The cloud can be the natural place to grow vertical ecosystems based on a platform as a service approach. Innovation is promoted by aggregating competencies and developers around the TIM cloud to expand the SAAS portfolio. This presentation to the Faculty of Engineering of Palermo, shows the TIM vision about how api economy, cloud brokering of internal and external resources, devops and mashup over a large community of actors including startups, incubators and ISV can enable an ecosystem of vertical application that can be exposed to the Italian market through TIM direct or indirect go to market channels.
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Global Cyber Attacks Stats
What is Computing Security?
Cloud Computing, Models and Security Demystified
New Security Challenges of Cloud Computing
Security Dimensions – The CIA Triad
Scope of Cloud Computing Security
Security Challenge Eco-system
Vulnerabilities, Threats and Exposure Points
Attacks – Modes and Types
The Notorious Nine – Cloud Security Threats
Methods of Defence
Tenets of Security Control
Security Life Cycle
Cloud Security Components and Governance
Tiered Cloud Security Handling Framework
Bottom-line
Take-aways
The cloud can be the natural place to grow vertical ecosystems based on a platform as a service approach. Innovation is promoted by aggregating competencies and developers around the TIM cloud to expand the SAAS portfolio. This presentation to the Faculty of Engineering of Palermo, shows the TIM vision about how api economy, cloud brokering of internal and external resources, devops and mashup over a large community of actors including startups, incubators and ISV can enable an ecosystem of vertical application that can be exposed to the Italian market through TIM direct or indirect go to market channels.
Cloud Computing
Categories of Cloud Computing
SaaS
PaaS
IaaS
Threads of Cloud Computing
Insurance Challenges
Cloud Solutions
Security of the Insurance Industry
Cloud Solutions
Insurance Security in the Insurance Industry with respect to Indian market
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
Global Cyber Attacks Stats
What is Computing Security?
Cloud Computing, Models and Security Demystified
New Security Challenges of Cloud Computing
Security Dimensions – The CIA Triad
Scope of Cloud Computing Security
Security Challenge Eco-system
Vulnerabilities, Threats and Exposure Points
Attacks – Modes and Types
The Notorious Nine – Cloud Security Threats
Methods of Defence
Tenets of Security Control
Security Life Cycle
Cloud Security Components and Governance
Tiered Cloud Security Handling Framework
Bottom-line
Take-aways
Challenges with Cloud Security by Ken Y ChanKen Chan
As more businesses move to cloud services, they are facing with new challenges in IT security. This presentation outlines the key challenges in cloud security, and my observations and recommendations
Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks.
The focus of thisPaper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks.
Our main contribution is a security architecture that provides a flexible security as a service model that a cloud provider can offer to its tenants and customers of its tenants.
Our security as a service model while offering a baseline security to the provider to protect its own cloud infrastructure also provides flexibility to tenants to have additional security functionalities that suit their security requirements.
The paper describes the design of the security architecture and discusses how different
types of attacks are counteracted by the proposed architecture.
We have implemented the security architecture and the paper discusses analysis and performance evaluation results.
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
João Gondim, Luis Pacheco and Priscila Solis (University of Brasilia, Brazil)
Unpublished, novel research work related to the latest challenges, technologies, solutions and techniques related to networking within the cloud and to the efficient and effective cloud deployment and hosting of the various emerging applications and services.
Effective solutions related to the placement, sizing, bursting, and migration of compute, storage, and data resources within the cloud network(s) become critical to the deployment of elastic and agile applications.
This presentation simplifies Cloud, Cloud Security and Cloud Security Certifications. This includes the following:
- Understanding Cloud
- Understanding Cloud Security using the Risk Management and Cloud Security Control Frameworks
- Cloud Security Certifications
- Key Definitions
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Slide on Cloud Security. This defines the possible aspects on Cloud Security. Images are taken from different Websites which are mentioned on references section.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Cloud Security - Emerging Facets and FrontiersGokul Alex
My session on Cloud Computing Security prepared for ISC2 Bangalore Chapter MeetUp. It is a walkthrough on the fundamental axioms of cloud security with reference to architecture standards, industry best practices and a coverage of some of the most pertinent attack vectors in the recent times. This presentation delves deeper into Cloud Security Reference Architectures, Cloud Security Operating Models, Cloud Firewalls, Cloud Identity Access Management Models, Cloud Malware Concepts etc.
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Pronunciamiento a la opinión pública nacional e internacionalteleSUR TV
Como Autoridad Nacional De Gobierno Indígena, presente a lo largo y ancho del territorio nacional, la Organización Nacional Indígena de Colombia – ONIC y nuestras 47 organizaciones filiales regionales, saludamos la concreción y firma del Nuevo Acuerdo de Paz Final y DEFINITIVO para la terminación del conflicto y la construcción de una Paz estable y duradera, firmado entre el Gobierno Nacional colombiano y el grupo insurgente de las FARC –EP el pasado 12 de noviembre en La Habana, Cuba.
