SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits  Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor

Weitere ähnliche Inhalte

Andere mochten auch

Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical DossiersAseprofar
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.FRIZZT1
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticorgiladpn
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerezClaudio Jerez
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standardsgiladpn
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X Xx
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre679
 

Andere mochten auch (15)

Pharmaceutical Dossiers
Pharmaceutical DossiersPharmaceutical Dossiers
Pharmaceutical Dossiers
 
Responsiblity To Act Writing Benchmark
Responsiblity To Act Writing BenchmarkResponsiblity To Act Writing Benchmark
Responsiblity To Act Writing Benchmark
 
Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.Wine.Its Role In Medicine And Health.
Wine.Its Role In Medicine And Health.
 
Community needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handoutCommunity needs assessment.pla_2014.handout
Community needs assessment.pla_2014.handout
 
20100925 cloudy security - porticor
20100925 cloudy security - porticor20100925 cloudy security - porticor
20100925 cloudy security - porticor
 
Motivacion claudio jerez
Motivacion claudio jerezMotivacion claudio jerez
Motivacion claudio jerez
 
Job Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview SkillsJob Searching 101 Sharpening Your Interview Skills
Job Searching 101 Sharpening Your Interview Skills
 
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with StandardsPorticor - Can Data be safe in Public Clouds, in Compliance with Standards
Porticor - Can Data be safe in Public Clouds, in Compliance with Standards
 
Stuffed animals 2010
Stuffed animals 2010Stuffed animals 2010
Stuffed animals 2010
 
Stuffed Animal Sleepover
Stuffed Animal SleepoverStuffed Animal Sleepover
Stuffed Animal Sleepover
 
Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015Big Talk from Small Libraries 2015
Big Talk from Small Libraries 2015
 
Job Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look ForJob Searching 101 Skills Employers Look For
Job Searching 101 Skills Employers Look For
 
Melting Pot or Salad Bowl
Melting Pot or Salad BowlMelting Pot or Salad Bowl
Melting Pot or Salad Bowl
 
I N V E N T O S D E L S I G L O X X
I N V E N T O S  D E L  S I G L O  X XI N V E N T O S  D E L  S I G L O  X X
I N V E N T O S D E L S I G L O X X
 
Calendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. SemestreCalendario Reinscripciones 5 To. Semestre
Calendario Reinscripciones 5 To. Semestre
 

Ähnlich wie 20100602 porticor at igt short

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
LTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationsLTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationseXplanoTech
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by GemaltoHaider Iqbal
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9Arvind Tiwary
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Matthew McCullough
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology100656472mercier
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveChuck Petras
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...Osaka University
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USACJ Boguszewski
 

Ähnlich wie 20100602 porticor at igt short (20)

Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov2020-04-29 SIT Insights in Technology - Serguei Beloussov
2020-04-29 SIT Insights in Technology - Serguei Beloussov
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
LTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer ApplicationsLTE Femtocells: Stepping Stone for Killer Applications
LTE Femtocells: Stepping Stone for Killer Applications
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
Building trust in IoT, by Gemalto
Building trust in IoT, by GemaltoBuilding trust in IoT, by Gemalto
Building trust in IoT, by Gemalto
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9IoT security fresh thinking 2017 sep 9
IoT security fresh thinking 2017 sep 9
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
semppt.pptx
semppt.pptxsemppt.pptx
semppt.pptx
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
What are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdfWhat are the 7 Common IoT Protocols.pdf
What are the 7 Common IoT Protocols.pdf
 
Catching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) WaveCatching the Internet of Things (IoT) Wave
Catching the Internet of Things (IoT) Wave
 
How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...How changing mobile and media technologies is changing the way we create inno...
How changing mobile and media technologies is changing the way we create inno...
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA2015Apr21 IoT Global innovation forum Dallas Texas USA
2015Apr21 IoT Global innovation forum Dallas Texas USA
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

20100602 porticor at igt short

  • 1. Gilad Parann-Nissany June 2nd, 2010 Practicing Security in Public Clouds 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 2. Porticor 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 3. Public Clouds and FUD 6/1/2010 Copyright 2009, 2010 © Porticor Pay as you go Reasonable cost On-demand Self service Elastic Scale My precious data in a public place? Who do I trust? How easy to hack? Is encryption enough? Can I control it? Many considerations exist even before clouds Some considerations really are new
  • 4. How much security do I need? 6/1/2010 Copyright 2009, 2010 ©Porticor
  • 5. Modern threats…Its far too easy to be a bad guy Hacking is a business today, often involving professional criminals Interesting fact: biggest cloud in the world belongs to the crooks Number of Systems: 6,400,000 Number of CPUs: 18,000,000+ Bandwidth: 28 Terabits Facilities: 230 Countries …the Conficker worm  6/1/2010 Copyright 2009, 2010 ©Porticor R. Joffe
  • 6. Security… 6/1/2010 Copyright 2009, 2010 ©Porticor by clarity
  • 7. Applying Security Concepts to Public Clouds Secure distributed data storage Keys management Hypervisors and virtual machines Intrusion Detection and Prevention (IDS/IPS) Logging and Log forensics Security Information Management Identity Access Management Policy management Denial of Service prevention Web Application Firewall Firewall Virtual Private Networks Encryption Database Firewall Data Leak Prevention Scanning for exploits Scanning for virus Physical security … 6/1/2010 Copyright 2009, 2010 ©Porticor *courtesy CSA
  • 8. Understand the value of your data and service: sec should be cost effective Understand your complete problem domain Governance & Measurement Architecture & Technology Specifics of your application Answers Some are known already Some are truly new Cloud Operations really is new! Map out – what’s relevant for you Roll your own – or work with someone who has experience? 6/1/2010 Copyright 2009, 2010 ©Porticor