SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
SonicWALL Business Insight
CLO U D CO M PU T I N G /SA A S                         Enabling Cloud Computing and SaaS with Enterprise Security Solutions




     The Cloud Computing/SaaS Scenario                                           n   Security – With cloud computing, application code and
     Software-as-a-Service (SaaS) has steadily gained traction over                  sensitive data are moved outside of the corporate boundary,
     the years, finding a useful, though relatively limited, role within             and no longer receive the benefit of perimeter and data
     the vast majority of enterprises. These days, however, it is cloud              center defenses that IT has implemented. A major implication
     computing—a new delivery and consumption model for IT                           of this migration is that it is not just your customers, but
     services based on Internet technologies and characterized by                    mobile and distributed employees too, that now have direct
     dynamic provisioning and scaling of virtualized resources—that                  access to these resources. The only obstacle is whatever
     is sparking renewed interest in service-provider-based offer-                   security mechanisms the cloud provider decides to put in
     ings, be they SaaS, Platform-as-a-Service (PaaS), or                            place, which in many cases means little more than placing
     Infrastructure-as-a-Service (IaaS). Indeed, a survey by Gartner1                restrictions on the source IP range for inbound sessions, so
     revealed that cloud computing rates as the second highest                       that only the customer’s users can gain access.
     technology priority in 2010, behind only virtualization.
                                                                                 n   Compliance – Equally troubling is the impact that migrating
     This finding is not at all surprising, given the many benefits                  data and applications to the cloud has on an organization’s
     cloud computing has to offer. For starters, with cloud computing,               ability to achieve compliance with regional and industry-
     ordinary businesses essentially obtain the ability to have highly               specific privacy and security regulations. The loss of visibility
     scalable and responsive Web applications and services—just                      and control over user activities makes it significantly more
     like those from Amazon, Google, and others—without having                       challenging to legitimately make the requisite assertions
     to first discover and master the tricks of the trade and then build             regarding data integrity and the potential for inappropriate
     all of the underlying infrastructure themselves.                                or unauthorized disclosure of sensitive information.

     Because cloud computing entails the purchase of a service                   n   Performance – Application performance can also become
     rather direct ownership of all the necessary bits and pieces, IT                an issue in certain cases. This is particularly true for latency
     organizations also enjoy quicker startup times, better agility                  and/or bandwidth sensitive applications where users
     and investment protection (based on being able to terminate                     formerly had access to local instances of them.
     the relationship and change directions as needed), and need
                                                                                 SonicWALL for Cloud Computing/SaaS
     only pay for what is used. In addition, the fact that these
                                                                                 Maximizing the benefits of SaaS and cloud computing delivery
     services are delivered from a much larger, shared and highly
                                                                                 models depends on having the ability to address the afore-
     optimized computing environment, means that customers
                                                                                 mentioned challenges. In this regard, enterprise security
     obtain better economies of scale, do not incur the cost of
                                                                                 solutions from SonicWALL® provide today’s organizations with
     having to design for peak loads, and can obtain advanced
                                                                                 exactly what they need.
     features and capabilities at more affordable rates.

     As promising as SaaS and, to a greater extent, cloud                        SonicWALL Clean VPN – A combination of SonicWALL Secure
     computing are, though, IT managers need to keep in mind                     Remote Access and SonicWALL Network Security solutions,
     that these alternative approaches to delivering IT services                 Clean VPN is an innovative and highly effective approach to
     are accompanied by a number of significant challenges,                      counteracting the security and compliance challenges presented
     including ones pertaining to security, regulatory compliance,               by SaaS and cloud computing. First of all, SonicWALL SSL VPN
     and performance.                                                            appliances provide a full suite of enterprise-class access control



     1
         Press Release, “Gartner EXP Worldwide Survey …”, January 19, 2010
                                                                                                                  PROTECTION AT THE SPEED OF BUSINESS™
SonicWALL® Business Insight




