SlideShare a Scribd company logo
1 of 15
Biometrics in the Cloud
Remote Capture, Storage, and Authentication
OUR TEAM
•Alex Wolowiecki
•Torrey Hutchison
SEMESTER GOALS
•Obtain AWS Associate
Solutions Architect Certification
•Utilize the cloud to conduct
performance tests for biometric
authentication in an enterprise
environment
•Determine cloud biometrics
“best practices” for each
enterprise persona
Key Takeaway: Gain proficient knowledge about cloud
providers and define an ideal cloud biometric model
Office
• Company-
owned
workstation
• Company-
defined
group policy
BYOD
• More
flexibility,
harder to
manage
• MDM
software and
robust usage
policy
required
Multi-User
• Shared,
managed
computing
resources
• Concurrent
profiles
require
varying
permissions
Remote
• Company-
owned or
personal
device
• Data and
resources
accessed via
VPN
ENTERPRISE PERSONAS
Key Takeaway: Each persona has strengths and
vulnerabilities, requires unique authentication process
GAPS AND CHALLENGES
Privacy
• User’s
biometrics
are sensitive
• Increased risk
of data
compromise
Performance
• Increased
latency
• Higher
dependency
on reliable
infrastructure
Integration
• BYOD
management
• Legacy
support of
devices
without
native
biometric
inputs
Key Takeaway: Cloud biometrics may increase risk of
data compromise, integrating non-company devices
creates inconsistencies
KEY RESEARCH FINDINGS
• Enterprise biometric security via IaaS
• Enroll and store user templates in remote containers
• Access and process templates for authentication via virtualized
compute resources
Taken from: http://media.amazonwebservices.com/architecturecenter/AWS_ac_ra_largescale_05.pdf
KEY RESEARCH FINDINGS
•Solutions Architect certification provides in-depth
knowledge for provisioning, deploying, and
maintaining an enterprise biometric security system
in the AWS cloud
•Pricing – Financial feasibility of implementing
cloud-based biometric solutions
•Performance metrics – Quantify benefits of
implementing cloud-based biometric solutions
NEXT STEPS
Performance
Tests
• Test performance of biometric authentication for each of the enterprise personas
• Tests will include multiple modalities, devices, and use cases that reflect
enterprise employee needs
Analyze
Results
• Determine whether cloud-based biometrics affects FAR, FRR, EER
• Compare speed and accuracy of authentications vs. the performance of local
compute systems
Identify Best
Practices
• Identify ideal architecture and modalities required for each enterprise persona
• Begin to consider broader-scale implementation details going forward
SUMMARY
•Cloud-base biometric authentication has the
potential to increase enterprise security and
promote cross-platform compatibility
•IaaS is my recommendation for enterprise
biometric systems
•Further testing is required to develop a set of
guidelines for each enterprise persona
Appendix
CLOUD COMPUTING SERVICE MODELS
SaaS
•Applications
hosted on 3rd
party servers
•Accessed and
maintained
remotely
IaaS
• Remote
datacenter
infrastructure
• Lease computer,
storage, and
network
resources
PaaS
• Scalable
environment for
businesses to
create apps
• Helps migrate
apps to hybrid IT
models
AWS MAJOR COMPONENTS
•Simple Storage Service (S3)
•Elastic Compute Cloud (EC2) resources
•Managed relational database integration (RDB)
•Identity Access Management (IAM) Directory tools
•Route 53 – Scalable Domain Name System (DNS)
AWS PERFORMANCE STATS
•S3 – up to 5TB file sizes, 99.99% availability,
99.999999999% durability
•Elastic Block Storage (EBS) – Up to 10,000
IOPS on a provisioned SSD
•Elastic File System – Scales up to Petabyte
magnitude
•11 global regions, 52 edge locations
AWS ENCRYPTION TECHNIQUES
•Data in Transit – Hypertext Transfer Protocol
(HTTPS) via Secure Sockets Layer (SSL) and
Transport Layer Security (TLS).
•Data at Rest – Server side encryption via S3
managed keys, AWS key management
service, and customer provided keys. Client
side encryption is also permitted.
REFERENCES
• https://aws.amazon.com/
• https://acloud.guru/course/aws-certified-solutions-architect-
associate/dashboard
• http://enterprise.microsoft.com/en-us/industries/government/
• https://www.mulesoft.com/resources/cloudhub/iaas-infrastructure-as-a-
service
• https://www.salesforce.com/paas/overview/
• https://azure.microsoft.com/en-us/documentation/articles/storage-
introduction/
• http://media.amazonwebservices.com/architecturecenter/AWS_ac_ra_lar
gescale_05.pdf

More Related Content

What's hot

Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...AFAS Software
 
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...AFAS Software
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - Estonia
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - EstoniaContinuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - Estonia
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - EstoniaSolidify
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanNCCOMMS
 
Windowsazureplatform Overviewlatest
Windowsazureplatform OverviewlatestWindowsazureplatform Overviewlatest
Windowsazureplatform Overviewlatestrajramab
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be PreparedAlan Eardley
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual MachinesCarlos Paez
 
Microsoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessMicrosoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessVinh Nguyen Quang
 
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Nordic Infrastructure Conference
 
Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101Balabiju
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for HybridAdam Levithan
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsPrime Infoserv
 
Microsoft Azure in 5 minutes
Microsoft Azure in 5 minutesMicrosoft Azure in 5 minutes
Microsoft Azure in 5 minutesBrian Blanchard
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackAymen Mami
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSMorgan Simonsen
 

What's hot (20)

Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
 
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...
Pieter de Bruin (Microsoft) - Welke technologie gebruiken bij implementatie M...
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - Estonia
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - EstoniaContinuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - Estonia
Continuous delivery using Azure and VSTS, Global Azure BootCamp 2017 - Estonia
 
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa ToromanO365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
O365Con18 - Red Team vs Blue Team - Sasha Kranjac & Mustafa Toroman
 
Windowsazureplatform Overviewlatest
Windowsazureplatform OverviewlatestWindowsazureplatform Overviewlatest
Windowsazureplatform Overviewlatest
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be Prepared
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
Windows Azure Virtual Machines
Windows Azure Virtual MachinesWindows Azure Virtual Machines
Windows Azure Virtual Machines
 
Microsoft azure - the cloud for modern business
Microsoft azure - the cloud for modern businessMicrosoft azure - the cloud for modern business
Microsoft azure - the cloud for modern business
 
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
Raymond Comvalius & Sander Berkouwer - Bring your own device essentials with ...
 
Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101Adelaide Global Azure Bootcamp 2018 - Azure 101
Adelaide Global Azure Bootcamp 2018 - Azure 101
 
5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid5 Tips to Optimize SharePoint While Preparing for Hybrid
5 Tips to Optimize SharePoint While Preparing for Hybrid
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Microsoft Azure in 5 minutes
Microsoft Azure in 5 minutesMicrosoft Azure in 5 minutes
Microsoft Azure in 5 minutes
 
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
 
Azure security
Azure  securityAzure  security
Azure security
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Cloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMSCloud Based Rights Management with Azure RMS
Cloud Based Rights Management with Azure RMS
 

Similar to CloudBiometrics_Intel (1)

Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be PreparedAlan Eardley
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing OverviewSean Connolly
 
Building Hybrid Cloud Apps with Azure and Azure stack
Building Hybrid Cloud Apps with Azure and Azure stackBuilding Hybrid Cloud Apps with Azure and Azure stack
Building Hybrid Cloud Apps with Azure and Azure stackWinWire Technologies Inc
 
Migration Recipes for Success - AWS Summit Cape Town 2017
Migration Recipes for Success - AWS Summit Cape Town 2017 Migration Recipes for Success - AWS Summit Cape Town 2017
Migration Recipes for Success - AWS Summit Cape Town 2017 Amazon Web Services
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw dataICT-Partners
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud SecurityRightScale
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be PreparedAlan Eardley
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
A tale of two clouds
A tale of two cloudsA tale of two clouds
A tale of two cloudsAndrew Siemer
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesAbhishek kyal
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014Amazon Web Services
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersTobias Koprowski
 
Cloud Data Strategy event London
Cloud Data Strategy event LondonCloud Data Strategy event London
Cloud Data Strategy event LondonMongoDB
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing MicroservicesDavid Chou
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsChristopher Foot
 

Similar to CloudBiometrics_Intel (1) (20)

Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be Prepared
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
Building Hybrid Cloud Apps with Azure and Azure stack
Building Hybrid Cloud Apps with Azure and Azure stackBuilding Hybrid Cloud Apps with Azure and Azure stack
Building Hybrid Cloud Apps with Azure and Azure stack
 
Migration Recipes for Success - AWS Summit Cape Town 2017
Migration Recipes for Success - AWS Summit Cape Town 2017 Migration Recipes for Success - AWS Summit Cape Town 2017
Migration Recipes for Success - AWS Summit Cape Town 2017
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw data
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Microservices in Azure
Microservices in AzureMicroservices in Azure
Microservices in Azure
 
Cloud First: Be Prepared
Cloud First: Be PreparedCloud First: Be Prepared
Cloud First: Be Prepared
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
A tale of two clouds
A tale of two cloudsA tale of two clouds
A tale of two clouds
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud Analytics and VDI
Cloud Analytics and VDICloud Analytics and VDI
Cloud Analytics and VDI
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
 
Cloud Data Strategy event London
Cloud Data Strategy event LondonCloud Data Strategy event London
Cloud Data Strategy event London
 
Designing Microservices
Designing MicroservicesDesigning Microservices
Designing Microservices
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud Systems
 

CloudBiometrics_Intel (1)

