SlideShare a Scribd company logo


1
White Paper
October 2014
Copyright Cohesive Networks
Cloud Security Best Practices
Part 1: UsingVNS3 Overlay Network
with Private, Public and Hybrid Clouds
Public cloud offers elastic, scalable, highly available and accessible infrastructure for
enterprises of all sizes.The 2014 Gartner Magic Quadrant notes that Amazon’s cloud
(AWS) has more than five times the IaaS compute capacity than the next 14 providers
listed, combined. No business can match that capacity for the same price as on-demand
IaaS offerings, but is it safe?
The undisputed largest barrier to business cloud migration is security. According to the
2013 ODCA membership study, 40 percent of respondents cited security as the number
one inhibitor to using cloud services. Yet, 79 percent of ODCA member companies said
they run about 20 percent of operations using external cloud services.
Cloud IaaS offers an affordable data center extension, yet application-layer security is very
different in cloud. Security is largely up to users. Gartner analyst Lydia Leong writes,
“IT managers purchasing cloud IaaS should remain aware that many aspects of security
operations remain their responsibility, not the cloud provider's. Critically, the customer
often retains security responsibility for everything above the hypervisor.”
Essentially, providers manage Layers 0 - 3 while end users must secure the hypervisor up
through application. Concerns and pain points such as network encryption in third party
environments, role-based access control, and intrusion detection must be fully controlled
by the enterprise.
Security, customization and control were the conceptual backdrop to the creation of
Cohesive's overlay networking product,VNS3. As Cohesive began to put its own
computing systems into the cloud, we were uncomfortable with the loss of control of our
network infrastructure. Our cloud migration project allowed us to begin assessing what
critical capabilities network virtualization needed to provide to our enterprise customers.

2October 2014
Copyright Cohesive Networks
Introduction
Cloud Security Best Practices
Cohesive Networks White Paper
VNS3 is the only application-centric networking product that offers highly available
overlay networks connectivity with end-to-end encryption. VNS3 combined with Docker
container-based network features allows users to build network functions into a single,
secure network.“security lattice” as a similar if not better security strategy than in the
traditional enterprise data center. Data-in-motion encryption ensures application owners
maintain highly segmented and secure overlay networks.
European mobile application provider improve quality, speed and scale by running dev/test
environments in the cloud.
The mobile app provider needed to connect multiple cloud-based dev/test topologies to
their existing data center assets while guaranteeing encryption for all data in motion.
The firm uses VNS3 to launch potentially unlimited identical dev/test topologies and connect
those topologies to their existing data centers for integration between internal and cloud version
control.

European clothing designer scales and controls capacity expansion to the cloud.
A global fashion retailer, designer, and wholesaler created a fashion social networking site with the
ability to scale up and down with demand while ensuring secure, encrypted data in motion between
the application and the data center.
The VNS3 solution provides controls to accommodate internal corporate security requirements normally not
available with public cloud infrastructure.
Sports association scales up to public cloud during championship series.
During international events the sports league needed extra capacity, stability and security for increased
website traffic, event applications and nimble data analytics but did not want to manage infrastructure.
VNS3 gives the association the ability to scale in a variety of cloud regions while providing end-to-end
encrypted access to their database servers running in their corporate data center.
Large ERP vendor shift data center complexities away from clients to reinvent their subscription
SaaS business model.
The ERP vendor wanted to turn a traditional software solution into a cloud-based, subscription SaaS
offering. They needed security, connectivity and flexibility when migrating from customer on-premise
installations to public cloud.
VNS3 allows the ERP vendor to gain multi-tenancy without re-architecting their application. The vendor
guarantees secure customer data and maintains control with integrated NOC services across clouds.
3
VNS3 Solution Cases
October 2014
Copyright Cohesive Networks
Cloud Security Best Practices
Cohesive Networks White Paper
What isVNS3?
VNS3 is a cloud-based networking solution, delivered as a virtual machine for any cloud
environment. Since its launch in 2008,VNS3 has secured hundreds of millions of customer device
hours in public, private and hybrid clouds.
VNS3 functions as a hybrid virtual networking device.VNS3 provides network control and security
at layer 4-7 using the Docker container system. With over 1,000 connected customers in more
than 20 countries,VNS3 offers customers enhanced network services on top of the cloud platform
network. Common use cases includeVLAN peering, encryption for data in motion, multicast
support and multi-region or multi-cloud SSL termination, and intrusion/extrusion detection.
Customers benefit from secure, connect and integrated cloud networks by usingVNS3. It is
delivered as software in a virtual machine, and can easily integrate with existing networking
equipment. Because it uses all the same standards as traditional networking solutions,VNS3 does
not require additional work to implement.