capabilities. Users are authenticated, their devices are inspected                                                             SonicWALL Application Intelligence – An embedded component
for conformance with corporate policies and requirements for                                                                   of SonicWALL Network Security Appliances, Application Intelligence
resident security software, and granular control is enforced                                                                   and Control helps IT departments address the challenges of cloud
over which applications and resources can be accessed in any                                                                   computing in two distinct ways. First, it provides detailed visibility
given scenario.                                                                                                                and control of associated traffic based on the specific applications
                                                                                                                               and services being used and, optionally, based on who is using them
Simultaneously, SonicWALL Network Security Appliances are also                                                                 and when they are being used. Access control and threat inspection
at work scrubbing both inbound and outbound cloud computing                                                                    policies can thus be set and enforced on a highly granular basis,
traffic in a context- and content-aware manner. In this way, the                                                               instead of having to treat all cloud computing traffic the same.
solution’s deep packet inspection firewall and integrated gateway
anti-virus, anti-spyware, and intrusion prevention capabilities can                                                            The second way that Application Intelligence helps is by providing IT
provide accurate and effective protection from today’s dynamic                                                                 with a means to mitigate potential performance issues. The ability to
security threats, including elusive malware, hackers, and other                                                                discern which specific applications comprise a given traffic stream,
ill-intentioned users. In addition, high-speed Reassembly-Free                                                                 combined with built-in QoS and bandwidth enforcement capabilities,
Deep Packet Inspection and a multi-core architecture ensure a                                                                  enables IT departments to reserve bandwidth for essential applications,
high-degree of scalability while delivering thorough, zero-impact                                                              and prioritize their treatment relative to less critical services. In
protection for latency-sensitive applications.                                                                                 addition, comprehensive reporting capabilities support ongoing
                                                                                                                               monitoring and tuning, thus ensuring that associated rules remain
In addition, SonicWALL Clean VPN supports multiple deployment                                                                  aligned with actual conditions and shifting usage patterns.
options. The associated controls can be implemented either in the
cloud or, alternately, at the enterprise premise for those situations                                                          Bottom Line
where greater control is required and/or the service provider is                                                               Enterprise security solutions from SonicWALL help mitigate related
not amenable to the former arrangement. In either case, the result                                                             security, compliance, and performance challenges, enabling
is a comprehensive dose of threat protection, highly granular                                                                  today’s enterprises to more fully achieve the cost of ownership,
access control, and restoration of the visibility and control                                                                  scalability, and agility benefits associated with cloud computing
needed to confidently assert conformance with prevailing                                                                       and SaaS approaches for IT service delivery.
compliance requirements.




SonicWALL’s line-up of dynamic security solutions
                                                                                                                      SonicWALL, Inc.
                                                                                                                      2001 Logic Drive, San Jose, CA 95124
                                                                                                                      T +1 408.745.9600 F +1 408.745.9300
NETWORK               SECURE             WEB AND E-MAIL            BACKUP                POLICY AND
SECURITY           REMOTE ACCESS           SECURITY              AND RECOVERY           MANAGEMENT                    www.sonicwall.com                                               PROTECTION AT THE SPEED OF BUSINESS™


©2010 SonicWALL and the SonicWALL logo is registered trademarks of SonicWALL, Inc. Protection at the Speed of Business is a trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their
respective companies. Specifications and descriptions subject to change without notice. 04/10 SW 931

Weitere ähnliche Inhalte

Was ist angesagt?

Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012Lars Neupart
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Joel Demay
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotesStudying
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 ProjectsNone
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution BriefJuniper Networks
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesDheeraj Negi
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 

Was ist angesagt? (18)

Neupart Isaca April 2012
Neupart Isaca April 2012Neupart Isaca April 2012
Neupart Isaca April 2012
 
Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17Tsl list of assets 2012 03-20 v17
Tsl list of assets 2012 03-20 v17
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Tech trendnotes
Tech trendnotesTech trendnotes
Tech trendnotes
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Insights from 110 Projects
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 Projects
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Simply Connected Solution Brief
Simply Connected Solution BriefSimply Connected Solution Brief
Simply Connected Solution Brief
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Ccsw
CcswCcsw
Ccsw
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Day 3 p2 - security
Day 3   p2 - securityDay 3   p2 - security
Day 3 p2 - security
 

Andere mochten auch

Ferrari Team Risi Sponsorship Overview
Ferrari Team Risi Sponsorship OverviewFerrari Team Risi Sponsorship Overview
Ferrari Team Risi Sponsorship Overviewcharlesward
 
PALESTRA ONLINE
PALESTRA ONLINEPALESTRA ONLINE
PALESTRA ONLINEEquipepope
 
2010 magic quadrant utm final 2
2010 magic quadrant utm final 22010 magic quadrant utm final 2
2010 magic quadrant utm final 2Yustinus Malawau
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 

Andere mochten auch (9)

