SlideShare a Scribd company logo
1 of 11
© 2009 IBM Corporation 
Davide Sormani 
22 September 2014 
Security considerations 
on Hybrid Cloud
IBM Presentation Template Full Version 
Hybrid Cloud 
On Premise Off Premise 
And traditional IT 
Source: IBM corporation 
Security 
Performance 
Control 
Pay-per-use 
Elasticity 
Speed 
© 2014 2 IBM Corporation
Strategic Impact 
Shift IT expenditure model: 
from capital expenses to operating expenses 
Needs adressed 
Temporary capacity expansion 
Scale with demand 
Network optimization 
Development lifecycle 
© 2014 3 IBM Corporation
Market share and expectations 
IBM Microsoft HP Cisco Oracle Accenture VMware Dell Google 
20% 
15% 
10% 
5% 
0% 
61% 70% Of Hybrid cloud 
users by end of 
2014 
Source: Technology Business Research Inc.; 2014; IBM Center for applied insights 
Of customers 
will increase 
hybridization 
© 2014 4 IBM Corporation
Present Scenario 
Sensitive and mission-critical resources on a private 
cloud and easily accessible ones on public cloud 
Adopters 
 Manufacturing 33% 
 F&A 18% 
 Public 2% 
 Healthcare 4% 
 Retail 18% 
 Telco/Media 6% 
 Other 19% 
Source: Technology Business Research Inc., 2014 
Do not have 
cloud 
50% 
Not 
integrated 
adopter 
30% 
Integrated 
cloud 
adopter 
20% 
© 2014 5 IBM Corporation
Main challenge 
of respondant* claimed that 
data security concerns is 
the number one inhibitor for 
hybrid cloud 
50% 
* IDC 2013 Global Cloud Track survey 
Is it possible to get 
all the benefits of 
hybrid cloud and 
minimize tradeoffs? 
© 2014 6 IBM Corporation
Softlayer® Security Services 
Vulnerability scanning 
Antivirus and anti-spyware protection 
Host-based intrusion protection 
Firewall and network based threat protection (IPS, 
DDoS) 
Network Gateways 
Virtual Private Networking (VPN) 
SSL Certificates 
© 2014 7 IBM Corporation
New Security Agreement 
Softlayer® and Intel® 
Intel® TXT 
on bare metal servers 
Hardware monitoring and security at chip level 
Chain of trust: integrity from firmware, 
software and hypervisor 
Every component marked trust or untrust 
© 2014 8 IBM Corporation
How Intel® TXT meets the challenge 
Workloads on a Trusted Compute Platform 
Principal Buildings blocks: 
Trusted Platform Module (TPM) 
Root of trust 
Supported Intel® processor: 
Intel® Xeon® E5-2600 v2 
Intel® Xeon® E3-1200 v3 
Intel® Xeon® E5-4600 
© 2014 9 IBM Corporation
New Perspective 
Certify a cloud computing pool is appropriately 
secured for workloads 
Protection 
Visibility 
Control 
Trust 
 Governance and enterprise risk 
 Information and life-cycle 
management 
 Compliance and audit regulations 
 Application security 
 Identity and access 
management 
 Incident response 
© 2014 10 IBM Corporation
© 2014 11 IBM Corporation

More Related Content

What's hot

Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
chiportal
 

What's hot (19)

Gloo Shot - Service Mesh Enabled Chaos Engineering
Gloo Shot - Service Mesh Enabled Chaos EngineeringGloo Shot - Service Mesh Enabled Chaos Engineering
Gloo Shot - Service Mesh Enabled Chaos Engineering
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
ePlus Intelligent Branch
ePlus Intelligent BranchePlus Intelligent Branch
ePlus Intelligent Branch
 
Bluemix Overview & Demo
Bluemix Overview & DemoBluemix Overview & Demo
Bluemix Overview & Demo
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
Sophos Wireless Protection Overview
Sophos Wireless Protection OverviewSophos Wireless Protection Overview
Sophos Wireless Protection Overview
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 
Veritas Resiliency Platform
Veritas Resiliency PlatformVeritas Resiliency Platform
Veritas Resiliency Platform
 
The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4The introduction of nexaweb flatform v4
The introduction of nexaweb flatform v4
 
Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)Remote Working Webinar (Episode 4)
Remote Working Webinar (Episode 4)
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
1st Periodical Test
1st Periodical Test1st Periodical Test
1st Periodical Test
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
 

Similar to Security Considerations on Hybrid Cloud

Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
dakins090174
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
Glenn Ambler
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
 
Ibm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuageIbm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuage
IBM Switzerland
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
TheInevitableCloud
 

Similar to Security Considerations on Hybrid Cloud (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
IBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix MarketplaceIBM Softlayer Bluemix Marketplace
IBM Softlayer Bluemix Marketplace
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Transitioning to Hybrid Cloud
Transitioning to Hybrid CloudTransitioning to Hybrid Cloud
Transitioning to Hybrid Cloud
 
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Cisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - BerlinCisco Keynote at NetApp Insight - Berlin
Cisco Keynote at NetApp Insight - Berlin
 
MDM is not Enough - Parmelee
MDM is not Enough - Parmelee MDM is not Enough - Parmelee
MDM is not Enough - Parmelee
 
Cisco Keynote at NetApp Insight - Las Vegas
Cisco Keynote at NetApp Insight - Las VegasCisco Keynote at NetApp Insight - Las Vegas
Cisco Keynote at NetApp Insight - Las Vegas
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
Presentation World Hosting Days
Presentation World Hosting DaysPresentation World Hosting Days
Presentation World Hosting Days
 
Ibm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuageIbm bis 2014 o.bethmann le cloud juste un nuage
Ibm bis 2014 o.bethmann le cloud juste un nuage
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Security Considerations on Hybrid Cloud

  • 1. © 2009 IBM Corporation Davide Sormani 22 September 2014 Security considerations on Hybrid Cloud
  • 2. IBM Presentation Template Full Version Hybrid Cloud On Premise Off Premise And traditional IT Source: IBM corporation Security Performance Control Pay-per-use Elasticity Speed © 2014 2 IBM Corporation
  • 3. Strategic Impact Shift IT expenditure model: from capital expenses to operating expenses Needs adressed Temporary capacity expansion Scale with demand Network optimization Development lifecycle © 2014 3 IBM Corporation
  • 4. Market share and expectations IBM Microsoft HP Cisco Oracle Accenture VMware Dell Google 20% 15% 10% 5% 0% 61% 70% Of Hybrid cloud users by end of 2014 Source: Technology Business Research Inc.; 2014; IBM Center for applied insights Of customers will increase hybridization © 2014 4 IBM Corporation
  • 5. Present Scenario Sensitive and mission-critical resources on a private cloud and easily accessible ones on public cloud Adopters  Manufacturing 33%  F&A 18%  Public 2%  Healthcare 4%  Retail 18%  Telco/Media 6%  Other 19% Source: Technology Business Research Inc., 2014 Do not have cloud 50% Not integrated adopter 30% Integrated cloud adopter 20% © 2014 5 IBM Corporation
  • 6. Main challenge of respondant* claimed that data security concerns is the number one inhibitor for hybrid cloud 50% * IDC 2013 Global Cloud Track survey Is it possible to get all the benefits of hybrid cloud and minimize tradeoffs? © 2014 6 IBM Corporation
  • 7. Softlayer® Security Services Vulnerability scanning Antivirus and anti-spyware protection Host-based intrusion protection Firewall and network based threat protection (IPS, DDoS) Network Gateways Virtual Private Networking (VPN) SSL Certificates © 2014 7 IBM Corporation
  • 8. New Security Agreement Softlayer® and Intel® Intel® TXT on bare metal servers Hardware monitoring and security at chip level Chain of trust: integrity from firmware, software and hypervisor Every component marked trust or untrust © 2014 8 IBM Corporation
  • 9. How Intel® TXT meets the challenge Workloads on a Trusted Compute Platform Principal Buildings blocks: Trusted Platform Module (TPM) Root of trust Supported Intel® processor: Intel® Xeon® E5-2600 v2 Intel® Xeon® E3-1200 v3 Intel® Xeon® E5-4600 © 2014 9 IBM Corporation
  • 10. New Perspective Certify a cloud computing pool is appropriately secured for workloads Protection Visibility Control Trust  Governance and enterprise risk  Information and life-cycle management  Compliance and audit regulations  Application security  Identity and access management  Incident response © 2014 10 IBM Corporation
  • 11. © 2014 11 IBM Corporation