SlideShare a Scribd company logo
1 of 24
Download to read offline
Technology Evaluation Centers
Does the security of your business data
keep you up at night? Rest easy in the
cloud
Jorge García, Principal Analyst
www.technologyevaluation.com
Manufacturing Business Technology, January 2016
About Security
Technology Evaluation Centers
“Distrust and caution are the
parents of security.”
—Benjamin Franklin
Benjamin Franklin. (Courtesy of the U.S Library of
Congress)
A Very Brief Intro
Manufacturers are under constant
pressure to:
• Increase data/information
accuracy
• Increase production/business
process speed
• Capitalize this internal
intelligence and knowledge to
increase productivity of the
complete manufacturing process
• Make every supplier, distributor,
and service interaction optimal
Technology Evaluation Centers
Down in the Factory, Mike Knlec
Licensed under Creative Commons
A Very Brief Intro
Implementing cloud-based strategies can give manufacturing
companies a way to ease these pressures by enabling access to
systems that are faster to deploy, easier to customize, and, for the
short term, come at a lower cost.
Technology Evaluation Centers
The Value of the Cloud
Technology Evaluation Centers
“If you think you’ve seen this movie before, you are right. Cloud computing is
based on the time-sharing model we leveraged years ago before we could afford
our own computers…
…The idea is to share computing power among many companies and people,
thereby reducing the cost of that computing power to those who leverage it. The
value of time share and the core value of cloud computing are pretty much the
same, only the resources these days are much better and more cost effective.”
– David Linthicum, Cloud Computing speaker and influencer
Cloud Is a Real Trend
Technology Evaluation Centers
• The majority of manufacturers worldwide are currently using public (66%) or
private cloud (68%) for more than two applications.
• 61.6% indicated their company's posture for net new IT services is "cloud
also", and the number is only slightly lower for replacing IT existing
functionality (56.8%).
• IT operations are the primary benefactor today from manufacturers' cloud
strategy, and only 30–35% of respondents indicate operations, supply chain
and logistics, sales, or engineering expect to benefit.
• Cloud services and cloud architecture's share of the annual IT budget
allocation is going to increase 27% in the next two years for manufacturing.
• Cloud computing will become the de facto standard for new operations
(through organic or acquired growth) over the next 10 years for manufacturers
that want to operate and serve customers globally.
IDC study: Worldwide Cloud Adoption in the Manufacturing Industry, 2015
Why the Cloud?
Manufacturers are using the cloud for:
• Deploying cloud-based and two-tier ERP strategies
• Accelerating new product development and production
• Optimizing marketing automation applications
• Integrating and designing connected and embedded services
• Developing and launching supplier, customer, and collaboration portals
• Automating customer service and support
• Deploying cloud-based human resource management (HRM) systems
• Deploying and applying company-wide business intelligence and analytics
initiatives
Technology Evaluation Centers
Main Benefits and Concerns
Technology Evaluation Centers
Benefits Concerns
Cost Savings Cloud Security
Reduced Implementation Time Location of Data
Dynamic Scalability Shared Data Services
Security: On-premises vs Cloud
Technology Evaluation Centers
“ According to 53 percent of our survey respondents, data loss and privacy
risks are the most significant challenges of doing business in the cloud,
followed by intellectual property theft, which was cited as challenging or
extremely challenging. ”
Elevating Business in the Cloud Report, KPMG, 2014
Security: On-premises vs Cloud
Technology Evaluation Centers
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Many factors have to do with security:
• The typical size of a customer/user in each
environment
• The types of workloads found in each
environment
• The diversity of each environment
• The presence of user end-points in the on-
premises environments
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
“Individual customer
environments skew to a smaller
and simpler footprint as measured
by a number of nodes and
applications, and breadth of
operating systems.
In contrast, on-premises
environments managed by the
typical enterprise span a much
broader array of endpoints,
applications and operating
systems.”
Removing the Cloud of Insecurity
Alert Logic
Security: On-premises vs Cloud
Technology Evaluation Centers
Alert Logic Cloud Security Report,. Spring-2012.