4
VNS3 Overview
Overlay
October 2014
Copyright Cohesive Networks
Cloud Security Best Practices
Cohesive Networks White Paper
ExtendYour Network to the Cloud
VNS3 lets customers extend data centers into the cloud, making it easy for users to capitalize on
public cloud benefits, support IT innovation and control every aspect of enterprise-to-cloud
connectivity.
Public cloud environments are controlled by a third party where application owners have no insight,
visibility or control over the underlying systems and hardware. Users can overlay networks on top
of the cloud network to extend data center networks into the cloud withVNS3. Users can run
cloud topologies as required, pass internal and industry audits and attest that a cloud deployment is
in the control of the internal IT organization.
Run key business computing topologies in the cloud with the required secure access to the
corporate data center. VNS3 creates secure and encrypted VPN connections to cloud
deployments using standard IPsec tunnels and data-in-motion encryption in the cloud.
Control: Regain control of addressing, protocols and encrypted communications in third
party controlled cloud environments. VNS3 uses encrypted overlay networks to assign IPs
and use cloud disabled protocols (e.g. UDP Multicast) as required for deployment.
Secure: Encrypt data in motion to, from, and in the cloud.
Extend: Achieve cloud network mobility and agility by extending connectivity to a cloud
VNS3 deployment or multipleVNS3 deployments across disparate clouds.
Federate: Configure VNS3 managers in a mesh to eliminate vendor lock-in and allow for
high availability, geographic distribution, and cloud federation.
Reuse: Integrate VNS3 with existing edge and DMZ equipment like IPSsec extranet,
intrusion prevention, IDS and stateful inspection devices. VNS3 requires no new knowledge
or training to implement.
Comply: Meet compliance requirements by confidently attesting to security and control
measures the application owner implemented and managed.
Configure: Dynamically launch and configure a software-defined network (SDN) to deploy
in minutes using a REST API or web-based interface.

5October 2014
Copyright Cohesive Networks
VNS3 Best Practices
Cloud Security Best Practices
Cohesive Networks White Paper
We've changed the cloud networking game with the latestVNS3 with Docker container
integration. Cloud users can now load applications into a singleVNS3 Manager instead of building
separate, costly virtual machines (VMs).  Customers can build custom functionality such as load
balancing, proxy, and network intrusion detection (NIDS), into theirVNS3 Manager instance to
match their networking use case. Each containerizedVNS3 network saves VM run times, simplifies
network management, and bundles applications functions in the sameVM instance asVNS3.
Unlike hardware solutions,VNS3 customers can control cloud-based projects using their own
software. Enterprise cloud users can guarantee secure access between corporate data centers and
cloud-based systems using end-to-end encryption and federated multi-cloud overlay networks.
VNS3 is different from other networking products because it creates a customer-controlled
network on top of underlying cloud networks. This “overlay network” opens up cloud computing
for even more possibilities, including ways to connect and secure data centers and businesses not
allowed in public cloud networks.
Previously, security and networking solutions could not guarantee the level of access and
accountability enterprises need to attest to industry and regulatory specifications. Plus,VNS3 is
provider, vendor, application, OS and script neutral.This eliminates the risky and painful “re-architect
everything” attitude typical of many cloud computing solutions. Built using industry standards,VNS3
allows users to reuse existing network infrastructure and expertise. VNS3 is the only overlay
networking product that offers both a highly available overlay network and end-to-end encryption.
VNS3 Availability
VNS3 is available in all major public/private clouds that all image import:
Amazon EC2 andVPC, IBM Softlayer, Google Compute Platform, HP Helion,Verizon Cloud and
Terremark, Interoute,Abiquo, Rackspace, Flexiant, ElasticHosts, and CloudSigma.
VNS3 is available in the following virtual formats: OVF, VMware, KVM, Xen, OpenStack, Eucalyptus,
andVMware (all formats).
Additional clouds without image import functionality can useVNS3 but Cohesive Networks would
need to build theVNS3 Image in the customer's account for an additional fee. Contact
sales@cohesive.net for custom image questions.
6October 2014
Copyright Cohesive Networks
What MakesVNS3 Unique?
Cloud Security Best Practices
Cohesive Networks White Paper
Cloud Security Best Practices Part II: Layers of Security
Part II of the Cloud Security Best Practices White Paper will explore the layers of control in public,
private and hybrid clouds and how users can create an effective “security lattice” strategy.
Download the PDF here.
Contact for Additional Information or Demo - contactme@cohesive.net
Our solution architects are available to provide additional information aboutVNS3 or schedule a
demo of the features, functions, and common solution cases.
Contact for Overview of Services - services@cohesive.net
Enterprises looking to leverage the potential benefits of Cloud Computing are faced with a wide
range of hurdles during their migration. Cohesive Networks is an award winning market leader in
cloud networking.Through our delivered cloud migration engagements we have designed many
Overlay Network architecture ranging in complexity. Cohesive provides a range of cloud and
virtualization specific professional services to help enterprises achieve their cloud-based goals.
View ourVNS3 Use Cases Webinar series - www.cohesive.net/webinars
Cohesive Senior Solution Architect, Sam Mitchell, is presenting a three part webinar series onVNS3.
Recordings of all webinars will be made available after the original air date.

