SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Cloud Security
   Group Assignment
    Venkatesh Chary
     Arun Krishna
What is Cloud Security?
        Cloud                             Security

 •   Agility                        •   Gate-keeper
 •   Self-service                   •   Standards
 •   Scale                          •   Control
 •   Automation                     •   Centralized


Cloud Security is security principles applied to protect data,
applications and infrastructure associated within the Cloud
Computing technology.
Market Analysis
What market size are we talking about
Market Size:
           2012 : US $425.4 Million

          2013 : US $629.6 Million

          2014 : US $963.4 Million
Global Cloud Security Market Growth
   Analysis 2012-2014 (US$ million)
1200
               41.4% Compound annual growth
1000

800

600
                                   963.4
400
                   629.6
200    425.4

   0
       2012         2013           2014
Global Geographies
• The Americas

• Europe, the Middle East and Africa; European
  Medicines Evaluation Agency. (EMEA)

• Asia Pacific (APAC)
Global Cloud Security Market in
          Percentage

         2012                       2014


   2.5                          4
                Global                     Global
                Cloud                      Cloud
                Security                   Security
                Market                     Market
                Global                     Global
                Security                   Security
97.5            Market                     Market
                           96
End-Users/Customers
• Large Enterprises

• Government Agencies

• Cloud Service Providers (CSPs)

• Medium-sized Enterprises
Global Cloud Security Market by End-
         User Segmentation
             5         Large Enterprises
        9

                       Government Agencies
                 38
   17
                       Cloud Service Providers

                       Medium Enterprises

                       Other/Third Party Vendors
            31
Trends associated with Cloud Security

• Increasing Partnerships between CSPs and Security
  Solution Providers Expected
• Increasing Emergence of Cloud Service-specific Security
  Solution Providers
• Identity Management and Encryption to Remain the
  Top Cloud Security Solutions Offered
• Increasing Availability of Cloud Security Solutions for
  Small and Medium-sized Businesses (SMBs)
• Emergence of Strong Cloud Security Standard and
  Guidelines
Why is Cloud Security Important

• Increasing Usage of Cloud Services in Non-
  traditional Sectors
• Growing Adoption of Cloud Services in
  Government Departments
• Rise in Cloud Service-specific Attacks
• Growing Usage of Cloud Services for Critical Data
  Storage
• Rise in Employee Mobility
What are the challenges?

•   CSPs believe that Security is End-users’ Issue
•   Lack of Awareness about Cloud Security
•   Inconsistent Network Connection Issues
•   Lack of Proper Cloud Security Standards
What End-users/customers expect
          from Cloud Security

•   Strong Overall Security Offered
•   Suite of Security Solutions Offered
•   Encryption Key Management Features Offered
•   Availability of Fine Granular Control
McAfee Inc.
• McAfee Inc., founded in 1987, is a leading
  provider of network security solutions. The
  company is listed on the New York Stock
  Exchange and is based in California, US. The
  company provides security services across the
  globe. The company’s security products are for
  sectors such as Data Protection, Email and Web
  Security, Endpoint Protection, Mobile
  Security, Network Security, Risk and
  Compliance, Security Software as a Service
  (Security SaaS), and Security Management.
McAfee acquired by Intel
• On August 19, 2010 Intel acquired McAfee for
  $7.68 billion in a cash deal. In FY2010, the
  company reported total revenue of US$2.1
  billion. However, in FY2010, the revenue from
  the Cloud Security segment was low, at only
  around US$25 million.
McAfee Cloud Security Program
McAfee Security-as-a-Service delivers
complete endpoint, email, web, and network
protection through the cloud, saving your IT
department time, effort, and costs. As part of
our Security Connected framework that
delivers comprehensive security and
integrated management, McAfee Security
SaaS leverages the power of the cloud to help
organizations realize faster time-to-protection
to secure their business.
McAfee SaaS Includes

