SlideShare a Scribd company logo
1 of 14
©British Telecommunicationsplc
TemplateVersion1.2
Future Cloud Action
Line
High Impact Initiative
©British Telecommunicationsplc
TemplateVersion1.2
BT Assure. Security that matters
Rob Rowlingson
Principal Security Researcher, BT Research & Technology
Contact: robert.rowlingson@bt.com
BT Cloud Enterprise Service Store
with Intelligent Protection
©British Telecommunicationsplc
TemplateVersion1.2
Motivation: CIO dilemma: cloud vs. visibility & control
You have to:
Protect IT assets against
cyber-threats
Account for security
incidents.
I worry about:
My privacy
Loss of my data
The integrity of transactions
Harmful cloud applications
Cloud is cheap – use it now!
Security is too expensive – find a way around it …
I guarantee the
infrastructure & platform
You protect your
applications and data
Every cloud journey is
a new security project
• Migration
assessment
• Risk Analysis
Architecture
• Integration costs
• Operational costsSecurity Consultant
Cybercrime thrives on application/data/
platform/infrastructure
security gaps
Confused
CIO
End-User
CFO
Cloud Provider
Cloud adoption will always be limited until the
application/data/infrastructure security & governance gap is filled
Cloud providers consider application & data protection to be beyond their concern
Complicated and expensive for users to protect assets on public or hybrid clouds
Cloud users have little visibility or control of how their assets are protected in the cloud
©British Telecommunicationsplc
TemplateVersion1.2
Why Work with BT?
• BT Cloud Compute
– Exposure via a global cloud service
– 16 platforms, 4 continents, 45 data centres
– 4 global customer service centre hubs and 22 satellite
centres
– operating 24/7 and serving businesses in 198 countries.
• HII Trusted Ecosystem Accelerator (3rd Party
Ecosystem)
• ‘Intelligent Protection’ for your Applications
• New market opportunities for Cloud services
• Close collaboration with BT Research and Innovation
©British Telecommunicationsplc
TemplateVersion1.2
Common Capabilities for Cloud Service Stores:
basic ecosystem definition
5
Cloud-based On-premise
Fully managed
Self-managed
Automatic Application Protection
6
• During Application Provisioning, Customers / Tenants:
• Purchase Intelligent Protection License for the required Security Modules
(Firewall, Anti-Malware, Intrusion Detection, Integrity Monitoring, Log Inspection)
• Select an Application from the Application Market Place.
• Automatically Protect deployed Application with selected Host Security Options.
Protected Application Provisioning
©British Telecommunicationsplc
Slide 7
Cloud portal
Intelligent Protection
Security Dashboard
Core strengths & innovative features
• In flight intrusion prevention, no down time
• Comprehensive security solution: Virtual firewall, IPS, Security Patch management, Anti-malware
• 360o Protection of customer applications
• Build for Cloud/VDC- hypervisor level security, more effective, easier to integrate into the cloud
• Supports physical servers & computers devices – agents can be deployed on physical or virtual hosts
BT Intelligent Protection
BT Intelligent Protection
High-Level Architecture
8
Automated Data Protection in the Cloud
IaaS/PaaS edition
9
Via the dashboard/portal, users can:
1. Attach, detach, encrypt or share encrypted data volumes, file-system directories
and data objects (e.g. files) with 3-clicks in <2min.
2. Define context (location/time/ownership/security-level)–based data access
3. Access a personalised secure key-store hosted by BT (on premise variants are
also available on request)
It is fully validated on BT Cloud and partly on 3rd parties (Amazon). Trials show
<10% overhead of encrypted storage operations,
<5% overhead to provisioning time of unprotected VMs
©British Telecommunicationsplc
TemplateVersion1.2
Overview of Trusted Cloud Digital Service Store:
indicative user journeys
General Use of
Digital Market
Place
Application Store Catalogue
Infrastructure Store Catalogue
STaaS Catalogue
On-board an Application
Design a new workload
Deploy an application
Infrastructure Use Deploy Apps in internal cloud (Cloud
Platform, OpenStack, etc.)
Deploy Apps in public cloud Amazon
EC2, Azure, BT Compute)
Use object storage (STaaS) and
Encryption as a Service
Use of “Horizontal”
Cloud/Cyber
Security Services
Application and Host protection: Protect applications in multiple clouds via
Intelligent Protection
Data protection (Encryption) as a Service: Encrypt files and virtual volumes in the
cloud
Email filtering as a Service: Email server purchased via the Appstore
External email server
Use in R&D, trials and production
• Exposure via a global
cloud service
• 16 platforms across 4
continents
• 45 data centres
• 4 global customer service
centre hubs and 22
satellite centres
• operating 24/7 and serving
businesses in 198
countries.
Incorporated into BT
Cloud Compute
release roadmap as
a value-add feature
• UK:
•London Borough of Camden
•Italy:
•City of Genoa
•Serbia:
•Strati-Grand, Belgrade
•Exposure to 2000 users of
public services
•Enable secure consumption of
public services across European
regions
Baseline technology
for governmental
cloud pilots
•Part of Trusted Cloud
Platform - EIT ICT Labs High
Impact Initiative
•To be exposed to UK SMEs for
as a co-innovation platform
by the ICT Catapult in the UK
•Platform of choice for future
research on cyber-security
attack analysis and
prevention by Imperial
College London – UK Global
Uncertainties programme
Baseline platform
for Trusted Cloud
innovation by SMEs
New customer experience
• Make security management integral part of cloud application assemblyFusion
• integrity &security functions become managed parameters
• while the form and coverage of the functions automatically adjust to user
selection.
Uniformity and
Customisation
• “click-to-buy” security services
• “click-to-build” secure applications in less than 5 clicks.
Automation
•automatic generation of recommended security policy
• based on vulnerability analysis of the application stack, cloud
characteristics, user preferences and desired business impact levels;
Versatility
•one cloud-based service securing applications and data on multiple
private and public cloud infrastructures and platformsUniversality
• Automatically generated customisable security dashboard per user
•Unifying view of the security state of user’s applications on any cloud
Visibility
• enables enforcing a common security policy to
•all instances of an application on multiple cloud environments.
Control
Simplified customer experience through a market place, and a service and security
management dashboard. Eliminates costs and risks of deployment, integration and
management of complex security software or appliances.
SummaryFusion
Make security
management integral
part of cloud data &
application assembly
Ubiquity
integrity &security
functions become
managed parameters
Automated
“click-to-buy” security services
“click-to-build” secure data &
applications in less than 5
clicks.
Versatile
automatic generation
of recommended
security policy
Universal
one service protecting
applications and data on
multiple clouds
VisibilityUnifying view of the
security state of user’s
applications on any cloud
Control
enables enforcing a common
enterprise security policy
across clouds
Exposure in production via a
global cloud service
(BT Cloud Compute)
Exposure to 2000
users of public services
UK Research & Development
Product Development
Core Service operations
“The benefit has been in convincing the
customer that Security is not just in our
DNA, it's something that they can embed in
their DNA with a single click!” David Cairns,
Principle Solutions Architect, BT Cloud Compute
BT Cloud Enterprise Service Store - Rob Rowlingson