•VNS3 Best Practices - Part 1 of 3 

TheVNS3 Webinar series will begin by introducingVNS3.  Sam walks through the history of
VNS3, working withVNS3, the compatibility with public clouds, and a preview of the next 2
webinar use cases. 

•VNS3 Solution Cases - Part 2 of 3

This webinar will begin by reviewing some of the topics covered in theVNS3 Best Practices
webinar.  Sam will then walk throughVNS3 technical features and use cases, diagram how we use
overlay networks to solve cloud security issues, and preview the next webinar's specific use
cases. 

•VNS3 Life in the Cloud - Part 3 of 3

VNS3 has helped businesses migrate to the cloud, connect securely to data centers or across
clouds and ensure secure connectivity.With specific case studies, Sam will explore the real-life
uses ofVNS3 with enterprise IT Cloud scenarios.We will wrap up the 3-part series and a
preview the next series, "VNS3 Everywhere." 

7October 2014
Copyright Cohesive Networks
Learn More
Cloud Security Best Practices
Cohesive Networks White Paper
Patrick Kerpan, CEO
Mr. Kerpan is responsible for directing product, technology and sales strategy. Mr. Kerpan brings
more than 20 years of software experience to the role of CEO and was one of Cohesive's
founders in 2006. Previously he was the CTO of Borland Software Corp which he joined in 2000
through the acquisition of Bedouin, Inc., a company that he founded. Mr. Kerpan was also the vice
president and general manager of the Developer Services Platform group at Borland, where he
was instrumental in leading the Borland acquisition of StarBase in 2003. Before founding Bedouin,
Inc., Mr. Kerpan was a managing director responsible for derivatives technology at multiple global
investment banks. 
Chris Swan, CTO
Chris Swan is CTO at Cohesive, where he focuses on product development and product delivery.
Chris was previously at UBS where he was CTO for Client Experience working on strategy and
architecture for web and mobile offerings across all regions and business divisions.At UBS Chris
was co-head of Security CTO focussing on identity management, access control and data security.
Chris represented UBS as Director on the Steering Committee of Open Data Center Alliance
(ODCA), an industry association focussed on enterprise cloud adoption.
Before joining UBS he was CTO at a London based technology investment banking boutique.
Chris previously held various senior R&D, architecture and engineering positions at Credit Suisse,
which included networks, security, data centre automation and introduction of new application
platforms. Before moving to the world of financial services Chris was a Combat Systems Engineering Officer in the Royal
Navy. He has an MBA from OUBS and a BEng from the University ofYork.
Sam Mitchell, Senior Cloud Solutions Architect
As Senior Cloud Solutions Architect, Sam Mitchell leads all technical elements of the
global sales cycle. Mitchell runs demos, technical qualification, technical account
management, proof of concepts, technical and competitive positioning, RFI/RFP responses
and proposals.
Before Cohesive, Mitchell was a Cloud Solution Architect at Platform Computing, which was
recently acquired by IBM. He was also a Lead Architect at SITA, where he headed up OSS BSS
Architecture, Design and Deployment activities on SITA's cloud offerings.
8
About the Authors
October 2014
Copyright Cohesive Networks
Cloud Security Best Practices
Cohesive Networks White Paper
Referenced Works