Una carta descriptiva acerca de la elaboración de un Webquest acerca de la importancia de las lenguas indígenas en el español de México para los alumnos de secundaria en la asignatura de Español.
Challenges with Cloud Security by Ken Y ChanKen Chan
As more businesses move to cloud services, they are facing with new challenges in IT security. This presentation outlines the key challenges in cloud security, and my observations and recommendations
Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks.
The focus of thisPaper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks.
Our main contribution is a security architecture that provides a flexible security as a service model that a cloud provider can offer to its tenants and customers of its tenants.
Our security as a service model while offering a baseline security to the provider to protect its own cloud infrastructure also provides flexibility to tenants to have additional security functionalities that suit their security requirements.
The paper describes the design of the security architecture and discusses how different
types of attacks are counteracted by the proposed architecture.
We have implemented the security architecture and the paper discusses analysis and performance evaluation results.
Congresso Sociedade Brasileira de Computação CSBC2016 Porto Alegre (Brazil)
Workshop on Cloud Networks & Cloudscape Brazil
João Gondim, Luis Pacheco and Priscila Solis (University of Brasilia, Brazil)
Unpublished, novel research work related to the latest challenges, technologies, solutions and techniques related to networking within the cloud and to the efficient and effective cloud deployment and hosting of the various emerging applications and services.
Effective solutions related to the placement, sizing, bursting, and migration of compute, storage, and data resources within the cloud network(s) become critical to the deployment of elastic and agile applications.
This presentation simplifies Cloud, Cloud Security and Cloud Security Certifications. This includes the following:
- Understanding Cloud
- Understanding Cloud Security using the Risk Management and Cloud Security Control Frameworks
- Cloud Security Certifications
- Key Definitions
Cloud Security is critical to Data Security and Application Resilience against CyberAttacks. This talk looks at Security Best Practices that need to be practised.
This talk was presented at AWS Community Day Bengaluru 2019 by Amar Prusty, Cloud-Data Center Consultant Architect, DXC Technology
Slide on Cloud Security. This defines the possible aspects on Cloud Security. Images are taken from different Websites which are mentioned on references section.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Cloud Security - Emerging Facets and FrontiersGokul Alex
My session on Cloud Computing Security prepared for ISC2 Bangalore Chapter MeetUp. It is a walkthrough on the fundamental axioms of cloud security with reference to architecture standards, industry best practices and a coverage of some of the most pertinent attack vectors in the recent times. This presentation delves deeper into Cloud Security Reference Architectures, Cloud Security Operating Models, Cloud Firewalls, Cloud Identity Access Management Models, Cloud Malware Concepts etc.
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Pronunciamiento a la opinión pública nacional e internacionalteleSUR TV
Como Autoridad Nacional De Gobierno Indígena, presente a lo largo y ancho del territorio nacional, la Organización Nacional Indígena de Colombia – ONIC y nuestras 47 organizaciones filiales regionales, saludamos la concreción y firma del Nuevo Acuerdo de Paz Final y DEFINITIVO para la terminación del conflicto y la construcción de una Paz estable y duradera, firmado entre el Gobierno Nacional colombiano y el grupo insurgente de las FARC –EP el pasado 12 de noviembre en La Habana, Cuba.
Una carta descriptiva acerca de la elaboración de un Webquest acerca de la importancia de las lenguas indígenas en el español de México para los alumnos de secundaria en la asignatura de Español.
- Astrônomos descobriram que uma pequena estrela, do tamanho de Júpiter, possui uma tempestade muito parecida com a Grande Mancha Vermelha e que está ali, persistente por dois anos.
- Enquanto nos planetas, esse tipo de característica é normal, em estrelas essa é a melhor evidência encontrada até hoje.
- A estrela é chamada de W1906+40 e pertence a uma classe de objetos frios chamados de Anãs-L.
- Elas são consideradas estrelas pois fundem átomos e geram luz, como o Sol faz, enquanto que as anãs marrons são conhecidas como estrelas que falharam, pois elas não possuem o processo de fusão atômica em seu interior.
- Nesse novo estudo os astrônomos foram capazes de verificar as mudanças na atmosfera da estrela por dois anos. A técnica usada foi semelhante à de detecção de exoplanetas, analisando a curva de luz da estrela, que apresentava quedas, mas que não era por questão de planetas.
- Os astrônomos usaram o Spitzer e estudaram a luz infravermelha da estrela, que revelou uma gigantesca mancha escura que não era uma mancha magnética estelar, mas sim uma tempestade com um diâmetro equivalente ao de 3 Terras. O spitzer foi capaz de estudar camadas diferentes da atmosfera da estrela e esses dados junto com os dados do Kepler, revelaram com clareza a tempestade estelar.
- Futuras observações serão realizadas usando os dois equipamentos para tentar identificar esse tipo de tempestade em anãs marrons, por exemplo, e tentar descobrir se esse tipo de fenômeno é muito comum, ou é raro no universo.