  • 1. Biometrics in the Cloud Remote Capture, Storage, and Authentication
  • 3. SEMESTER GOALS •Obtain AWS Associate Solutions Architect Certification •Utilize the cloud to conduct performance tests for biometric authentication in an enterprise environment •Determine cloud biometrics “best practices” for each enterprise persona Key Takeaway: Gain proficient knowledge about cloud providers and define an ideal cloud biometric model
  • 4. Office • Company- owned workstation • Company- defined group policy BYOD • More flexibility, harder to manage • MDM software and robust usage policy required Multi-User • Shared, managed computing resources • Concurrent profiles require varying permissions Remote • Company- owned or personal device • Data and resources accessed via VPN ENTERPRISE PERSONAS Key Takeaway: Each persona has strengths and vulnerabilities, requires unique authentication process
  • 5. GAPS AND CHALLENGES Privacy • User’s biometrics are sensitive • Increased risk of data compromise Performance • Increased latency • Higher dependency on reliable infrastructure Integration • BYOD management • Legacy support of devices without native biometric inputs Key Takeaway: Cloud biometrics may increase risk of data compromise, integrating non-company devices creates inconsistencies
  • 6. KEY RESEARCH FINDINGS • Enterprise biometric security via IaaS • Enroll and store user templates in remote containers • Access and process templates for authentication via virtualized compute resources Taken from: http://media.amazonwebservices.com/architecturecenter/AWS_ac_ra_largescale_05.pdf
  • 7. KEY RESEARCH FINDINGS •Solutions Architect certification provides in-depth knowledge for provisioning, deploying, and maintaining an enterprise biometric security system in the AWS cloud •Pricing – Financial feasibility of implementing cloud-based biometric solutions •Performance metrics – Quantify benefits of implementing cloud-based biometric solutions
  • 8. NEXT STEPS Performance Tests • Test performance of biometric authentication for each of the enterprise personas • Tests will include multiple modalities, devices, and use cases that reflect enterprise employee needs Analyze Results • Determine whether cloud-based biometrics affects FAR, FRR, EER • Compare speed and accuracy of authentications vs. the performance of local compute systems Identify Best Practices • Identify ideal architecture and modalities required for each enterprise persona • Begin to consider broader-scale implementation details going forward
  • 9. SUMMARY •Cloud-base biometric authentication has the potential to increase enterprise security and promote cross-platform compatibility •IaaS is my recommendation for enterprise biometric systems •Further testing is required to develop a set of guidelines for each enterprise persona
  • 11. CLOUD COMPUTING SERVICE MODELS SaaS •Applications hosted on 3rd party servers •Accessed and maintained remotely IaaS • Remote datacenter infrastructure • Lease computer, storage, and network resources PaaS • Scalable environment for businesses to create apps • Helps migrate apps to hybrid IT models
  • 12. AWS MAJOR COMPONENTS •Simple Storage Service (S3) •Elastic Compute Cloud (EC2) resources •Managed relational database integration (RDB) •Identity Access Management (IAM) Directory tools •Route 53 – Scalable Domain Name System (DNS)
  • 13. AWS PERFORMANCE STATS •S3 – up to 5TB file sizes, 99.99% availability, 99.999999999% durability •Elastic Block Storage (EBS) – Up to 10,000 IOPS on a provisioned SSD •Elastic File System – Scales up to Petabyte magnitude •11 global regions, 52 edge locations
  • 14. AWS ENCRYPTION TECHNIQUES •Data in Transit – Hypertext Transfer Protocol (HTTPS) via Secure Sockets Layer (SSL) and Transport Layer Security (TLS). •Data at Rest – Server side encryption via S3 managed keys, AWS key management service, and customer provided keys. Client side encryption is also permitted.
  • 15. REFERENCES • https://aws.amazon.com/ • https://acloud.guru/course/aws-certified-solutions-architect- associate/dashboard • http://enterprise.microsoft.com/en-us/industries/government/ • https://www.mulesoft.com/resources/cloudhub/iaas-infrastructure-as-a- service • https://www.salesforce.com/paas/overview/ • https://azure.microsoft.com/en-us/documentation/articles/storage- introduction/ • http://media.amazonwebservices.com/architecturecenter/AWS_ac_ra_lar gescale_05.pdf

Editor's Notes

  1. Which cloud service model would best serve each enterprise persona (SaaS, IaaS, PaaS) for both the storage of biometric templates as well as the computation of matches for identification and verification Corporations that employ BYOD policies create challenges for managing software, securing data, and ensuring proper integration of enterprise cloud biometrics into existing security architectures
  2. IaaS - Amazon Web Services and Microsoft Azure are the leading providers Resources scale on demand with enrollment, and biometric data will be encrypted both at rest (stored templates) and in transit (remote verification/identification)
  3. Cross-platform compatibility with SSO Authenticate once with a biometric, then access all company data and resources anywhere (office, remotely, etc.) AWS and Microsoft are current industry leaders for IaaS
  4. SaaS – Applications hosted on 3rd party servers, cost-savings derived from no longer needing to install/maintain apps locally. Not all enterprises wish to have data and apps managed by a 3rd party. IaaS – Manage remote datacenter infrastructure, compute and storage resources, and networking services. Typically leased. This model offers highly scalable hardware architecture, but there is a higher degree of in-house maintenance required. PaaS – Simple, fast and scalable environment for businesses to create and run applications through a web interface. Helps to migrate apps to hybrid IT models.