Open Data Center Alliance (ODCA). 2013 annual ODCA membership survey. 18
March, 2014. http://www.opendatacenteralliance.org/docs/
ODCA_2013MemberSurvey_FINAL.pdf
Leong, Lydia;Toombs, Douglas; Gill Bob; Petri, Gregor; Haynes,Tiny. Magic Quadrant
for Cloud Infrastructure as a Service. 28 May 2014. http://www.gartner.com/
technology/reprints.do?id=1-1UKQQA6&ct=140528&st=sb
Leong, Lydia. Gartner Research - Gartner for Business Leaders. Research Roundup
for Cloud Infrastructure as a Service, 2012. 19 July 2012 http://my.gartner.com/
portal/server.pt?
open=512&objID=256&mode=2&PageID=2350940&resId=2086515&ref=QuickSe
arch&sthkw=hybrid+cloud+security

Cearley, David and Heiser, Jay. Gartner Research - Gartner for Business Leaders.
Hype Cycle for Cloud Security, 2012. 27 Jul. 2012 http://my.gartner.com/portal/
server.pt?
open=512&objID=256&mode=2&PageID=2350940&resId=2096517&ref=g_portal
fromdoc&content=html%23f-N66498
9October 2014
Copyright Cohesive Networks
Cloud Security Best Practices
Cohesive Networks White Paper

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
akanksha botke
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
IOSR Journals
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
csandit
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
Maganathin Veeraragaloo
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
Anusha Chavan
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
ijtsrd
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
Sandeep Saxena
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computingBharat Gupta
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
Istiyak Siddiquee
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Ashish Patel
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
Rishabh Agarwal
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
Nexgen Technology
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsASBIS SK
 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
IBM India Smarter Computing
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
Nexgen Technology
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 

What's hot (20)

htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
C43021014
C43021014C43021014
C43021014
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Rp059 Icect2012 E694
Rp059 Icect2012 E694Rp059 Icect2012 E694
Rp059 Icect2012 E694
 
Resarch paper i cloud computing
Resarch paper   i cloud computingResarch paper   i cloud computing
Resarch paper i cloud computing
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
SecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the CloudsSecRBAC: Secure data in the Clouds
SecRBAC: Secure data in the Clouds
 
Safe Net: Cloud Security Solutions
Safe Net: Cloud Security SolutionsSafe Net: Cloud Security Solutions
Safe Net: Cloud Security Solutions
 
121 124
121 124121 124
121 124
 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
 
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
SECURE DATA SHARING IN CLOUD COMPUTING USING REVOCABLE-STORAGE IDENTITY-BASED...
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 

Similar to Cloud Security Best Practices - Part 1

Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
Cohesive Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
deepikaparwani
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
Satish Chavan
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
preetajain
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
Cohesive Networks
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay844
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Dan Morrill
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
IIJSRJournal
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Dr. Richard Otieno
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
Awesome Developers UG
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
Cohesive Networks
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
Editor IJMTER
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
International Journal of Science and Research (IJSR)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Arysha Channa
 
Cloud building
Cloud buildingCloud building
Cloud building
Wahid Cirebon
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Rhitik Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Gopika Babu
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
swamipise14
 

Similar to Cloud Security Best Practices - Part 1 (20)

Comparison: VNS3 vs Vyatta
Comparison: VNS3 vs VyattaComparison: VNS3 vs Vyatta
Comparison: VNS3 vs Vyatta
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Understanding the cloud computing stack
Understanding the cloud computing stackUnderstanding the cloud computing stack
Understanding the cloud computing stack
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
Comparison: VNS3 and Openswan
Comparison: VNS3 and OpenswanComparison: VNS3 and Openswan
Comparison: VNS3 and Openswan
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
 
