SlideShare a Scribd company logo
AWS re:Invent re:Cap 2016
Mark Nunnikhoven, Vice President, Cloud Research
Audience: Public
1
© Trend Micro, 20162
© Trend Micro, 20163
AWS YouTube Channel

re:Invent 2016 Playlist
http://bit.ly/2016-recap-01
AWS SlideShare
http://bit.ly/2016-recap-02
© Trend Micro, 20164
AWS re:Invent main site http://bit.ly/2016-recap-03
© Trend Micro, 20165
AWS re:Invent main site http://bit.ly/2016-recap-03
Great insight in AWS internal technology
© Trend Micro, 20166
Detailed in a keynote
Break out session
Brief mention in a keynote
Mention in a break out session
Blog post (http://bit.ly/2016-recap-06)
Mention in a blog post
Week In Review (http://bit.ly/2016-recap-05)
Documentation update (http://bit.ly/2016-recap-04)
© Trend Micro, 20167
Detailed in a keynote
Break out session
Brief mention in a keynote
Mention in a break out session
Blog post (http://bit.ly/2016-recap-06)
Mention in a blog post
Week In Review (http://bit.ly/2016-recap-05)
Documentation update (http://bit.ly/2016-recap-04)
Most people know about these
Some real gold here
© Trend Micro, 201611
Amazon EC2
© Trend Micro, 201612
IPv6 support in us-east-2 (http://bit.ly/2016-recap-07)
Bigger T2 burstable instance types (xlarge, 2xlarge)
R4 memory optimized instance types
I3 I/O intensive instance types
C5 compute intensive instance types (leveraging Intel Skylake)
Elastic GPUs For EC2 (coming soon, http://bit.ly/2016-recap-08)
F1 instances: configurable FPGA (limited preview, http://bit.ly/2016-recap-09)
Amazon Lightsail (http://bit.ly/2016-recap-10)
© Trend Micro, 201613
Amazon EC2 Systems Manager
(http://bit.ly/2016-recap-11)
NEW
© Trend Micro, 201614
© Trend Micro, 201614
© Trend Micro, 201615
© Trend Micro, 201616
© Trend Micro, 201617
© Trend Micro, 201618
© Trend Micro, 201619
© Trend Micro, 201620
Blox
(http://bit.ly/2016-recap-30)
NEW
© Trend Micro, 201621
Blox project site http://bit.ly/2016-recap-31
© Trend Micro, 201622
AWS Shield
© Trend Micro, 201623
AWS Shield
(http://bit.ly/2016-recap-12)
NEW
© Trend Micro, 201624
© Trend Micro, 201624
© Trend Micro, 201625
© Trend Micro, 201626
© Trend Micro, 201626
© Trend Micro, 201627
AWS Shield AWS WAF
Amazon
CloudFront
Amazon ALB
© Trend Micro, 201628
AWS Shield AWS WAF
AWS
Lambda@Edge
Amazon ALB
Amazon
CloudFront
More at http://bit.ly/2016-recap-13
and http://bit.ly/2016-recap-14
More at http://bit.ly/2016-recap-15
© Trend Micro, 201629
Amazon S3
© Trend Micro, 201630
Amazon Athena
(http://bit.ly/2016-recap-16)
NEW
© Trend Micro, 201631
© Trend Micro, 201631
© Trend Micro, 201632
© Trend Micro, 201633
© Trend Micro, 201634
© Trend Micro, 201635
Amazon QuickSight
(http://bit.ly/2016-recap-17)
NEW
(ish)
© Trend Micro, 201636
© Trend Micro, 201637
© Trend Micro, 201638
© Trend Micro, 201639
© Trend Micro, 201640
Event Sources
AWS CloudTrail
• All API calls
• IAM identity for action
Available data;
• Δ to expected (Alarms)
• Host logs (Logs)
• 3rd party logs (Logs)
• API call push (Events)
Available data;
Amazon CloudWatch
© Trend Micro, 201641
S3 data storage is inexpensive
Use S3 Infrequent Access to lower costs (S3 IA, http://bit.ly/2016-recap-18)
Bucket policies to push to Amazon Glacier (http://bit.ly/2016-recap-19)
Very inexpensive, highly effective data store for ops
© Trend Micro, 201642
AI
© Trend Micro, 201643
Amazon Rekognition
(http://bit.ly/2016-recap-20)
NEW
© Trend Micro, 201644
© Trend Micro, 201645
Use case from http://bit.ly/2016-recap-20
© Trend Micro, 201646
Use case from http://bit.ly/2016-recap-20
© Trend Micro, 201647
Use case from http://bit.ly/2016-recap-20
© Trend Micro, 201648
Use case from http://bit.ly/2016-recap-20
© Trend Micro, 201649
Amazon Polly
(http://bit.ly/2016-recap-21)
NEW
© Trend Micro, 201650
© Trend Micro, 201651
Use case from http://bit.ly/2016-recap-21
© Trend Micro, 201652
Amazon Lex
(http://bit.ly/2016-recap-22)
NEW
© Trend Micro, 201653
© Trend Micro, 201654
Use case from http://bit.ly/2016-recap-22
© Trend Micro, 201655
Use case from http://bit.ly/2016-recap-22
© Trend Micro, 201656
Use case from http://bit.ly/2016-recap-22
© Trend Micro, 201657
MXNet
(http://bit.ly/2016-recap-32)
NEW
© Trend Micro, 201658
MXNet project site http://bit.ly/2016-recap-33
© Trend Micro, 201659
AWS Lambda
© Trend Micro, 201660
C# support in AWS Lambda (http://bit.ly/2016-recap-23)
AWS Lambda@Edge (http://bit.ly/2016-recap-24)
AWS GreenGrass (http://bit.ly/2016-recap-25)
AWS Import/Export Snowball Edge (http://bit.ly/2016-recap-26)
© Trend Micro, 201661
AWS Step Functions
(http://bit.ly/2016-recap-27)
NEW
© Trend Micro, 201662
© Trend Micro, 201663
Use case from http://bit.ly/2016-recap-29
© Trend Micro, 201664
Use case from http://bit.ly/2016-recap-29
© Trend Micro, 201665
Use case from http://bit.ly/2016-recap-29
© Trend Micro, 201666
AWS X-Ray
(http://bit.ly/2016-recap-28)
NEW
© Trend Micro, 201667
© Trend Micro, 201668
© Trend Micro, 201669
What’s Next
© Trend Micro, 201670
Mark Nunnikhoven
Vice President, Cloud Research
Trend Micro
@marknca
© Trend Micro, 201671
AWS YouTube Channel

