Your SlideShare is downloading. ×
0
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security

489

Published on

HP Expert, Jan De Clercq, presentation deck from HP Discover 2012 Las Vegas “Making the right move at the intersection of cloud and security" …

HP Expert, Jan De Clercq, presentation deck from HP Discover 2012 Las Vegas “Making the right move at the intersection of cloud and security"

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
489
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • With the rise of cloud computing, security for cloud services is a broad and complex topic. In this session, we’ll examine use cases that help illustrate the best practices to protect your data and applications in the cloud. We’ll explore how to build security into apps that you plan to deploy in the cloud, how to ensure that cloud services used by your enterprise are indeed secure and how to implement policy-based and real-time cloud services monitoring. This panel session will include experts from both the enterprise and cloud service provider point of view.
  • (This is the “how”  services)This is a customer’s view in; the customer “estate”Every discipline is important, because they all have the potential to be weakest link. Pulling them into a conhesive and integrated strategy is not easy; few companies have the breadth and depth of expertiseHP’s Enterprise Services Security Framework delivers end-to-end security, cross-silo, cross-BU and disciplineHP long standing expertise across datacenters and lob security is unparralleled
  • (this is the “what” –SIRM)Security Intelligence and Risk Manageent Platfor (SIRM) is our secret sauceIntegrated technologies based on best-of-breed software solutions. HP IP crosses apps, network, data securityThis platform powers the framework. It makes it real and delivers the right integration to deliver a security intelligence in a business-prioritized service context This IP is also built into HP managed services
  • Transcript

    • 1. Moderators – Rebecca LawsonJune 2012© Copyright 2012 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice.
    • 2. Making the right move atthe intersection of cloudand securityModerators – Rebecca LawsonJune 2012© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 3. Agenda1. Opening remarks2. Panel introductions3. Q&A3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 4. See moreSee soonerAct sooner4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 5. PanelistsHP Security ExpertsJan de Clercq Christian VerstraeteHP Technology Services HP Cloud SolutionsSanjay Raja Rebecca LawsonHP Software HP Solution Marketing5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 6. A few questions What cloud use cases do you see being implemented most successful and/or predictably? What best practices can be applied to public cloud services that are already being used? What security and risk measures are most overlooked for private cloud infrastructure? What security and risk measures are most overlooked when consuming public cloud infrastructure? Public cloud business services? Describe a successful (and secure) deployement of public or private cloud services6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 7. Cloud components IT management framework SaaS PaaS IaaS Identity & access management Access Network devices Cloud platform Management services Demand Delivery Security & compliance Supply management7 7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 8. Access Private Hosted Public cloud Security requirements device cloud private cloud IaaS PaaS SaaS Human resources (security teams) Shared Application security Identity & access management Software licencing Audit & log management User Data encryption Host intrusion detection System monitoring Shared OS hardening Asset management Provider Network intrusion detection Network security Security policy Physical/environmental security8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 9. Enterprise Security Framework for end-to-endsecurity Governance, risk and compliance Identity and access management Security operations Data Cloud center Network Application End point security security security security security9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 10. Security intelligence and risk managementplatform Compliance Vulnerability Asset Risk and policy management profiling management HP EnterpriseView Security Network Application Threat intelligence security security research10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 11. Download now Get the Mobile App Download content from this session with the free mobile app. Text the word “Discover” to 474747 or m.hp.com/events11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 12. Find out more Attend these sessions Visit these demos After the event • BB2472 Operations panel, Security and Risk Management • Contact your sales rep Thurs June 7; 11:15-12:00 Zone • BB2055 Social engineering: • Information security • Visit the website The dark magic Thurs June www.hp.com/go/enterprisesecurity 7; 10:00-10:45 • Network security • BB2922 Applications security • Data security Thurs June 7; 1:30-2:15 • Secure boardroom Your feedback is important to us. Please take a few minutes to complete the session survey.12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 13. Thank you© Copyright 2012 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice.
    • 14. Backup slides© Copyright 2012 Hewlett-Packard Development Company, L.P.The information contained herein is subject to change without notice.

    ×