Cloud networking use cases with VNS3
Cloud networking use cases with VNS3Cloud networking use cases with VNS3
Cloud networking use cases with VNS3
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile NetworkCloud Computing and It's Types in Mobile Network
Cloud Computing and It's Types in Mobile Network
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud building
Cloud buildingCloud building
Cloud building
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

More from Cohesive Networks

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Cohesive Networks
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Cohesive Networks
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Cohesive Networks
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Cohesive Networks
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks
 

More from Cohesive Networks (20)

CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
Chris Purrington's talk from CLOUDSEC 2016 "Defense in depth: practical steps...
 
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
 
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
Let’s rethink cloud application security in 2016 - Patrick Kerpan's Secure360...
 
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
Lessons Learned in Deploying the ELK Stack (Elasticsearch, Logstash, and Kibana)
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Cohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 AdministrationCohesive Networks Support Docs: VNS3 Administration
Cohesive Networks Support Docs: VNS3 Administration
 
Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide Cohesive Networks Support Docs: VNS3 Configuration Guide
Cohesive Networks Support Docs: VNS3 Configuration Guide
 
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 ClassicCohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
Cohesive Networks Support Docs: VNS3 Configuration for AWS EC2 Classic
 
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
Cohesive Networks Support Docs: VNS3 Configuration for Amazon VPC
 
Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure Cohesive Networks Support Docs: VNS3 Configuration in Azure
Cohesive Networks Support Docs: VNS3 Configuration in Azure
 
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
Cohesive Networks Support Docs: VNS3 Configuration for CenturyLink Cloud
 
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM SoftlayerCohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
Cohesive Networks Support Docs: VNS3 Configuration for IBM Softlayer
 
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
Cohesive Networks Support Docs: VNS3 Configuration for ElasticHosts
 
Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE Cohesive Networks Support Docs: VNS3 Configuration for GCE
Cohesive Networks Support Docs: VNS3 Configuration for GCE
 
Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5 Cohesive Networks Support Docs: Welcome to VNS3 3.5
Cohesive Networks Support Docs: Welcome to VNS3 3.5
 
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
Cohesive Networks Support Docs: VNS3 Side by Side IPsec Tunnel Guide
 
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade GuideCohesive networks Support Docs: VNS3 3.5 Upgrade Guide
Cohesive networks Support Docs: VNS3 3.5 Upgrade Guide
 
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-OnsCohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
Cohesive Networks Support Docs: VNS3 3.5 Container System Add-Ons
 
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
Cohesive Networks Support Docs: VNS3 version 3.5+ API Guide
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Cloud Security Best Practices - Part 1

