IBM Cloud provides security across its infrastructure, platform, and software services. It addresses key cloud security challenges by taking a holistic approach to manage access, protect data, and gain visibility. IBM Cloud has over 40 global data centers connected by a secure, high-speed network to provide elastic, fast, and self-service cloud resources across North America, Europe, and Asia Pacific regions.
2. Cloud computing is hot and growing fast
What organizations like about
cloud computing:
Elastic capacity
– Resource can be elastically provisioned
to quickly scale out and rapidly released
to quickly scale in
Fast provisioning
– Automated provisioning /
deprovisioning of resources as needed
Self-service requests
– User request services via a web portal
Low cost, pay-as-you-go
– Users pay for what they use
3. Cloud Delivery Models
Bluemix
Infrastructure Services (IaaS) Development Services (PaaS) Business Applications (SaaS)
Securing infrastructure and workloads Secure service composition and apps Secure usage of business applications
4. What are the security challenges
cloud introduces?
6. Manage Access
Safeguard people, applications and
devices
Protect Data
Identify vulnerabilities and prevent
attacks
Gain Visibility
Monitor the cloud for security
breaches
SaaSPaaSIaaS
Unrestricted Access to
Cloud Services
Data and Applications
Outside Your Control
Damaging Security
Breaches
Securing cloud needs holistic approach to manage access,
protect data and gain visibility
7.
8. Expansive network of IBM Cloud data centers
European RegionsNorth America Regions Asia Pacific Regions
•
•
•
•
•
United Kingdom
Netherlands
Germany
France
Italy
•
•
•
•
•
US East
US Central
US West
Canada
Mexico
•
•
•
•
•
Japan
Australia
Singapore
Hong Kong
India
Over 40 global cloud centers
Open, secure, and scalable
Secure, high-speed network
Expert services and tools
Secure integration to on-premise
Application security measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance or database of the application.
refers to a methodology of protecting the corporate network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connecting to the network creates a potential entry point for security threats.
dentity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user rights and restrictions with the established identity.
SoftLayer Technologies, Inc. is a dedicated server, managed hosting and cloud computing provider. Founded in 2005, it was acquired by IBM in 2013.
Born on the web – Whatsapp, Tumblr, fitbit, Next Gen – Mongo DB, Cloudant, Cloudera, Moving to the cloud – Samsung, Citrix, SAP