re:Invent 2016 Playlist
http://bit.ly/2016-recap-01
AWS SlideShare
http://bit.ly/2016-recap-02
© Trend Micro, 201672
IOT401
Serverless IoT Backends (http://bit.ly/2016-recap-34)
SAC322
AWSShield—AManagedDDoSProtectionService (http://bit.ly/2016-recap-35)
SAC323
Manage Multiple AWS Accounts with AWS
Organizations (http://bit.ly/2016-recap-36)
DEV209
Another Day in the Life of a Netflix Engineer (http://bit.ly/2016-recap-37)
© Trend Micro, 201673
SAC318
Life Without SSH: Immutable Infrastructure in Production
(http://bit.ly/2016-recap-38)
ARC402
Serverless Architectural Patterns and Best Practices
(http://bit.ly/2016-recap-39)
SVR401
Using AWS Lambda to Build Control Systems for Your
AWS Infrastructure (http://bit.ly/2016-recap-40)
SAC306
Encryption: It Was the Best of Controls, It Was the Worst of
Controls (http://bit.ly/2016-recap-41)
© Trend Micro, 201674
CMP305
Serverless to 32XLarge, A Unified Security Approach To
AWS Compute (http://bit.ly/2016-recap-42)
SAC201
Lessons from a Chief Security Officer: Achieving
Continuous Compliance (http://bit.ly/2016-recap-43)
© Trend Micro, 201675
Trend Micro http://trendmicro.com/aws
© Trend Micro, 201676
© Trend Micro, 201677
Thank you!
mark_nunnikhoven@trendmicro.com | @marknca