More Related Content

What's hot

Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Vic Winkler
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesGokul Alex
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computingsaurabh soni
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 

What's hot (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 

Similar to BT Cloud Enterprise Service Store - Rob Rowlingson

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud ServicesJohn Rhoton
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use CasesJason Singh
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...Daniel Berg
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
The Canopy Cloud Vision
The Canopy Cloud VisionThe Canopy Cloud Vision
The Canopy Cloud VisionThomas Kunz
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Michael Elder
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupBitglass
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart CityFanky Christian
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsHaidee McMahon
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startupsSekhar Mohanty
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Raymond Gao
 

Similar to BT Cloud Enterprise Service Store - Rob Rowlingson (20)

Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
 
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
InterConnect 2015: 3045 Hybrid Cloud - How to get a return from an investment...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
The Canopy Cloud Vision
The Canopy Cloud VisionThe Canopy Cloud Vision
The Canopy Cloud Vision
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
Hybrid Cloud: How to Get a Return from an Investment Made Three Decades Ago (...
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Skip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized appsSkip the anxiety attack when building secure containerized apps
Skip the anxiety attack when building secure containerized apps
 
Building Cloud capability for startups
Building Cloud capability for startupsBuilding Cloud capability for startups
Building Cloud capability for startups
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)
 

More from Digital Catapult

LPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesLPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesDigital Catapult
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsDigital Catapult
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesDigital Catapult
 
LPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkLPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkDigital Catapult
 
Things Connected: Open Call
Things Connected: Open CallThings Connected: Open Call
Things Connected: Open CallDigital Catapult
 
Community-led IoT projects
Community-led IoT projectsCommunity-led IoT projects
Community-led IoT projectsDigital Catapult
 
Exploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techExploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techDigital Catapult
 
EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2Digital Catapult
 
Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Digital Catapult
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Digital Catapult
 
F-Interop Open Call: Webinar
F-Interop Open Call: WebinarF-Interop Open Call: Webinar
F-Interop Open Call: WebinarDigital Catapult
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
Data City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeData City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeDigital Catapult
 