•   McAfee SaaS Email Protection
•   McAfee SaaS Integrated Suites
•   McAfee SaaS Endpoint Protection
•   McAfee SaaS Vulnerability Management
•   McAfee SaaS Web Protection
SWOT Analysis
Strengths                                 Weakness
•   The company’s cloud access control    •   Despite being an established
    solution allows control over the          traditional security solution
    entire lifecycle of cloud access          provider with a wide geographic
    security, providing solutions such        presence, the company is slow to
    as SSO, provisioning, strong              gain share in the cloud security
    authentication and audit.                 space
•   Its solution helps in auto-           •   Some pure-play companies such as
    synchronization of identity data          Symplified are witnessing much
    between enterprise and cloud              higher growth in the Cloud Identity
    applications for change                   Management market
    management scenarios                  •   Some of its competitors, such as
•   Centralized management and                Trend Micro, provides better key
    reporting are provided through            management options/features
    integration with the McAfee ePolicy
    Orchestrator platform
SWOT Analysis
Opportunities                      Threats
• The company has a very long      • Threat from pure-play vendors
  list of partners from various      such as Zscaler, Vshield from
  geographic locations, which it     VMware and Symplified that
  can leverage to expand             have high growth rates
• It recently launched its cloud   • Threat to its market share
  security platform, which           from other traditional security
  secures all content and data       solution providers that are
  traffic including email, web       expected to aggressively push
  and identity traffic;              for expansion in this market
  thus, providing a unified
  solution
Some Key Competitors
• Trend Micro SecureCloud, and Trend Micro Deep
  Security
• CA Access Control, and CA Identity Manager
• Symplified Mobile Edition, Symplified Access
  Manager, and Symplified Identity Manager
• CloudPassage cloud server exposure
  management
• Okta Cloud Services Platform
• GuardTime Keyless Signature Server
• CipherCloud Data Protection for Salesforce
Major Customers
•    AT&T Global Network Services Client
•    Citrix
•    Microsoft VPN
•    Juniper Networks
•    Verizon
                        Other Information
    Knowledge base Website
    https://kc.mcafee.com/corporate/index?page=home
    Security as a service by Mcafee
    http://www.mcafee.com/us/products/security-as-a-
    service/index.aspx
Netflix
Netflix is a commercial entertainment web based
   company, by online subscriptions they provide
   website TV shows and movies to subscribers with
   the online streaming technology and also send
   DVD’s using US mail service.
In 2010, Netflix started migrating its infrastructure
   to Amazon EC2. At present Netflix has over 1
   Petabyte of data stored on Amazon, and the data
   are sent to content delivery networks such as
   Akamai, Limelight etc., that feed the content to
   local ISPs.
What Netflix is now?

•   24+ million members globally
•   Streaming in 47 countries
•   Watch on more than 700 Devices
•   33% of US peak evening Internet traffic
Why Did Netflix moved to Cloud
• Netflix is growing and adding subscribers at an
  unprecedented rate. The company is expanding
  into global markets, and an ever-growing array of
  Netflix-ready devices is spurring streaming
  service to even faster growth. At the heart of
  Netflix technology is the Cloud Computing
  platform, which serves as the distributed systems
  foundation for Netflix application
  development, and powers the movie viewing
  experience for millions of customers every day.
Netflix Cloud Security Strategy
•   New deployments and upgrades
•   Capacity planning & procurement
•   Key management
•   Detecting instance changes
•   Application ownership, management
•   Patching, updating
•   Availability, in a failure-prone environment
•   Embedding security controls
•   Least privilege enforcement
•   Testing/auditing for conformance
•   Consistency, conformity in build and launch
•   Continuous, aggressive monitoring, testing
Questions??
If you are interested in this presentation, I am
   uploading this on slideshare.com. You can find
   it by searching my name Venkatesh Chary.
Below is link for reference:

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Cloud Computing and Services | PPT
Cloud Computing and Services | PPTCloud Computing and Services | PPT
Cloud Computing and Services | PPT
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network security
Network securityNetwork security
Network security
 
Middleware Technologies ppt
Middleware Technologies pptMiddleware Technologies ppt
Middleware Technologies ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Security threats
Security threatsSecurity threats
Security threats
 

Andere mochten auch

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.pptDreamMalar
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsBasavaraj Galagi
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingArwa
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesThoughtWorks Studios
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Andere mochten auch (19)

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Web Security
Web SecurityWeb Security
Web Security
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
Smart irrigation system using Internet Of Things
Smart irrigation system using Internet Of ThingsSmart irrigation system using Internet Of Things
Smart irrigation system using Internet Of Things
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing - Benefits and Challenges
Cloud Computing - Benefits and ChallengesCloud Computing - Benefits and Challenges
Cloud Computing - Benefits and Challenges
 
Web Security
Web SecurityWeb Security
Web Security
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Ähnlich wie Cloud security ppt

Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangMinh Le
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14L S Subramanian
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Adewole Shitta-bey
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 

Ähnlich wie Cloud security ppt (20)

Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14Lss implementing cyber security in the cloud, and from the cloud-feb14
Lss implementing cyber security in the cloud, and from the cloud-feb14
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Cloud security ppt