More Related Content

Viewers also liked

Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
MUK
 
Защита современного предприятия сейчас и в будущем
Защита современного предприятия сейчас и в будущемЗащита современного предприятия сейчас и в будущем
Защита современного предприятия сейчас и в будущемCisco Russia
 
Check point
Check pointCheck point
Check pointExpolink
 
Check point. Актуальные задачи сетевой безопасности
Check point. Актуальные задачи сетевой безопасностиCheck point. Актуальные задачи сетевой безопасности
Check point. Актуальные задачи сетевой безопасности
Expolink
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep security
Mark Nunnikhoven
 
Check Point - Актуальные угрозы сетевой безопасности
Check Point - Актуальные угрозы сетевой безопасности Check Point - Актуальные угрозы сетевой безопасности
Check Point - Актуальные угрозы сетевой безопасности
Expolink
 
Сеть как средство защиты и реагирования на угрозы
Сеть как средство защиты и реагирования на угрозыСеть как средство защиты и реагирования на угрозы
Сеть как средство защиты и реагирования на угрозы
Cisco Russia
 
Анализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результатыАнализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результаты
Advanced monitoring
 
Практический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атакПрактический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атак
Advanced monitoring
 
(MBL317) NEW! Introducing AWS Mobile Hub
(MBL317) NEW! Introducing AWS Mobile Hub(MBL317) NEW! Introducing AWS Mobile Hub
(MBL317) NEW! Introducing AWS Mobile Hub
Amazon Web Services
 
Как превратить свою сеть в систему информационной безопасности
Как превратить свою сеть в систему информационной безопасности Как превратить свою сеть в систему информационной безопасности
Как превратить свою сеть в систему информационной безопасности
Cisco Russia
 
Leveraging AWS Partner Network (APN) Resources
Leveraging AWS Partner Network (APN) ResourcesLeveraging AWS Partner Network (APN) Resources
Leveraging AWS Partner Network (APN) Resources
Amazon Web Services
 
AWS Architecture - GDC 2014
AWS Architecture - GDC 2014AWS Architecture - GDC 2014
AWS Architecture - GDC 2014
Amazon Web Services
 
микрогранты для встречи с участниками 10.02.2017 fin
микрогранты для встречи с участниками 10.02.2017 finмикрогранты для встречи с участниками 10.02.2017 fin
микрогранты для встречи с участниками 10.02.2017 fin
The Skolkovo Foundation
 
грантовый процесс полная 2014
грантовый процесс полная 2014грантовый процесс полная 2014
грантовый процесс полная 2014
The Skolkovo Foundation
 
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
Semantist.ru
 
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
Amazon Web Services
 
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
Amazon Web Services
 
Целенаправленные угрозы
Целенаправленные угрозыЦеленаправленные угрозы
Целенаправленные угрозыAleksey Lukatskiy
 
Тенденции кибербезопасности
Тенденции кибербезопасностиТенденции кибербезопасности
Тенденции кибербезопасности
Aleksey Lukatskiy
 

Viewers also liked (20)

Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
Check Point: предотвращение атак - сделайте 2012 год не таким, как 2011
 
Защита современного предприятия сейчас и в будущем
Защита современного предприятия сейчас и в будущемЗащита современного предприятия сейчас и в будущем
Защита современного предприятия сейчас и в будущем
 
Check point
Check pointCheck point
Check point
 
Check point. Актуальные задачи сетевой безопасности
Check point. Актуальные задачи сетевой безопасностиCheck point. Актуальные задачи сетевой безопасности
Check point. Актуальные задачи сетевой безопасности
 
Defending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep securityDefending your workloads with aws waf and deep security
Defending your workloads with aws waf and deep security
 
Check Point - Актуальные угрозы сетевой безопасности
Check Point - Актуальные угрозы сетевой безопасности Check Point - Актуальные угрозы сетевой безопасности
Check Point - Актуальные угрозы сетевой безопасности
 
Сеть как средство защиты и реагирования на угрозы
Сеть как средство защиты и реагирования на угрозыСеть как средство защиты и реагирования на угрозы
Сеть как средство защиты и реагирования на угрозы
 
Анализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результатыАнализ защищенности ПО и инфраструктур – подходы и результаты
Анализ защищенности ПО и инфраструктур – подходы и результаты
 
Практический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атакПрактический опыт мониторинга и анализа компьютерных атак
Практический опыт мониторинга и анализа компьютерных атак
 
(MBL317) NEW! Introducing AWS Mobile Hub
(MBL317) NEW! Introducing AWS Mobile Hub(MBL317) NEW! Introducing AWS Mobile Hub
(MBL317) NEW! Introducing AWS Mobile Hub
 
Как превратить свою сеть в систему информационной безопасности
Как превратить свою сеть в систему информационной безопасности Как превратить свою сеть в систему информационной безопасности
Как превратить свою сеть в систему информационной безопасности
 
Leveraging AWS Partner Network (APN) Resources
Leveraging AWS Partner Network (APN) ResourcesLeveraging AWS Partner Network (APN) Resources
Leveraging AWS Partner Network (APN) Resources
 
AWS Architecture - GDC 2014
AWS Architecture - GDC 2014AWS Architecture - GDC 2014
AWS Architecture - GDC 2014
 
микрогранты для встречи с участниками 10.02.2017 fin
микрогранты для встречи с участниками 10.02.2017 finмикрогранты для встречи с участниками 10.02.2017 fin
микрогранты для встречи с участниками 10.02.2017 fin
 
грантовый процесс полная 2014
грантовый процесс полная 2014грантовый процесс полная 2014
грантовый процесс полная 2014
 
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
Главные тренды в работе с семантикой весны 2017 (ТопЭксперт 17 марта 2017, Дм...
 
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
AWS Storage and Database Architecture Best Practices (DAT203) | AWS re:Invent...
 
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
AWS for Start-ups - Architectural Best Practices & Automating Your Infrastruc...
 
Целенаправленные угрозы
Целенаправленные угрозыЦеленаправленные угрозы
Целенаправленные угрозы
 
Тенденции кибербезопасности
Тенденции кибербезопасностиТенденции кибербезопасности
Тенденции кибербезопасности
 

Similar to Aws re invent recap 2016 sm2

Modernising Android Architecture Using MVVM and Android Architecture Components
Modernising Android Architecture Using MVVM and Android Architecture ComponentsModernising Android Architecture Using MVVM and Android Architecture Components
Modernising Android Architecture Using MVVM and Android Architecture Components
Quintin Balsdon
 
Where is cold fusion headed
Where is cold fusion headedWhere is cold fusion headed
Where is cold fusion headed
ColdFusionConference
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAF
Amazon Web Services
 
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
Toshiaki Maki
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure Limitations
Caserta
 
XPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
XPDS16: Making Migration More Secure - John Shackleton, Adventium LabsXPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
XPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
The Linux Foundation
 
Power Apps Build Tools - Automate ALM
Power Apps Build Tools - Automate ALMPower Apps Build Tools - Automate ALM
Power Apps Build Tools - Automate ALM
Kunal Kankariya
 
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS SummitMonitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
Amazon Web Services
 
SpringOnePlatform2017 recap
SpringOnePlatform2017 recapSpringOnePlatform2017 recap
SpringOnePlatform2017 recap
minseok kim
 
June 2017 Denver AWS Users' Group intro slides
June 2017 Denver AWS Users' Group intro slidesJune 2017 Denver AWS Users' Group intro slides
June 2017 Denver AWS Users' Group intro slides
David McDaniel
 
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco DevNet
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
Cloud Standards Customer Council
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
CA Technologies
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Rahul Neel Mani
 
Cloud Foundy Java Client V 2.0 #cf_tokyo
Cloud Foundy Java Client V 2.0 #cf_tokyoCloud Foundy Java Client V 2.0 #cf_tokyo
Cloud Foundy Java Client V 2.0 #cf_tokyo
Toshiaki Maki
 
今すぐ始めるCloud Foundry #hackt #hackt_k
今すぐ始めるCloud Foundry #hackt #hackt_k今すぐ始めるCloud Foundry #hackt #hackt_k
今すぐ始めるCloud Foundry #hackt #hackt_k
Toshiaki Maki
 
