloud platform - Journey to IT-as-a-Service
 
MARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO ConferenceMARLABS - Cloud services CIO Conference
MARLABS - Cloud services CIO Conference
 
Get your people ready For Cloud Computing
Get your people ready For Cloud ComputingGet your people ready For Cloud Computing
Get your people ready For Cloud Computing
 

Andere mochten auch

Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1David Spinks
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongRobert Clark
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityEd Wong
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesIntel Corporation
 
Capgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix OverviewRien du Pre
 

Andere mochten auch (10)

Casablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav KnapovskýCasablanca a Cloud Security od HP – Miroslav Knapovský
Casablanca a Cloud Security od HP – Miroslav Knapovský
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1Cloud Security And Cyber Security Legal And Regulatory  Hp Version V 2.1
Cloud Security And Cyber Security Legal And Regulatory Hp Version V 2.1
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
4 hp converged_cloud
4 hp converged_cloud4 hp converged_cloud
4 hp converged_cloud
 
Hypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong KongHypervisor Security - OpenStack Summit Hong Kong
Hypervisor Security - OpenStack Summit Hong Kong
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
Cloud infrastructure and Cloud Services
Cloud infrastructure and Cloud ServicesCloud infrastructure and Cloud Services
Cloud infrastructure and Cloud Services
 
Capgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPECapgemini Digital Reference Architecture with HPE
Capgemini Digital Reference Architecture with HPE
 
HP Cloud System Matrix Overview
HP Cloud System Matrix OverviewHP Cloud System Matrix Overview
HP Cloud System Matrix Overview
 

Ähnlich wie Securing Cloud Services

Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the EnterpriseJohn Rhoton
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeRH
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Cloud
CloudCloud
CloudNone
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Fernando sousa
Fernando sousaFernando sousa
Fernando sousaEuroCloud
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primerbrownmestizo
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingMauricio Godoy
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic SimonClub Alliances
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudRH
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_finalLA_IBM_Cloud_Event
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Club Alliances
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingTGO Consulting
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)Vincent Kwon
 
Benefits Of Building Private Cloud
Benefits Of Building Private CloudBenefits Of Building Private Cloud
Benefits Of Building Private Clouddinobusalachi
 

Ähnlich wie Securing Cloud Services (20)

Clouds in the Enterprise
Clouds in the EnterpriseClouds in the Enterprise
Clouds in the Enterprise
 
Cloud Computing - Beyond the Hype
Cloud Computing - Beyond the HypeCloud Computing - Beyond the Hype
Cloud Computing - Beyond the Hype
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Cloud
CloudCloud
Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Fernando sousa
Fernando sousaFernando sousa
Fernando sousa
 
Cloud Computing - A Primer
Cloud Computing - A PrimerCloud Computing - A Primer
Cloud Computing - A Primer
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Cloud Computing Strategy and Architecture
Cloud Computing Strategy and ArchitectureCloud Computing Strategy and Architecture
Cloud Computing Strategy and Architecture
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
 
Readying your IT Infrastructure for Cloud
Readying your IT Infrastructure for CloudReadying your IT Infrastructure for Cloud
Readying your IT Infrastructure for Cloud
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
Road Map da Virtualização para Cloud Computing
Road Map da Virtualização para Cloud ComputingRoad Map da Virtualização para Cloud Computing
Road Map da Virtualização para Cloud Computing
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud Computing
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Benefits Of Building Private Cloud
Benefits Of Building Private CloudBenefits Of Building Private Cloud
Benefits Of Building Private Cloud
 

Mehr von John Rhoton

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsJohn Rhoton
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerJohn Rhoton
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapJohn Rhoton
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingJohn Rhoton
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationJohn Rhoton
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6John Rhoton
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6John Rhoton
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementJohn Rhoton
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document WorkflowJohn Rhoton
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device ManagerJohn Rhoton
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device ManagementJohn Rhoton
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 

Mehr von John Rhoton (19)

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
Cloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and TrendsCloud Computing 2013: Status and Trends
Cloud Computing 2013: Status and Trends
 
Cloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to considerCloud Deployment Strategy: Challenges to consider
Cloud Deployment Strategy: Challenges to consider
 
Cloud Computing Challenges - Beamap
Cloud Computing Challenges - BeamapCloud Computing Challenges - Beamap
Cloud Computing Challenges - Beamap
 
Business Perspectives on Cloud Computing
Business Perspectives on Cloud ComputingBusiness Perspectives on Cloud Computing
Business Perspectives on Cloud Computing
 
Cloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise ImplementationCloud Computing Explained: Guide to Enterprise Implementation
Cloud Computing Explained: Guide to Enterprise Implementation
 
Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6Optimizing Cloud Computing with IPv6
Optimizing Cloud Computing with IPv6
 
Enterprise Preparation for IPv6
Enterprise Preparation for IPv6Enterprise Preparation for IPv6
Enterprise Preparation for IPv6
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 
Peer-based Enterprise Document Workflow
Peer-based EnterpriseDocument WorkflowPeer-based EnterpriseDocument Workflow
Peer-based Enterprise Document Workflow
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Securing Cloud Services

  • 1. Securing Cloud Services John Rhoton Distinguished Technologist HP EDS CTO Office June 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Cloud Model Integration Operation Governance Hardware Computation Storage Memory Colocation Real Estate Cooling Power Bandwidth Virtualisation Provisioning Billing Virtualisation Platform Programming Language Development Environment APIs Application CRM UC Email ....... .......
  • 10. Cloud Landscape Governance Operation Integration Infrastructure Platform Software
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18. Data Privacy June 19, 2009
  • 19.
  • 20.
  • 21. Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee User … … … The Internet
  • 22. Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities and Services Can be Outsourced in The Cloud …
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.

Hinweis der Redaktion

  1. A Break in the Clouds: Towards a Cloud Definition  L.M. Vaquero, L. Rodero-Merino, J. Cáceres, M. Lindner. ACM Computer Communication Reviews. 2009 http://reservoir.cs.ucl.ac.uk/twiki/pub/Reservoir/PublicationsPage/CloudDefinitionPaper.pdf
  2. Application Platform Virtualisation Physical Colocation
  3. http://cloudsecurity.org/2008/07/21/assessing-the-security-benefits-of-cloud-computing/
  4. Security Solutions - Require industry-leading technology, products, partnerships and services. We reduce complexity, risk, and cost by combining expert knowledge, proven methodologies and global resources to achieve better business outcomes Security Innovation- Leader in financial interchange and critical infrastructure security, policy management, encryption, Key Management, and risk mitigation Global Scale & Reach - Ability to provide low-cost/high-quality solution delivery offerings across the world Flexible Technology - The industry’s broadest portfolio of products, services and solutions Collaborative Expertise - Talented people with deep security knowledge and decades of technical experience HP Security solutions include HP products, selected partner products and HP services. These product offerings extend the value of your enterprise and enable business outcomes for your business. Examples include continuity of your manufacturing, your insurance and banking business operations, and being able pass your SOX or GLBA or PCI audits for compliance. Protect resources: - HP has multiple OS platforms with the highest level of certification providing maximum pro-active protection - HP Software’s Configuration and patch management provide continuous protection in changing environment - Enterprise Log Management collects and monitors the IT infrastructure for security issues and provides forensic evidence in the case of problems Protect data - Encryption of critical data at rest, in use or in motion increases protection - Examples of data protection include encryption in HP-UX, HP StorageWorks LT-O4 Tape, and use of our HP Compliance Log Warehouse product for proactive security management (to alert on data issues), and our linkage to selected partners This capability extends from servers to desktops and printers, with focused Key Management Provide validation - Validation at necessary audit points enables audit trails for compliance to industry regulations - Example : HP Compliance Log Warehouse provides compliance reports for a wide range of regulatory requirements, SOX, GLBA, HIPAA, PCI - Future integration of encryption and Key Management across an organization will provide end-to-end protection These technologies and the HP Services Information Security Service Management methodology based on industry standards are used to deliver a solution that includes HP Products, Partner products and incorporates a customer’s people and process needs into a complete solution. Protecting the security of your gear and your data should be as simple as using an ATM card. Basic principles HP learned a long time ago in protecting PINS and information about money moving through networks, now protect your health data, your systems and your future. Choose the right solution from HP’s broad portfolio—from desktop to data center With HP’s proven innovation: Protect your resources Protect all your data Provide validation and stay compliant
  5. HP is uniquely positioned to deliver Cloud Assure due to our experience and success delivering SaaS. We have learned quite a few lessons as a SaaS provider over 9 years to more than 700 customers around the correct practices to ensure our customer’s experience, that are reflected in our architecture, application, and processes. Our Cloud Assure offering leverages HP’s industry-leading portfolio covering security, performance, and availability while delivering on the industry’s leading SLAs for SaaS. HP SaaS has also developed a unique expertise as well in providing guidance to our customers to ensure their end-user’s experience, with a special expertise around web applications built over more then a decade.