Ferrari Team Risi Sponsorship Overview
Ferrari Team Risi Sponsorship OverviewFerrari Team Risi Sponsorship Overview
Ferrari Team Risi Sponsorship Overview
 
Ds e class-nsa_e8500_us
Ds e class-nsa_e8500_usDs e class-nsa_e8500_us
Ds e class-nsa_e8500_us
 
PALESTRA ONLINE
PALESTRA ONLINEPALESTRA ONLINE
PALESTRA ONLINE
 
022811 gov criminal procedure 50m
022811 gov criminal procedure 50m022811 gov criminal procedure 50m
022811 gov criminal procedure 50m
 
2010 magic quadrant utm final 2
2010 magic quadrant utm final 22010 magic quadrant utm final 2
2010 magic quadrant utm final 2
 
Ds nsa series_4500
Ds nsa series_4500Ds nsa series_4500
Ds nsa series_4500
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
Ds e class-sra_series__us
Ds e class-sra_series__usDs e class-sra_series__us
Ds e class-sra_series__us
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 

Ähnlich wie Bi cloud saa_s

What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionHossam Zein
 
Cloudcomputingupload
CloudcomputinguploadCloudcomputingupload
CloudcomputinguploadIbrahim Khan
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private CloudsCTRLS
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wpraghuvamsiuriti
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the CloudSumo Logic
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2contrastcbt
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyHappiest Minds Technologies
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewallingJustin Cletus
 

Ähnlich wie Bi cloud saa_s (20)

Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Cloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-visionCloud computing-intel-cloud-2015-vision
Cloud computing-intel-cloud-2015-vision
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Cloudcomputingupload
CloudcomputinguploadCloudcomputingupload
Cloudcomputingupload
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private Clouds
 
Managed Mobility Load Off Customer Wp
Managed Mobility Load Off Customer WpManaged Mobility Load Off Customer Wp
Managed Mobility Load Off Customer Wp
 
understanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputingunderstanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputing
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Building Secure Services in the Cloud
Building Secure Services in the CloudBuilding Secure Services in the Cloud
Building Secure Services in the Cloud
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
BlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network SecuirtyBlockChain Enabled-Cloud Delivered For Network Secuirty
BlockChain Enabled-Cloud Delivered For Network Secuirty
 
Hybrid cloud based firewalling
Hybrid cloud based firewallingHybrid cloud based firewalling
Hybrid cloud based firewalling
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Bi cloud saa_s