AWS Community Day, Chennai - 2019
AWS Community Day, Chennai - 2019AWS Community Day, Chennai - 2019
AWS Community Day, Chennai - 2019
Pranesh Vittal
 
Amazon for unity presentation
Amazon for unity presentationAmazon for unity presentation
Amazon for unity presentation
Kollar Bruno
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
CA Technologies
 
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and BeyondOffice 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Priyanka Aash
 

Similar to Aws re invent recap 2016 sm2 (20)

Modernising Android Architecture Using MVVM and Android Architecture Components
Modernising Android Architecture Using MVVM and Android Architecture ComponentsModernising Android Architecture Using MVVM and Android Architecture Components
Modernising Android Architecture Using MVVM and Android Architecture Components
 
Where is cold fusion headed
Where is cold fusion headedWhere is cold fusion headed
Where is cold fusion headed
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAF
 
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
Event Driven Microservices with Spring Cloud Stream #jjug_ccc #ccc_ab3
 
Moving Past Infrastructure Limitations
Moving Past Infrastructure LimitationsMoving Past Infrastructure Limitations
Moving Past Infrastructure Limitations
 
XPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
XPDS16: Making Migration More Secure - John Shackleton, Adventium LabsXPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
XPDS16: Making Migration More Secure - John Shackleton, Adventium Labs
 
Power Apps Build Tools - Automate ALM
Power Apps Build Tools - Automate ALMPower Apps Build Tools - Automate ALM
Power Apps Build Tools - Automate ALM
 
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS SummitMonitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
Monitoring Modern Applications: Best Practices - SRV338 - Chicago AWS Summit
 
SpringOnePlatform2017 recap
SpringOnePlatform2017 recapSpringOnePlatform2017 recap
SpringOnePlatform2017 recap
 
June 2017 Denver AWS Users' Group intro slides
June 2017 Denver AWS Users' Group intro slidesJune 2017 Denver AWS Users' Group intro slides
June 2017 Denver AWS Users' Group intro slides
 
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...Cisco Managed Private Cloud in Your Data Center:  Public cloud experience on ...
Cisco Managed Private Cloud in Your Data Center: Public cloud experience on ...
 
Cloud Customer Architecture for IoT
Cloud Customer Architecture for IoTCloud Customer Architecture for IoT
Cloud Customer Architecture for IoT
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
Cloud Foundy Java Client V 2.0 #cf_tokyo
Cloud Foundy Java Client V 2.0 #cf_tokyoCloud Foundy Java Client V 2.0 #cf_tokyo
Cloud Foundy Java Client V 2.0 #cf_tokyo
 
今すぐ始めるCloud Foundry #hackt #hackt_k
今すぐ始めるCloud Foundry #hackt #hackt_k今すぐ始めるCloud Foundry #hackt #hackt_k
今すぐ始めるCloud Foundry #hackt #hackt_k
 
AWS Community Day, Chennai - 2019
AWS Community Day, Chennai - 2019AWS Community Day, Chennai - 2019
AWS Community Day, Chennai - 2019
 
Amazon for unity presentation
Amazon for unity presentationAmazon for unity presentation
Amazon for unity presentation
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
 
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and BeyondOffice 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
Office 365 Security: Top Priorities for 30 Days, 90 Days and Beyond
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Aws re invent recap 2016 sm2