  • 1. 
 1 White Paper October 2014 Copyright Cohesive Networks Cloud Security Best Practices Part 1: UsingVNS3 Overlay Network with Private, Public and Hybrid Clouds
  • 2. Public cloud offers elastic, scalable, highly available and accessible infrastructure for enterprises of all sizes.The 2014 Gartner Magic Quadrant notes that Amazon’s cloud (AWS) has more than five times the IaaS compute capacity than the next 14 providers listed, combined. No business can match that capacity for the same price as on-demand IaaS offerings, but is it safe? The undisputed largest barrier to business cloud migration is security. According to the 2013 ODCA membership study, 40 percent of respondents cited security as the number one inhibitor to using cloud services. Yet, 79 percent of ODCA member companies said they run about 20 percent of operations using external cloud services. Cloud IaaS offers an affordable data center extension, yet application-layer security is very different in cloud. Security is largely up to users. Gartner analyst Lydia Leong writes, “IT managers purchasing cloud IaaS should remain aware that many aspects of security operations remain their responsibility, not the cloud provider's. Critically, the customer often retains security responsibility for everything above the hypervisor.” Essentially, providers manage Layers 0 - 3 while end users must secure the hypervisor up through application. Concerns and pain points such as network encryption in third party environments, role-based access control, and intrusion detection must be fully controlled by the enterprise. Security, customization and control were the conceptual backdrop to the creation of Cohesive's overlay networking product,VNS3. As Cohesive began to put its own computing systems into the cloud, we were uncomfortable with the loss of control of our network infrastructure. Our cloud migration project allowed us to begin assessing what critical capabilities network virtualization needed to provide to our enterprise customers.
 2October 2014 Copyright Cohesive Networks Introduction Cloud Security Best Practices Cohesive Networks White Paper
  • 3. VNS3 is the only application-centric networking product that offers highly available overlay networks connectivity with end-to-end encryption. VNS3 combined with Docker container-based network features allows users to build network functions into a single, secure network.“security lattice” as a similar if not better security strategy than in the traditional enterprise data center. Data-in-motion encryption ensures application owners maintain highly segmented and secure overlay networks. European mobile application provider improve quality, speed and scale by running dev/test environments in the cloud. The mobile app provider needed to connect multiple cloud-based dev/test topologies to their existing data center assets while guaranteeing encryption for all data in motion. The firm uses VNS3 to launch potentially unlimited identical dev/test topologies and connect those topologies to their existing data centers for integration between internal and cloud version control.
 European clothing designer scales and controls capacity expansion to the cloud. A global fashion retailer, designer, and wholesaler created a fashion social networking site with the ability to scale up and down with demand while ensuring secure, encrypted data in motion between the application and the data center. The VNS3 solution provides controls to accommodate internal corporate security requirements normally not available with public cloud infrastructure. Sports association scales up to public cloud during championship series. During international events the sports league needed extra capacity, stability and security for increased website traffic, event applications and nimble data analytics but did not want to manage infrastructure. VNS3 gives the association the ability to scale in a variety of cloud regions while providing end-to-end encrypted access to their database servers running in their corporate data center. Large ERP vendor shift data center complexities away from clients to reinvent their subscription SaaS business model. The ERP vendor wanted to turn a traditional software solution into a cloud-based, subscription SaaS offering. They needed security, connectivity and flexibility when migrating from customer on-premise installations to public cloud. VNS3 allows the ERP vendor to gain multi-tenancy without re-architecting their application. The vendor guarantees secure customer data and maintains control with integrated NOC services across clouds. 3 VNS3 Solution Cases October 2014 Copyright Cohesive Networks Cloud Security Best Practices Cohesive Networks White Paper
  • 4. What isVNS3? VNS3 is a cloud-based networking solution, delivered as a virtual machine for any cloud environment. Since its launch in 2008,VNS3 has secured hundreds of millions of customer device hours in public, private and hybrid clouds. VNS3 functions as a hybrid virtual networking device.VNS3 provides network control and security at layer 4-7 using the Docker container system. With over 1,000 connected customers in more than 20 countries,VNS3 offers customers enhanced network services on top of the cloud platform network. Common use cases includeVLAN peering, encryption for data in motion, multicast support and multi-region or multi-cloud SSL termination, and intrusion/extrusion detection. Customers benefit from secure, connect and integrated cloud networks by usingVNS3. It is delivered as software in a virtual machine, and can easily integrate with existing networking equipment. Because it uses all the same standards as traditional networking solutions,VNS3 does not require additional work to implement.