Data City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXData City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXDigital Catapult
 
Data City | Data Nation Launch
Data City | Data Nation Launch Data City | Data Nation Launch
Data City | Data Nation Launch Digital Catapult
 
Startup Session: Hiring & Firing
Startup Session: Hiring & FiringStartup Session: Hiring & Firing
Startup Session: Hiring & FiringDigital Catapult
 

More from Digital Catapult (20)

LPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use CasesLPWAN London Meetup: LPWAN Use Cases
LPWAN London Meetup: LPWAN Use Cases
 
LPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT productsLPWAN London Meetup: Securing your IoT products
LPWAN London Meetup: Securing your IoT products
 
LPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban ChallengesLPWAN London Meetup: Solving Urban Challenges
LPWAN London Meetup: Solving Urban Challenges
 
LPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things TalkLPWAN London Meetup: All Things Talk
LPWAN London Meetup: All Things Talk
 
Things Connected: Open Call
Things Connected: Open CallThings Connected: Open Call
Things Connected: Open Call
 
Community-led IoT projects
Community-led IoT projectsCommunity-led IoT projects
Community-led IoT projects
 
Exploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-techExploring the potential for LPWAN for agri-tech
Exploring the potential for LPWAN for agri-tech
 
EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2EVRYTHNG - LPWAN Meetup #2
EVRYTHNG - LPWAN Meetup #2
 
OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2OpenTRV - LPWAN Meetup #2
OpenTRV - LPWAN Meetup #2
 
Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2Flood Network - LPWAN Meetup #2
Flood Network - LPWAN Meetup #2
 
Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1Arqiva - LPWAN Meetup #1
Arqiva - LPWAN Meetup #1
 
Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1Everynet - LPWAN Meetup #1
Everynet - LPWAN Meetup #1
 
LPWAN Meetup #1
LPWAN Meetup #1LPWAN Meetup #1
LPWAN Meetup #1
 
F-Interop Open Call: Webinar
F-Interop Open Call: WebinarF-Interop Open Call: Webinar
F-Interop Open Call: Webinar
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
F-interop Meetup
F-interop MeetupF-interop Meetup
F-interop Meetup
 
Data City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness ChallengeData City | Data Nation: Health & Wellness Challenge
Data City | Data Nation: Health & Wellness Challenge
 
Data City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEXData City | Data Nation Launch - DEX
Data City | Data Nation Launch - DEX
 
Data City | Data Nation Launch
Data City | Data Nation Launch Data City | Data Nation Launch
Data City | Data Nation Launch
 
Startup Session: Hiring & Firing
Startup Session: Hiring & FiringStartup Session: Hiring & Firing
Startup Session: Hiring & Firing
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

BT Cloud Enterprise Service Store - Rob Rowlingson

  • 2. ©British Telecommunicationsplc TemplateVersion1.2 BT Assure. Security that matters Rob Rowlingson Principal Security Researcher, BT Research & Technology Contact: robert.rowlingson@bt.com BT Cloud Enterprise Service Store with Intelligent Protection
  • 3. ©British Telecommunicationsplc TemplateVersion1.2 Motivation: CIO dilemma: cloud vs. visibility & control You have to: Protect IT assets against cyber-threats Account for security incidents. I worry about: My privacy Loss of my data The integrity of transactions Harmful cloud applications Cloud is cheap – use it now! Security is too expensive – find a way around it … I guarantee the infrastructure & platform You protect your applications and data Every cloud journey is a new security project • Migration assessment • Risk Analysis Architecture • Integration costs • Operational costsSecurity Consultant Cybercrime thrives on application/data/ platform/infrastructure security gaps Confused CIO End-User CFO Cloud Provider Cloud adoption will always be limited until the application/data/infrastructure security & governance gap is filled Cloud providers consider application & data protection to be beyond their concern Complicated and expensive for users to protect assets on public or hybrid clouds Cloud users have little visibility or control of how their assets are protected in the cloud
  • 4. ©British Telecommunicationsplc TemplateVersion1.2 Why Work with BT? • BT Cloud Compute – Exposure via a global cloud service – 16 platforms, 4 continents, 45 data centres – 4 global customer service centre hubs and 22 satellite centres – operating 24/7 and serving businesses in 198 countries. • HII Trusted Ecosystem Accelerator (3rd Party Ecosystem) • ‘Intelligent Protection’ for your Applications • New market opportunities for Cloud services • Close collaboration with BT Research and Innovation
  • 5. ©British Telecommunicationsplc TemplateVersion1.2 Common Capabilities for Cloud Service Stores: basic ecosystem definition 5 Cloud-based On-premise Fully managed Self-managed
  • 6. Automatic Application Protection 6 • During Application Provisioning, Customers / Tenants: • Purchase Intelligent Protection License for the required Security Modules (Firewall, Anti-Malware, Intrusion Detection, Integrity Monitoring, Log Inspection) • Select an Application from the Application Market Place. • Automatically Protect deployed Application with selected Host Security Options. Protected Application Provisioning
  • 7. ©British Telecommunicationsplc Slide 7 Cloud portal Intelligent Protection Security Dashboard Core strengths & innovative features • In flight intrusion prevention, no down time • Comprehensive security solution: Virtual firewall, IPS, Security Patch management, Anti-malware • 360o Protection of customer applications • Build for Cloud/VDC- hypervisor level security, more effective, easier to integrate into the cloud • Supports physical servers & computers devices – agents can be deployed on physical or virtual hosts BT Intelligent Protection
  • 9. Automated Data Protection in the Cloud IaaS/PaaS edition 9 Via the dashboard/portal, users can: 1. Attach, detach, encrypt or share encrypted data volumes, file-system directories and data objects (e.g. files) with 3-clicks in <2min. 2. Define context (location/time/ownership/security-level)–based data access 3. Access a personalised secure key-store hosted by BT (on premise variants are also available on request) It is fully validated on BT Cloud and partly on 3rd parties (Amazon). Trials show <10% overhead of encrypted storage operations, <5% overhead to provisioning time of unprotected VMs
  • 10. ©British Telecommunicationsplc TemplateVersion1.2 Overview of Trusted Cloud Digital Service Store: indicative user journeys General Use of Digital Market Place Application Store Catalogue Infrastructure Store Catalogue STaaS Catalogue On-board an Application Design a new workload Deploy an application Infrastructure Use Deploy Apps in internal cloud (Cloud Platform, OpenStack, etc.) Deploy Apps in public cloud Amazon EC2, Azure, BT Compute) Use object storage (STaaS) and Encryption as a Service Use of “Horizontal” Cloud/Cyber Security Services Application and Host protection: Protect applications in multiple clouds via Intelligent Protection Data protection (Encryption) as a Service: Encrypt files and virtual volumes in the cloud Email filtering as a Service: Email server purchased via the Appstore External email server
  • 11. Use in R&D, trials and production • Exposure via a global cloud service • 16 platforms across 4 continents • 45 data centres • 4 global customer service centre hubs and 22 satellite centres • operating 24/7 and serving businesses in 198 countries. Incorporated into BT Cloud Compute release roadmap as a value-add feature • UK: •London Borough of Camden •Italy: •City of Genoa •Serbia: •Strati-Grand, Belgrade •Exposure to 2000 users of public services •Enable secure consumption of public services across European regions Baseline technology for governmental cloud pilots •Part of Trusted Cloud Platform - EIT ICT Labs High Impact Initiative •To be exposed to UK SMEs for as a co-innovation platform by the ICT Catapult in the UK •Platform of choice for future research on cyber-security attack analysis and prevention by Imperial College London – UK Global Uncertainties programme Baseline platform for Trusted Cloud innovation by SMEs
  • 12. New customer experience • Make security management integral part of cloud application assemblyFusion • integrity &security functions become managed parameters • while the form and coverage of the functions automatically adjust to user selection. Uniformity and Customisation • “click-to-buy” security services • “click-to-build” secure applications in less than 5 clicks. Automation •automatic generation of recommended security policy • based on vulnerability analysis of the application stack, cloud characteristics, user preferences and desired business impact levels; Versatility •one cloud-based service securing applications and data on multiple private and public cloud infrastructures and platformsUniversality • Automatically generated customisable security dashboard per user •Unifying view of the security state of user’s applications on any cloud Visibility • enables enforcing a common security policy to •all instances of an application on multiple cloud environments. Control Simplified customer experience through a market place, and a service and security management dashboard. Eliminates costs and risks of deployment, integration and management of complex security software or appliances.
  • 13. SummaryFusion Make security management integral part of cloud data & application assembly Ubiquity integrity &security functions become managed parameters Automated “click-to-buy” security services “click-to-build” secure data & applications in less than 5 clicks. Versatile automatic generation of recommended security policy Universal one service protecting applications and data on multiple clouds VisibilityUnifying view of the security state of user’s applications on any cloud Control enables enforcing a common enterprise security policy across clouds Exposure in production via a global cloud service (BT Cloud Compute) Exposure to 2000 users of public services UK Research & Development Product Development Core Service operations “The benefit has been in convincing the customer that Security is not just in our DNA, it's something that they can embed in their DNA with a single click!” David Cairns, Principle Solutions Architect, BT Cloud Compute