  • 1. AWS re:Invent re:Cap 2016 Mark Nunnikhoven, Vice President, Cloud Research Audience: Public 1
  • 3. © Trend Micro, 20163 AWS YouTube Channel
 re:Invent 2016 Playlist http://bit.ly/2016-recap-01 AWS SlideShare http://bit.ly/2016-recap-02
  • 4. © Trend Micro, 20164 AWS re:Invent main site http://bit.ly/2016-recap-03
  • 5. © Trend Micro, 20165 AWS re:Invent main site http://bit.ly/2016-recap-03 Great insight in AWS internal technology
  • 6. © Trend Micro, 20166 Detailed in a keynote Break out session Brief mention in a keynote Mention in a break out session Blog post (http://bit.ly/2016-recap-06) Mention in a blog post Week In Review (http://bit.ly/2016-recap-05) Documentation update (http://bit.ly/2016-recap-04)
  • 7. © Trend Micro, 20167 Detailed in a keynote Break out session Brief mention in a keynote Mention in a break out session Blog post (http://bit.ly/2016-recap-06) Mention in a blog post Week In Review (http://bit.ly/2016-recap-05) Documentation update (http://bit.ly/2016-recap-04) Most people know about these Some real gold here
  • 8. © Trend Micro, 201611 Amazon EC2
  • 9. © Trend Micro, 201612 IPv6 support in us-east-2 (http://bit.ly/2016-recap-07) Bigger T2 burstable instance types (xlarge, 2xlarge) R4 memory optimized instance types I3 I/O intensive instance types C5 compute intensive instance types (leveraging Intel Skylake) Elastic GPUs For EC2 (coming soon, http://bit.ly/2016-recap-08) F1 instances: configurable FPGA (limited preview, http://bit.ly/2016-recap-09) Amazon Lightsail (http://bit.ly/2016-recap-10)
  • 10. © Trend Micro, 201613 Amazon EC2 Systems Manager (http://bit.ly/2016-recap-11) NEW
  • 11. © Trend Micro, 201614
  • 12. © Trend Micro, 201614
  • 13. © Trend Micro, 201615
  • 14. © Trend Micro, 201616
  • 15. © Trend Micro, 201617
  • 16. © Trend Micro, 201618
  • 17. © Trend Micro, 201619
  • 18. © Trend Micro, 201620 Blox (http://bit.ly/2016-recap-30) NEW
  • 19. © Trend Micro, 201621 Blox project site http://bit.ly/2016-recap-31
  • 20. © Trend Micro, 201622 AWS Shield
  • 21. © Trend Micro, 201623 AWS Shield (http://bit.ly/2016-recap-12) NEW
  • 22. © Trend Micro, 201624
  • 23. © Trend Micro, 201624
  • 24. © Trend Micro, 201625
  • 25. © Trend Micro, 201626
  • 26. © Trend Micro, 201626
  • 27. © Trend Micro, 201627 AWS Shield AWS WAF Amazon CloudFront Amazon ALB
  • 28. © Trend Micro, 201628 AWS Shield AWS WAF AWS Lambda@Edge Amazon ALB Amazon CloudFront More at http://bit.ly/2016-recap-13 and http://bit.ly/2016-recap-14 More at http://bit.ly/2016-recap-15
  • 29. © Trend Micro, 201629 Amazon S3
  • 30. © Trend Micro, 201630 Amazon Athena (http://bit.ly/2016-recap-16) NEW
  • 31. © Trend Micro, 201631
  • 32. © Trend Micro, 201631
  • 33. © Trend Micro, 201632
  • 34. © Trend Micro, 201633
  • 35. © Trend Micro, 201634
  • 36. © Trend Micro, 201635 Amazon QuickSight (http://bit.ly/2016-recap-17) NEW (ish)
  • 37. © Trend Micro, 201636
  • 38. © Trend Micro, 201637
  • 39. © Trend Micro, 201638
  • 40. © Trend Micro, 201639
  • 41. © Trend Micro, 201640 Event Sources AWS CloudTrail • All API calls • IAM identity for action Available data; • Δ to expected (Alarms) • Host logs (Logs) • 3rd party logs (Logs) • API call push (Events) Available data; Amazon CloudWatch
  • 42. © Trend Micro, 201641 S3 data storage is inexpensive Use S3 Infrequent Access to lower costs (S3 IA, http://bit.ly/2016-recap-18) Bucket policies to push to Amazon Glacier (http://bit.ly/2016-recap-19) Very inexpensive, highly effective data store for ops
  • 43. © Trend Micro, 201642 AI
  • 44. © Trend Micro, 201643 Amazon Rekognition (http://bit.ly/2016-recap-20) NEW
  • 45. © Trend Micro, 201644
  • 46. © Trend Micro, 201645 Use case from http://bit.ly/2016-recap-20
  • 47. © Trend Micro, 201646 Use case from http://bit.ly/2016-recap-20
  • 48. © Trend Micro, 201647 Use case from http://bit.ly/2016-recap-20
  • 49. © Trend Micro, 201648 Use case from http://bit.ly/2016-recap-20
  • 50. © Trend Micro, 201649 Amazon Polly (http://bit.ly/2016-recap-21) NEW
  • 51. © Trend Micro, 201650
  • 52. © Trend Micro, 201651 Use case from http://bit.ly/2016-recap-21
  • 53. © Trend Micro, 201652 Amazon Lex (http://bit.ly/2016-recap-22) NEW
  • 54. © Trend Micro, 201653
  • 55. © Trend Micro, 201654 Use case from http://bit.ly/2016-recap-22
  • 56. © Trend Micro, 201655 Use case from http://bit.ly/2016-recap-22
  • 57. © Trend Micro, 201656 Use case from http://bit.ly/2016-recap-22
  • 58. © Trend Micro, 201657 MXNet (http://bit.ly/2016-recap-32) NEW
  • 59. © Trend Micro, 201658 MXNet project site http://bit.ly/2016-recap-33
  • 60. © Trend Micro, 201659 AWS Lambda
  • 61. © Trend Micro, 201660 C# support in AWS Lambda (http://bit.ly/2016-recap-23) AWS Lambda@Edge (http://bit.ly/2016-recap-24) AWS GreenGrass (http://bit.ly/2016-recap-25) AWS Import/Export Snowball Edge (http://bit.ly/2016-recap-26)
  • 62. © Trend Micro, 201661 AWS Step Functions (http://bit.ly/2016-recap-27) NEW
  • 63. © Trend Micro, 201662
  • 64. © Trend Micro, 201663 Use case from http://bit.ly/2016-recap-29
  • 65. © Trend Micro, 201664 Use case from http://bit.ly/2016-recap-29
  • 66. © Trend Micro, 201665 Use case from http://bit.ly/2016-recap-29
  • 67. © Trend Micro, 201666 AWS X-Ray (http://bit.ly/2016-recap-28) NEW
  • 68. © Trend Micro, 201667
  • 69. © Trend Micro, 201668
  • 70. © Trend Micro, 201669 What’s Next
  • 71. © Trend Micro, 201670 Mark Nunnikhoven Vice President, Cloud Research Trend Micro @marknca
  • 72. © Trend Micro, 201671 AWS YouTube Channel
 re:Invent 2016 Playlist http://bit.ly/2016-recap-01 AWS SlideShare http://bit.ly/2016-recap-02
  • 73. © Trend Micro, 201672 IOT401 Serverless IoT Backends (http://bit.ly/2016-recap-34) SAC322 AWSShield—AManagedDDoSProtectionService (http://bit.ly/2016-recap-35) SAC323 Manage Multiple AWS Accounts with AWS Organizations (http://bit.ly/2016-recap-36) DEV209 Another Day in the Life of a Netflix Engineer (http://bit.ly/2016-recap-37)
  • 74. © Trend Micro, 201673 SAC318 Life Without SSH: Immutable Infrastructure in Production (http://bit.ly/2016-recap-38) ARC402 Serverless Architectural Patterns and Best Practices (http://bit.ly/2016-recap-39) SVR401 Using AWS Lambda to Build Control Systems for Your AWS Infrastructure (http://bit.ly/2016-recap-40) SAC306 Encryption: It Was the Best of Controls, It Was the Worst of Controls (http://bit.ly/2016-recap-41)
  • 75. © Trend Micro, 201674 CMP305 Serverless to 32XLarge, A Unified Security Approach To AWS Compute (http://bit.ly/2016-recap-42) SAC201 Lessons from a Chief Security Officer: Achieving Continuous Compliance (http://bit.ly/2016-recap-43)
  • 76. © Trend Micro, 201675 Trend Micro http://trendmicro.com/aws
  • 77. © Trend Micro, 201676
  • 78. © Trend Micro, 201677 Thank you! mark_nunnikhoven@trendmicro.com | @marknca