 4 VNS3 Overview Overlay October 2014 Copyright Cohesive Networks Cloud Security Best Practices Cohesive Networks White Paper
  • 5. ExtendYour Network to the Cloud VNS3 lets customers extend data centers into the cloud, making it easy for users to capitalize on public cloud benefits, support IT innovation and control every aspect of enterprise-to-cloud connectivity. Public cloud environments are controlled by a third party where application owners have no insight, visibility or control over the underlying systems and hardware. Users can overlay networks on top of the cloud network to extend data center networks into the cloud withVNS3. Users can run cloud topologies as required, pass internal and industry audits and attest that a cloud deployment is in the control of the internal IT organization. Run key business computing topologies in the cloud with the required secure access to the corporate data center. VNS3 creates secure and encrypted VPN connections to cloud deployments using standard IPsec tunnels and data-in-motion encryption in the cloud. Control: Regain control of addressing, protocols and encrypted communications in third party controlled cloud environments. VNS3 uses encrypted overlay networks to assign IPs and use cloud disabled protocols (e.g. UDP Multicast) as required for deployment. Secure: Encrypt data in motion to, from, and in the cloud. Extend: Achieve cloud network mobility and agility by extending connectivity to a cloud VNS3 deployment or multipleVNS3 deployments across disparate clouds. Federate: Configure VNS3 managers in a mesh to eliminate vendor lock-in and allow for high availability, geographic distribution, and cloud federation. Reuse: Integrate VNS3 with existing edge and DMZ equipment like IPSsec extranet, intrusion prevention, IDS and stateful inspection devices. VNS3 requires no new knowledge or training to implement. Comply: Meet compliance requirements by confidently attesting to security and control measures the application owner implemented and managed. Configure: Dynamically launch and configure a software-defined network (SDN) to deploy in minutes using a REST API or web-based interface.
 5October 2014 Copyright Cohesive Networks VNS3 Best Practices Cloud Security Best Practices Cohesive Networks White Paper
  • 6. We've changed the cloud networking game with the latestVNS3 with Docker container integration. Cloud users can now load applications into a singleVNS3 Manager instead of building separate, costly virtual machines (VMs).  Customers can build custom functionality such as load balancing, proxy, and network intrusion detection (NIDS), into theirVNS3 Manager instance to match their networking use case. Each containerizedVNS3 network saves VM run times, simplifies network management, and bundles applications functions in the sameVM instance asVNS3. Unlike hardware solutions,VNS3 customers can control cloud-based projects using their own software. Enterprise cloud users can guarantee secure access between corporate data centers and cloud-based systems using end-to-end encryption and federated multi-cloud overlay networks. VNS3 is different from other networking products because it creates a customer-controlled network on top of underlying cloud networks. This “overlay network” opens up cloud computing for even more possibilities, including ways to connect and secure data centers and businesses not allowed in public cloud networks. Previously, security and networking solutions could not guarantee the level of access and accountability enterprises need to attest to industry and regulatory specifications. Plus,VNS3 is provider, vendor, application, OS and script neutral.This eliminates the risky and painful “re-architect everything” attitude typical of many cloud computing solutions. Built using industry standards,VNS3 allows users to reuse existing network infrastructure and expertise. VNS3 is the only overlay networking product that offers both a highly available overlay network and end-to-end encryption. VNS3 Availability VNS3 is available in all major public/private clouds that all image import: Amazon EC2 andVPC, IBM Softlayer, Google Compute Platform, HP Helion,Verizon Cloud and Terremark, Interoute,Abiquo, Rackspace, Flexiant, ElasticHosts, and CloudSigma. VNS3 is available in the following virtual formats: OVF, VMware, KVM, Xen, OpenStack, Eucalyptus, andVMware (all formats). Additional clouds without image import functionality can useVNS3 but Cohesive Networks would need to build theVNS3 Image in the customer's account for an additional fee. Contact sales@cohesive.net for custom image questions. 6October 2014 Copyright Cohesive Networks What MakesVNS3 Unique? Cloud Security Best Practices Cohesive Networks White Paper