Service provider environments tend to experience a narrower range of attack vectors.
“It’s not that the cloud is inherently secure or insecure. It’s really about the quality
of management applied to any IT environment.”
Removing the Cloud of Insecurity, Alert Logic
• More standardized system
configurations
• Narrower range of use cases among
service provider customers
• Relative maturity of the IaaS industry.
Security: On-premises vs Cloud
Technology Evaluation Centers
Myth Reality
On-premises infrastructures are more
secure because they reside on-site
Most breaches are inside jobs, and a
cloud system can actually offer greater
protection from inside and outside
threats
Servers that are physically accessible are
better protected from viruses
Cloud providers can deploy a fully tested
virus response for all customers rapidly
and efficiently, without your IT staff’s
help
On-premises data centers are more
reliable, as we can solve all issues
internally
Cloud data centers are better equipped to
guarantee continuous operation, and
experience fewer service disruptions
On-premises data centers are more
reliable when it comes to data storage and
backup
Cloud data centers are better equipped to
guarantee data storage and backup of
critical information
Security: On-premises vs Cloud
Technology Evaluation Centers
Additional security advantages of the
cloud:
• Embedded multifactor authentication
• Automated/scheduled security
patching
• Stronger physical security
• Security certifications
• The cloud offers economies of scale
Looking for Balance
Technology Evaluation Centers
“ According to 53% of our survey
respondents, data loss and privacy
risks are the most significant
challenges of doing business in the
cloud, followed by intellectual
property theft, which was cited as
challenging or extremely challenging.”
“Executives feel implementing the
cloud has helped them improve:
• Business performance (73%)
• Improve levels of service
automation (72%)
• Reduce costs (70%)
• Rapidly deploy new solutions
(67%)
Source: Elevating Business in the Cloud Report, KPMG
Cloud adoption is a balancing act:
Cloud Security: Options and Variety
Technology Evaluation Centers
Cloud Security: Options and Variety
Technology Evaluation Centers
Image Source: https://www.simple-talk.com/cloud/development/a-comprehensive-introduction-to-cloud-computing/
- Management
- Cost
- IT Involvement
Cloud Security: A Call to Action
Technology Evaluation Centers
Secure cloud adoption?
A high-level roadmap to implement security best practices consists
of the following phases:
Conduct a full
risk assessment
Secure your
own
information
and identities
Implement a
strong
governance
framework
Before contracting with a cloud provider
Technology Evaluation Centers
Full risk assessment
• Interoperability and portability
• Compliance
• Vendor risk
• Supply chain and ecosystem
• Infrastructure and operations quality
Securing your own
information
• Authentication
• Encryption
• Endpoint security
Implement a strong
governance
framework
• Ensure your provider uses secure data and event
management strategies
• Monitor your own log files for devices you control
• Stipulate in your contracts that SLAs are paired with your
defined metrics and standards
• Centralize within your organization responsibility for
selecting and working with cloud providers
• Plan contingencies for what happens when a breach occurs
or a provider fails.
• Use the Security Content Automation Protocols to verify
that your providers are using the secure configurations you
defined in your risk assessment
Cloud Security: A Call to Action
Technology Evaluation Centers
Technology Evaluation Centers
Thank you!
jgarcia@tec-centers.com
@jgptec
Why the Cloud?
Technology Evaluation Centers
Credits and Links:
• The U.S Library of Congress, http://www.loc.gov/
• Image: Down in the Factory, Mike Knlec. https://goo.gl/6JXLZm licensed under Creative Commons,
https://creativecommons.org/licenses/by/2.0/
• Alert Logic Cloud Security Report, Spring 2012 https://www.rackspace.com/knowledge_center/whitepaper/alert-logic-state-of-
cloud-security-report-spring-2012
• A comprehensive Introduction to Cloud Computing, https://www.simple-talk.com/cloud/development/a-comprehensive-
introduction-to-cloud-computing/
• KPMG, Cloud Survey Report, Elevating Business in the Cloud Report, 2014.
http://www.kpmg.com/US/en/about/alliances/Documents/2014-kpmg-cloud-survey-report.pdf
• TEC 2015 Cloud BI and Analytics Buyer's Guide, http://www.technologyevaluation.com/research/TEC-buyers-guide/TEC-
2015-Cloud-BI-and-Analytics-Buyer-s-Guide.html
• IDC study, Worldwide Cloud Adoption in the Manufacturing Industry, 2015,
https://www.idc.com/getdoc.jsp?containerId=prUS25558515