  • 1. Cloud Security Group Assignment Venkatesh Chary Arun Krishna
  • 2. What is Cloud Security? Cloud Security • Agility • Gate-keeper • Self-service • Standards • Scale • Control • Automation • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
  • 3. Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million
  • 4. Global Cloud Security Market Growth Analysis 2012-2014 (US$ million) 1200 41.4% Compound annual growth 1000 800 600 963.4 400 629.6 200 425.4 0 2012 2013 2014
  • 5. Global Geographies • The Americas • Europe, the Middle East and Africa; European Medicines Evaluation Agency. (EMEA) • Asia Pacific (APAC)
  • 6. Global Cloud Security Market in Percentage 2012 2014 2.5 4 Global Global Cloud Cloud Security Security Market Market Global Global Security Security 97.5 Market Market 96
  • 7. End-Users/Customers • Large Enterprises • Government Agencies • Cloud Service Providers (CSPs) • Medium-sized Enterprises
  • 8. Global Cloud Security Market by End- User Segmentation 5 Large Enterprises 9 Government Agencies 38 17 Cloud Service Providers Medium Enterprises Other/Third Party Vendors 31
  • 9. Trends associated with Cloud Security • Increasing Partnerships between CSPs and Security Solution Providers Expected • Increasing Emergence of Cloud Service-specific Security Solution Providers • Identity Management and Encryption to Remain the Top Cloud Security Solutions Offered • Increasing Availability of Cloud Security Solutions for Small and Medium-sized Businesses (SMBs) • Emergence of Strong Cloud Security Standard and Guidelines
  • 10. Why is Cloud Security Important • Increasing Usage of Cloud Services in Non- traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility
  • 11. What are the challenges? • CSPs believe that Security is End-users’ Issue • Lack of Awareness about Cloud Security • Inconsistent Network Connection Issues • Lack of Proper Cloud Security Standards
  • 12. What End-users/customers expect from Cloud Security • Strong Overall Security Offered • Suite of Security Solutions Offered • Encryption Key Management Features Offered • Availability of Fine Granular Control
  • 13. McAfee Inc. • McAfee Inc., founded in 1987, is a leading provider of network security solutions. The company is listed on the New York Stock Exchange and is based in California, US. The company provides security services across the globe. The company’s security products are for sectors such as Data Protection, Email and Web Security, Endpoint Protection, Mobile Security, Network Security, Risk and Compliance, Security Software as a Service (Security SaaS), and Security Management.
  • 14. McAfee acquired by Intel • On August 19, 2010 Intel acquired McAfee for $7.68 billion in a cash deal. In FY2010, the company reported total revenue of US$2.1 billion. However, in FY2010, the revenue from the Cloud Security segment was low, at only around US$25 million.
  • 15. McAfee Cloud Security Program McAfee Security-as-a-Service delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs. As part of our Security Connected framework that delivers comprehensive security and integrated management, McAfee Security SaaS leverages the power of the cloud to help organizations realize faster time-to-protection to secure their business.
  • 16. McAfee SaaS Includes • McAfee SaaS Email Protection • McAfee SaaS Integrated Suites • McAfee SaaS Endpoint Protection • McAfee SaaS Vulnerability Management • McAfee SaaS Web Protection
  • 17. SWOT Analysis Strengths Weakness • The company’s cloud access control • Despite being an established solution allows control over the traditional security solution entire lifecycle of cloud access provider with a wide geographic security, providing solutions such presence, the company is slow to as SSO, provisioning, strong gain share in the cloud security authentication and audit. space • Its solution helps in auto- • Some pure-play companies such as synchronization of identity data Symplified are witnessing much between enterprise and cloud higher growth in the Cloud Identity applications for change Management market management scenarios • Some of its competitors, such as • Centralized management and Trend Micro, provides better key reporting are provided through management options/features integration with the McAfee ePolicy Orchestrator platform
  • 18. SWOT Analysis Opportunities Threats • The company has a very long • Threat from pure-play vendors list of partners from various such as Zscaler, Vshield from geographic locations, which it VMware and Symplified that can leverage to expand have high growth rates • It recently launched its cloud • Threat to its market share security platform, which from other traditional security secures all content and data solution providers that are traffic including email, web expected to aggressively push and identity traffic; for expansion in this market thus, providing a unified solution
  • 19. Some Key Competitors • Trend Micro SecureCloud, and Trend Micro Deep Security • CA Access Control, and CA Identity Manager • Symplified Mobile Edition, Symplified Access Manager, and Symplified Identity Manager • CloudPassage cloud server exposure management • Okta Cloud Services Platform • GuardTime Keyless Signature Server • CipherCloud Data Protection for Salesforce
  • 20. Major Customers • AT&T Global Network Services Client • Citrix • Microsoft VPN • Juniper Networks • Verizon Other Information Knowledge base Website https://kc.mcafee.com/corporate/index?page=home Security as a service by Mcafee http://www.mcafee.com/us/products/security-as-a- service/index.aspx
  • 21. Netflix Netflix is a commercial entertainment web based company, by online subscriptions they provide website TV shows and movies to subscribers with the online streaming technology and also send DVD’s using US mail service. In 2010, Netflix started migrating its infrastructure to Amazon EC2. At present Netflix has over 1 Petabyte of data stored on Amazon, and the data are sent to content delivery networks such as Akamai, Limelight etc., that feed the content to local ISPs.
  • 22. What Netflix is now? • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 Devices • 33% of US peak evening Internet traffic
  • 23. Why Did Netflix moved to Cloud • Netflix is growing and adding subscribers at an unprecedented rate. The company is expanding into global markets, and an ever-growing array of Netflix-ready devices is spurring streaming service to even faster growth. At the heart of Netflix technology is the Cloud Computing platform, which serves as the distributed systems foundation for Netflix application development, and powers the movie viewing experience for millions of customers every day.
  • 24. Netflix Cloud Security Strategy • New deployments and upgrades • Capacity planning & procurement • Key management • Detecting instance changes • Application ownership, management • Patching, updating • Availability, in a failure-prone environment • Embedding security controls • Least privilege enforcement • Testing/auditing for conformance • Consistency, conformity in build and launch • Continuous, aggressive monitoring, testing
  • 25. Questions?? If you are interested in this presentation, I am uploading this on slideshare.com. You can find it by searching my name Venkatesh Chary. Below is link for reference: