A strategic approach to Cloud Security to accelerate Cloud Adoption

1,177 views

Published on

32nd Asia Pacific Advanced Network (APAN) chapter was their first ever meeting in South Asia. Cisco leveraged this opportunity to sponsor and participate in this 5-day event hosted by ERNET India. The event consisted of of tutorials, technical presentations and demonstrations covering advanced network technologies.
Anil Nileshwar paper on Cloud Security received an overwhelming response

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,177
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
45
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

A strategic approach to Cloud Security to accelerate Cloud Adoption

  1. 1. A Strategic Approach to Cloud Security Anil Nileshwar Director – Network and Data Center ServicesCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  2. 2. Cisco FY11 revenues: $43.2 Bn Leader in Infrastructure Solutions, Architectures Networking, Data Center, Virtualization, Cloud, Collaboration, Video Wide geographic presence Highly virtualized infrastructure, Cloud ready Very progressive internal IT and Security teamsCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  3. 3. Cloud – where is it? “…significant increase in customers interest in cloud computing between 2009 and 2010-most of respondents indicated interest in 2010, up from only 10% in 2009” - Infonetics “Security is one of the top barriers to cloud computing.” Forrester Employees will find a way to use new technologies! © 2006 Cisco Systems, Inc. All rights reserved.© 2007 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  4. 4. Cloud Security – the lighter side! No Brakes!CyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 4
  5. 5. Evolving Enterprise Architecture Landscape Collaborative Platforms Any Device Wave 1 ,2 ,3 Perimeter Management WebEx & Connect (Collaboration) Scenarios Any Device Customers, Scenarios Channels & Manufacturing Development Partners on VDI * Salesforce.com (Cloud/Any Device) (Cloud – SaaS) Multi-tenancy, Policy & Regulatory Compliance (Cloud/Collaboration) External/ Hybrid Cloud Internal Private Cloud Development Partners on VDI * (Cloud/Any Device) Social Networking/ External Storage Borderless (Cloud/Collaboration) Access CITEIS Users Scenarios (Cloud)CyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  6. 6. Cloud – Levels of Impact “Trusted” Internal DMZ Externalizing Trend Services Externalized - Collaboration & Client Interaction Service Service - SaaS/XaaS/PaaS Opportunities Dependencies Internal Service Data - Data Mgmt/Monitoring/Forensics - Increasing Export of Corporate IP Critical Exported IP Data Users ”Unknown” Corp User User - External Personas of Internal Users - Varying AuthC/Z Capabilities “Non-Corp” Users Assets - “Any Device” w/ External Services Personal Mobile - Increasingly “Untrusted” Clients “Unknown” Laptop “Unknown” Corporate Mobile/PC Mobile/PC We Need to Fundamentally Rethink Elements of Service Delivery & Security ModelsCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  7. 7. Common Security Concerns  Increasing attack surface  Multi-tenancy/ Shared environments  Ownership and responsibilities … Need a strategic and architectural approach to Cloud SecurityCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  8. 8. Architecture – Some Considerations  Logical separation  Automation  Scalability and performance  Policy consistency  Authentication and access control These areas are the focus of a lot of innovation todayCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  9. 9. Cisco SecureX Context Aware Security Framework  Secure Cloud Infrastructure • Adaptive Security Appliance • Nexus Virtual Switch • Virtual Security Gateway  Cloud Security Services • ScanSafe Web Security and Web Filtering • IronPort Cloud, Managed, and Hybrid Email Security • Registered Envelope Service for Email Encryption • Security Intelligence Operations  Secure Cloud AccessCyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  10. 10. Cloud Security – Conclusion Summary: Embrace and Adapt, Do not wait!CyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  11. 11. CyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  12. 12. Next Steps For Cloud Computing Share your IT priorities  Visit Cisco booth and tick-your priorities in our feedback form Contact Cisco rep- Vinod Patani – vipatani@cisco.com ; 9899105886 Anil Nileshwar , anilesh@cisco.com© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  13. 13. Q&ACyberSpace 2009 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13

×