More Related Content

What's hot

Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
Andrew White
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

What's hot (20)

Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Lorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computingLorraine Morgan: Factors affecting the adoption of cloud computing
Lorraine Morgan: Factors affecting the adoption of cloud computing
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Cloud computing adoption in sap technologies
Cloud computing adoption in sap technologiesCloud computing adoption in sap technologies
Cloud computing adoption in sap technologies
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Optimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAMOptimizing Identity Governance using Perseus IAM
Optimizing Identity Governance using Perseus IAM
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
CCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overviewCCSK Certificate of Cloud Computing Knowledge - overview
CCSK Certificate of Cloud Computing Knowledge - overview
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 

Similar to MBT Webinar: Does the security of your business data keep you up at night?

Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
LA_IBM_Cloud_Event
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
Vincent Kwon
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 

Similar to MBT Webinar: Does the security of your business data keep you up at night? (20)

How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Cloud Computing Gets Put to the Test
Cloud Computing Gets Put to the TestCloud Computing Gets Put to the Test
Cloud Computing Gets Put to the Test
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Cloud webinar final
Cloud webinar finalCloud webinar final
Cloud webinar final
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final(Dee fleming) Ccloud computing_la_press_final
(Dee fleming) Ccloud computing_la_press_final
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

MBT Webinar: Does the security of your business data keep you up at night?