  • 7. Cloud Security Best Practices Part II: Layers of Security Part II of the Cloud Security Best Practices White Paper will explore the layers of control in public, private and hybrid clouds and how users can create an effective “security lattice” strategy. Download the PDF here. Contact for Additional Information or Demo - contactme@cohesive.net Our solution architects are available to provide additional information aboutVNS3 or schedule a demo of the features, functions, and common solution cases. Contact for Overview of Services - services@cohesive.net Enterprises looking to leverage the potential benefits of Cloud Computing are faced with a wide range of hurdles during their migration. Cohesive Networks is an award winning market leader in cloud networking.Through our delivered cloud migration engagements we have designed many Overlay Network architecture ranging in complexity. Cohesive provides a range of cloud and virtualization specific professional services to help enterprises achieve their cloud-based goals. View ourVNS3 Use Cases Webinar series - www.cohesive.net/webinars Cohesive Senior Solution Architect, Sam Mitchell, is presenting a three part webinar series onVNS3. Recordings of all webinars will be made available after the original air date.
 •VNS3 Best Practices - Part 1 of 3 
 TheVNS3 Webinar series will begin by introducingVNS3.  Sam walks through the history of VNS3, working withVNS3, the compatibility with public clouds, and a preview of the next 2 webinar use cases. 
 •VNS3 Solution Cases - Part 2 of 3
 This webinar will begin by reviewing some of the topics covered in theVNS3 Best Practices webinar.  Sam will then walk throughVNS3 technical features and use cases, diagram how we use overlay networks to solve cloud security issues, and preview the next webinar's specific use cases. 
 •VNS3 Life in the Cloud - Part 3 of 3
 VNS3 has helped businesses migrate to the cloud, connect securely to data centers or across clouds and ensure secure connectivity.With specific case studies, Sam will explore the real-life uses ofVNS3 with enterprise IT Cloud scenarios.We will wrap up the 3-part series and a preview the next series, "VNS3 Everywhere." 
 7October 2014 Copyright Cohesive Networks Learn More Cloud Security Best Practices Cohesive Networks White Paper
  • 8. Patrick Kerpan, CEO Mr. Kerpan is responsible for directing product, technology and sales strategy. Mr. Kerpan brings more than 20 years of software experience to the role of CEO and was one of Cohesive's founders in 2006. Previously he was the CTO of Borland Software Corp which he joined in 2000 through the acquisition of Bedouin, Inc., a company that he founded. Mr. Kerpan was also the vice president and general manager of the Developer Services Platform group at Borland, where he was instrumental in leading the Borland acquisition of StarBase in 2003. Before founding Bedouin, Inc., Mr. Kerpan was a managing director responsible for derivatives technology at multiple global investment banks.  Chris Swan, CTO Chris Swan is CTO at Cohesive, where he focuses on product development and product delivery. Chris was previously at UBS where he was CTO for Client Experience working on strategy and architecture for web and mobile offerings across all regions and business divisions.At UBS Chris was co-head of Security CTO focussing on identity management, access control and data security. Chris represented UBS as Director on the Steering Committee of Open Data Center Alliance (ODCA), an industry association focussed on enterprise cloud adoption. Before joining UBS he was CTO at a London based technology investment banking boutique. Chris previously held various senior R&D, architecture and engineering positions at Credit Suisse, which included networks, security, data centre automation and introduction of new application platforms. Before moving to the world of financial services Chris was a Combat Systems Engineering Officer in the Royal Navy. He has an MBA from OUBS and a BEng from the University ofYork. Sam Mitchell, Senior Cloud Solutions Architect As Senior Cloud Solutions Architect, Sam Mitchell leads all technical elements of the global sales cycle. Mitchell runs demos, technical qualification, technical account management, proof of concepts, technical and competitive positioning, RFI/RFP responses and proposals. Before Cohesive, Mitchell was a Cloud Solution Architect at Platform Computing, which was recently acquired by IBM. He was also a Lead Architect at SITA, where he headed up OSS BSS Architecture, Design and Deployment activities on SITA's cloud offerings. 8 About the Authors October 2014 Copyright Cohesive Networks Cloud Security Best Practices Cohesive Networks White Paper
  • 9. Referenced Works
 Open Data Center Alliance (ODCA). 2013 annual ODCA membership survey. 18 March, 2014. http://www.opendatacenteralliance.org/docs/ ODCA_2013MemberSurvey_FINAL.pdf Leong, Lydia;Toombs, Douglas; Gill Bob; Petri, Gregor; Haynes,Tiny. Magic Quadrant for Cloud Infrastructure as a Service. 28 May 2014. http://www.gartner.com/ technology/reprints.do?id=1-1UKQQA6&ct=140528&st=sb Leong, Lydia. Gartner Research - Gartner for Business Leaders. Research Roundup for Cloud Infrastructure as a Service, 2012. 19 July 2012 http://my.gartner.com/ portal/server.pt? open=512&objID=256&mode=2&PageID=2350940&resId=2086515&ref=QuickSe arch&sthkw=hybrid+cloud+security
 Cearley, David and Heiser, Jay. Gartner Research - Gartner for Business Leaders. Hype Cycle for Cloud Security, 2012. 27 Jul. 2012 http://my.gartner.com/portal/ server.pt? open=512&objID=256&mode=2&PageID=2350940&resId=2096517&ref=g_portal fromdoc&content=html%23f-N66498 9October 2014 Copyright Cohesive Networks Cloud Security Best Practices Cohesive Networks White Paper