1CLOUD SECURITY:Secure Your Infrastructure
2Challenges to securityNIST, HIPAA,PCI-DSS, SOXATTACKERSHAVE EVOLVEDTECHNOLOGYARCHITECTUREHAS CHANGEDCONSUMERIZATION OF IT...
3Understanding the risksCLIENT ACCESSGrowing diversity ofclient access devicesincreases the risk ofillegitimate access byh...
4Protect yourselfCLIENT SECURITYHelp protect client data so onlyauthorized users can accessthe cloudTRUSTED COMPUTE POOLSB...
5Secure your clients Intel® Identity ProtectionTechnology (Intel IPT) —Hardware-based two-factorauthentication for client...
6It’s all about trustProtect your data and workloads by establishingtrusted compute pools using Intel® TrustedExecution Te...
7Application LayerSecurityIntel ExpresswayService Gateway.Software appliance thatacts as an API proxy wheresecurity policy...
8Move to the cloud with confidenceIntel hardware-based security helpsprotect your infrastructure so youcan feel more confi...
9We’ll help youget startedDOWNLOAD NOW!Download the Cloud Security Planning Guide anddiscover valuable information on how ...
Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or...
Upcoming SlideShare
Loading in...5
×

Cloud computing security infrastructure

88

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
88
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cloud computing security infrastructure

  1. 1. 1CLOUD SECURITY:Secure Your Infrastructure
  2. 2. 2Challenges to securityNIST, HIPAA,PCI-DSS, SOXATTACKERSHAVE EVOLVEDTECHNOLOGYARCHITECTUREHAS CHANGEDCONSUMERIZATION OF ITINCREASED REGULATIONSecurity challenges are growingmore complex.
  3. 3. 3Understanding the risksCLIENT ACCESSGrowing diversity ofclient access devicesincreases the risk ofillegitimate access byhackers or cyber-criminalsVIRTUALWORKLOADSSecuritymanagement toolsare challenged bydata centervirtualizationAPIsExpanded attacksurface created asapps are shared viaAPIs from cloudto mobile
  4. 4. 4Protect yourselfCLIENT SECURITYHelp protect client data so onlyauthorized users can accessthe cloudTRUSTED COMPUTE POOLSBuild trust and transparency incloud infrastructureAPPLICATION API CONTROLManage APIs at the networkedge where application servicesare consumed and exposed withpartners, devices, and developers
  5. 5. 5Secure your clients Intel® Identity ProtectionTechnology (Intel IPT) —Hardware-based two-factorauthentication for clientaccess McAfee Cloud IdentityManager — Federatedsingle sign-on to cloudapplications McAfee Deep Defender —Monitors and roots outmalware attacks below theoperating systemProtection by Intel and McAfee11 No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology-enabled system, including a 2nd gen Intel® Core™ processorenabled chipset, firmware and software, and participating website. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or anyresulting damages. For more information, visit ipt.intel.com.
  6. 6. 6It’s all about trustProtect your data and workloads by establishingtrusted compute pools using Intel® TrustedExecution Technology (Intel TXT).• Provide a foundation for trust in cloud infrastructureby measuring integrity of virtualized infrastructure• Protect data and workloads by deploying them ontrusted virtualized infrastructure• Create transparency to enable audit and governancein cloud deploymentsIntelTXTIt’s all about trustIntelTXT11 No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer with Intel® VirtualizationTechnology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXTalso requires the system to contain a TPM v1.s. For more information, visit intel.com/technology/security.
  7. 7. 7Application LayerSecurityIntel ExpresswayService Gateway.Software appliance thatacts as an API proxy wheresecurity policy is enforced,legacy applications & dataare orchestrated, andmobile APIs areexposed todevelopercommunities.
  8. 8. 8Move to the cloud with confidenceIntel hardware-based security helpsprotect your infrastructure so youcan feel more confident aboutmoving to the cloud. More secure client access Trusted compute pools API controls at the edge
  9. 9. 9We’ll help youget startedDOWNLOAD NOW!Download the Cloud Security Planning Guide anddiscover valuable information on how to protectYOUR data, from device to data center.It is no longer the case thatsecurity around the perimeter willhold. You have to assume thatcompromise is inevitable in anycompute model. In order tomanage the risk you have to setup a more granular trust model.http://www.intel.com/content/www/us/en/cloud-computing/cloud-security-checklist-planning-guide.htmlMalcolm HarkinsIntel Vice President of Information Technology Groupand Chief Information Security Officer
  10. 10. Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document.Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use ofIntel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products arenot intended for use in medical, life saving, or life sustaining applications. Intel may make changes to specifications and product descriptions at any time, without notice.Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×