  • 1. Technology Evaluation Centers Does the security of your business data keep you up at night? Rest easy in the cloud Jorge García, Principal Analyst www.technologyevaluation.com Manufacturing Business Technology, January 2016
  • 2. About Security Technology Evaluation Centers “Distrust and caution are the parents of security.” —Benjamin Franklin Benjamin Franklin. (Courtesy of the U.S Library of Congress)
  • 3. A Very Brief Intro Manufacturers are under constant pressure to: • Increase data/information accuracy • Increase production/business process speed • Capitalize this internal intelligence and knowledge to increase productivity of the complete manufacturing process • Make every supplier, distributor, and service interaction optimal Technology Evaluation Centers Down in the Factory, Mike Knlec Licensed under Creative Commons
  • 4. A Very Brief Intro Implementing cloud-based strategies can give manufacturing companies a way to ease these pressures by enabling access to systems that are faster to deploy, easier to customize, and, for the short term, come at a lower cost. Technology Evaluation Centers
  • 5. The Value of the Cloud Technology Evaluation Centers “If you think you’ve seen this movie before, you are right. Cloud computing is based on the time-sharing model we leveraged years ago before we could afford our own computers… …The idea is to share computing power among many companies and people, thereby reducing the cost of that computing power to those who leverage it. The value of time share and the core value of cloud computing are pretty much the same, only the resources these days are much better and more cost effective.” – David Linthicum, Cloud Computing speaker and influencer
  • 6. Cloud Is a Real Trend Technology Evaluation Centers • The majority of manufacturers worldwide are currently using public (66%) or private cloud (68%) for more than two applications. • 61.6% indicated their company's posture for net new IT services is "cloud also", and the number is only slightly lower for replacing IT existing functionality (56.8%). • IT operations are the primary benefactor today from manufacturers' cloud strategy, and only 30–35% of respondents indicate operations, supply chain and logistics, sales, or engineering expect to benefit. • Cloud services and cloud architecture's share of the annual IT budget allocation is going to increase 27% in the next two years for manufacturing. • Cloud computing will become the de facto standard for new operations (through organic or acquired growth) over the next 10 years for manufacturers that want to operate and serve customers globally. IDC study: Worldwide Cloud Adoption in the Manufacturing Industry, 2015
  • 7. Why the Cloud? Manufacturers are using the cloud for: • Deploying cloud-based and two-tier ERP strategies • Accelerating new product development and production • Optimizing marketing automation applications • Integrating and designing connected and embedded services • Developing and launching supplier, customer, and collaboration portals • Automating customer service and support • Deploying cloud-based human resource management (HRM) systems • Deploying and applying company-wide business intelligence and analytics initiatives Technology Evaluation Centers
  • 8. Main Benefits and Concerns Technology Evaluation Centers Benefits Concerns Cost Savings Cloud Security Reduced Implementation Time Location of Data Dynamic Scalability Shared Data Services
  • 9. Security: On-premises vs Cloud Technology Evaluation Centers “ According to 53 percent of our survey respondents, data loss and privacy risks are the most significant challenges of doing business in the cloud, followed by intellectual property theft, which was cited as challenging or extremely challenging. ” Elevating Business in the Cloud Report, KPMG, 2014
  • 10. Security: On-premises vs Cloud Technology Evaluation Centers
  • 11. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012.
  • 12. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. Many factors have to do with security: • The typical size of a customer/user in each environment • The types of workloads found in each environment • The diversity of each environment • The presence of user end-points in the on- premises environments
  • 13. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. “Individual customer environments skew to a smaller and simpler footprint as measured by a number of nodes and applications, and breadth of operating systems. In contrast, on-premises environments managed by the typical enterprise span a much broader array of endpoints, applications and operating systems.” Removing the Cloud of Insecurity Alert Logic
  • 14. Security: On-premises vs Cloud Technology Evaluation Centers Alert Logic Cloud Security Report,. Spring-2012. Service provider environments tend to experience a narrower range of attack vectors. “It’s not that the cloud is inherently secure or insecure. It’s really about the quality of management applied to any IT environment.” Removing the Cloud of Insecurity, Alert Logic • More standardized system configurations • Narrower range of use cases among service provider customers • Relative maturity of the IaaS industry.
  • 15. Security: On-premises vs Cloud Technology Evaluation Centers Myth Reality On-premises infrastructures are more secure because they reside on-site Most breaches are inside jobs, and a cloud system can actually offer greater protection from inside and outside threats Servers that are physically accessible are better protected from viruses Cloud providers can deploy a fully tested virus response for all customers rapidly and efficiently, without your IT staff’s help On-premises data centers are more reliable, as we can solve all issues internally Cloud data centers are better equipped to guarantee continuous operation, and experience fewer service disruptions On-premises data centers are more reliable when it comes to data storage and backup Cloud data centers are better equipped to guarantee data storage and backup of critical information
  • 16. Security: On-premises vs Cloud Technology Evaluation Centers Additional security advantages of the cloud: • Embedded multifactor authentication • Automated/scheduled security patching • Stronger physical security • Security certifications • The cloud offers economies of scale
  • 17. Looking for Balance Technology Evaluation Centers “ According to 53% of our survey respondents, data loss and privacy risks are the most significant challenges of doing business in the cloud, followed by intellectual property theft, which was cited as challenging or extremely challenging.” “Executives feel implementing the cloud has helped them improve: • Business performance (73%) • Improve levels of service automation (72%) • Reduce costs (70%) • Rapidly deploy new solutions (67%) Source: Elevating Business in the Cloud Report, KPMG Cloud adoption is a balancing act:
  • 18. Cloud Security: Options and Variety Technology Evaluation Centers
  • 19. Cloud Security: Options and Variety Technology Evaluation Centers Image Source: https://www.simple-talk.com/cloud/development/a-comprehensive-introduction-to-cloud-computing/ - Management - Cost - IT Involvement
  • 20. Cloud Security: A Call to Action Technology Evaluation Centers Secure cloud adoption? A high-level roadmap to implement security best practices consists of the following phases: Conduct a full risk assessment Secure your own information and identities Implement a strong governance framework
  • 21. Before contracting with a cloud provider Technology Evaluation Centers Full risk assessment • Interoperability and portability • Compliance • Vendor risk • Supply chain and ecosystem • Infrastructure and operations quality Securing your own information • Authentication • Encryption • Endpoint security Implement a strong governance framework • Ensure your provider uses secure data and event management strategies • Monitor your own log files for devices you control • Stipulate in your contracts that SLAs are paired with your defined metrics and standards • Centralize within your organization responsibility for selecting and working with cloud providers • Plan contingencies for what happens when a breach occurs or a provider fails. • Use the Security Content Automation Protocols to verify that your providers are using the secure configurations you defined in your risk assessment
  • 22. Cloud Security: A Call to Action Technology Evaluation Centers
  • 23. Technology Evaluation Centers Thank you! jgarcia@tec-centers.com @jgptec
  • 24. Why the Cloud? Technology Evaluation Centers Credits and Links: • The U.S Library of Congress, http://www.loc.gov/ • Image: Down in the Factory, Mike Knlec. https://goo.gl/6JXLZm licensed under Creative Commons, https://creativecommons.org/licenses/by/2.0/ • Alert Logic Cloud Security Report, Spring 2012 https://www.rackspace.com/knowledge_center/whitepaper/alert-logic-state-of- cloud-security-report-spring-2012 • A comprehensive Introduction to Cloud Computing, https://www.simple-talk.com/cloud/development/a-comprehensive- introduction-to-cloud-computing/ • KPMG, Cloud Survey Report, Elevating Business in the Cloud Report, 2014. http://www.kpmg.com/US/en/about/alliances/Documents/2014-kpmg-cloud-survey-report.pdf • TEC 2015 Cloud BI and Analytics Buyer's Guide, http://www.technologyevaluation.com/research/TEC-buyers-guide/TEC- 2015-Cloud-BI-and-Analytics-Buyer-s-Guide.html • IDC study, Worldwide Cloud Adoption in the Manufacturing Industry, 2015, https://www.idc.com/getdoc.jsp?containerId=prUS25558515