  • 1. SonicWALL Business Insight CLO U D CO M PU T I N G /SA A S Enabling Cloud Computing and SaaS with Enterprise Security Solutions The Cloud Computing/SaaS Scenario n Security – With cloud computing, application code and Software-as-a-Service (SaaS) has steadily gained traction over sensitive data are moved outside of the corporate boundary, the years, finding a useful, though relatively limited, role within and no longer receive the benefit of perimeter and data the vast majority of enterprises. These days, however, it is cloud center defenses that IT has implemented. A major implication computing—a new delivery and consumption model for IT of this migration is that it is not just your customers, but services based on Internet technologies and characterized by mobile and distributed employees too, that now have direct dynamic provisioning and scaling of virtualized resources—that access to these resources. The only obstacle is whatever is sparking renewed interest in service-provider-based offer- security mechanisms the cloud provider decides to put in ings, be they SaaS, Platform-as-a-Service (PaaS), or place, which in many cases means little more than placing Infrastructure-as-a-Service (IaaS). Indeed, a survey by Gartner1 restrictions on the source IP range for inbound sessions, so revealed that cloud computing rates as the second highest that only the customer’s users can gain access. technology priority in 2010, behind only virtualization. n Compliance – Equally troubling is the impact that migrating This finding is not at all surprising, given the many benefits data and applications to the cloud has on an organization’s cloud computing has to offer. For starters, with cloud computing, ability to achieve compliance with regional and industry- ordinary businesses essentially obtain the ability to have highly specific privacy and security regulations. The loss of visibility scalable and responsive Web applications and services—just and control over user activities makes it significantly more like those from Amazon, Google, and others—without having challenging to legitimately make the requisite assertions to first discover and master the tricks of the trade and then build regarding data integrity and the potential for inappropriate all of the underlying infrastructure themselves. or unauthorized disclosure of sensitive information. Because cloud computing entails the purchase of a service n Performance – Application performance can also become rather direct ownership of all the necessary bits and pieces, IT an issue in certain cases. This is particularly true for latency organizations also enjoy quicker startup times, better agility and/or bandwidth sensitive applications where users and investment protection (based on being able to terminate formerly had access to local instances of them. the relationship and change directions as needed), and need SonicWALL for Cloud Computing/SaaS only pay for what is used. In addition, the fact that these Maximizing the benefits of SaaS and cloud computing delivery services are delivered from a much larger, shared and highly models depends on having the ability to address the afore- optimized computing environment, means that customers mentioned challenges. In this regard, enterprise security obtain better economies of scale, do not incur the cost of solutions from SonicWALL® provide today’s organizations with having to design for peak loads, and can obtain advanced exactly what they need. features and capabilities at more affordable rates. As promising as SaaS and, to a greater extent, cloud SonicWALL Clean VPN – A combination of SonicWALL Secure computing are, though, IT managers need to keep in mind Remote Access and SonicWALL Network Security solutions, that these alternative approaches to delivering IT services Clean VPN is an innovative and highly effective approach to are accompanied by a number of significant challenges, counteracting the security and compliance challenges presented including ones pertaining to security, regulatory compliance, by SaaS and cloud computing. First of all, SonicWALL SSL VPN and performance. appliances provide a full suite of enterprise-class access control 1 Press Release, “Gartner EXP Worldwide Survey …”, January 19, 2010 PROTECTION AT THE SPEED OF BUSINESS™
  • 2. SonicWALL® Business Insight capabilities. Users are authenticated, their devices are inspected SonicWALL Application Intelligence – An embedded component for conformance with corporate policies and requirements for of SonicWALL Network Security Appliances, Application Intelligence resident security software, and granular control is enforced and Control helps IT departments address the challenges of cloud over which applications and resources can be accessed in any computing in two distinct ways. First, it provides detailed visibility given scenario. and control of associated traffic based on the specific applications and services being used and, optionally, based on who is using them Simultaneously, SonicWALL Network Security Appliances are also and when they are being used. Access control and threat inspection at work scrubbing both inbound and outbound cloud computing policies can thus be set and enforced on a highly granular basis, traffic in a context- and content-aware manner. In this way, the instead of having to treat all cloud computing traffic the same. solution’s deep packet inspection firewall and integrated gateway anti-virus, anti-spyware, and intrusion prevention capabilities can The second way that Application Intelligence helps is by providing IT provide accurate and effective protection from today’s dynamic with a means to mitigate potential performance issues. The ability to security threats, including elusive malware, hackers, and other discern which specific applications comprise a given traffic stream, ill-intentioned users. In addition, high-speed Reassembly-Free combined with built-in QoS and bandwidth enforcement capabilities, Deep Packet Inspection and a multi-core architecture ensure a enables IT departments to reserve bandwidth for essential applications, high-degree of scalability while delivering thorough, zero-impact and prioritize their treatment relative to less critical services. In protection for latency-sensitive applications. addition, comprehensive reporting capabilities support ongoing monitoring and tuning, thus ensuring that associated rules remain In addition, SonicWALL Clean VPN supports multiple deployment aligned with actual conditions and shifting usage patterns. options. The associated controls can be implemented either in the cloud or, alternately, at the enterprise premise for those situations Bottom Line where greater control is required and/or the service provider is Enterprise security solutions from SonicWALL help mitigate related not amenable to the former arrangement. In either case, the result security, compliance, and performance challenges, enabling is a comprehensive dose of threat protection, highly granular today’s enterprises to more fully achieve the cost of ownership, access control, and restoration of the visibility and control scalability, and agility benefits associated with cloud computing needed to confidently assert conformance with prevailing and SaaS approaches for IT service delivery. compliance requirements. SonicWALL’s line-up of dynamic security solutions SonicWALL, Inc. 2001 Logic Drive, San Jose, CA 95124 T +1 408.745.9600 F +1 408.745.9300 NETWORK SECURE WEB AND E-MAIL BACKUP POLICY AND SECURITY REMOTE ACCESS SECURITY AND RECOVERY MANAGEMENT www.sonicwall.com PROTECTION AT THE SPEED OF BUSINESS™ ©2010 SonicWALL and the SonicWALL logo is registered trademarks of SonicWALL, Inc. Protection at the Speed of Business is a trademark of SonicWALL, Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective companies. Specifications and descriptions subject to change without notice. 04/10 SW 931