Our mission at Invest Crowdfund Canada - Quebec is to legalize Invest Crowdfunding in all Canadian provinces. We believe this new model will help start-up businesses fund their growth and create jobs, thus contributing to local economy. Lets sign the petition to have Invest Crowdfunding be part of our ecosystem!
Overview of upcoming training sessions on Sept 30 and Oct 6. We talk of storytelling, perks strategy, the empty restaurant effect, the 80|20 rule, social media, and much much more. To reserve your seat: https://crowdfundingmontreal.eventbrite.com
La primera edición de TEUNO Summit se llevó a cabo el 21 y 22 de junio en las ciudades de Quito y Guayaquil respectivamente, con el auspicio de grandes empresas como Cisco Meraki, AlienVault, Siemon, Microsoft, Casa Cable, INGRAM. Donde expertos TI hablaron sobre los desafíos de la conectividad y seguridad en las empresas.
Learn how artificial intelligence impacts performance, security, compute, and resources within the network.
Speakers:
“Ali” Osamah Mohammed Ali and Wes Jensen, Netrolix
2021 01-27 reducing risk of ransomware webinarAlgoSec
Micro-segmentation protects your network by limiting the lateral movement of ransomware and other threats in your network. Yet successfully implementing a defense-in-depth strategy using micro-segmentation may be complicated.
In this second webinar in a series of two webinars about ransomware, Yitzy Tannenbaum, Product Marketing Manager from AlgoSec and Jan Heijdra, Cisco Security Specialist, will provide a blueprint to implementing micro-segmentation using Cisco Secure Workload (formerly Cisco Tetration) and AlgoSec Network Security Policy Management.
Join our live webinar to learn:
• Why micro-segmentation is critical to fighting ransomware
• Understand your business applications to create your micro-segmentation policy
• Validate your micro-segmentation policy is accurate
• Enforce these granular policies on workloads and summarized policies across your infrastructure
• Use risk and vulnerability analysis to tighten your workload and network security
• Identify and manage security risk and compliance in your micro-segmented environment
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
VMworld 2013
Alka Gupta, VMware
Sanjay Aiyagari, VMware
Allon Dafner, Amdocs
Iain Woolf, Alcatel-Lucent
Artur Tyloch, Nokia Solutions and Networks
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
Datacomm Cloud Business Overview
Making Indonesia 4.0
Digital Transformation in Banking Industry
Introduction to Cloud Computing
Big Data Analytics Introduction
Big Data Analytics Application in Banking
To protect and ensure the availability of network services in charge to control critical infrastructure of organizations
The SIMOC is a platform that allows the creation of segregated cyber environments, with FOCUS on SECURITY.
Nowadays, your users are the primary attack vector, since they are not only sitting in the office, but they also carry mobile devices that are always on and almost always connected to the Internet.
So, besides protecting your datacenter, you need to protect your users wherever they are and whenever they connect to the Internet and/or to your corporate network.
zScaler, as a SaaS (Security-as-a-Service) platform, enables you to provide such protection, as well streamline your network connectivity.
Similar to Cloud Security @ TIM - Current Practises and Future Challanges (20)
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Cloud Security @ TIM - Current Practises and Future Challanges
1. GRUPPO TELECOM ITALIA
Cloud Security @ TIM
Current Practises and Future Challanges
Michele Vecchione @ TIM
1st Workshop of the Project Cluster on Data Protection, Security and Privacy
in the Cloud. 23 February 2016, Napoli, Italy
2. 2
The TIM Group in shortThe TIM Group in shortThe TIM Group in shortThe TIM Group in short
3. 3
TIMTIMTIMTIM CloudCloudCloudCloud StrategyStrategyStrategyStrategy versus OTTversus OTTversus OTTversus OTT PlayersPlayersPlayersPlayers CLOUD e
strategia
Tim
Distinctive Factors of our Cloud Business Model
Three Distinctive factors differenciate TIM cloud offering from OTT players:
Proximity, Compliance to Security&Privacy and Excellence in Quality of experience
high
high
high
Proximity
Quality of
Experience
Compliance&
Security
OTT
TELCO
TelcoTelcoTelcoTelco OTTOTTOTTOTT
Proximity Direct Sales
PreSales Force,
CRM Exploitation,
Customisation,
Local
Infrastructures
Product Centric
Self Service
Quality of
Experience
E2E control
SLA
Low latency
Remote
No direct network
control
Compliance&
Security
EU regulation
SOC/NOC
Consultancy
Rely upon Internet
or third parties
Lower privacy
rules
5. 5
TIM Cloud Infrastructure: Data Centers
A Secure Physical Infrastructure
Titolo della Relazione
Nome del Relatore, Nome Struttura
RegionalRegionalRegionalRegional Service CentersService CentersService CentersService Centers
NationalNationalNationalNational DCsDCsDCsDCs
IDC CesanoIDC CesanoIDC CesanoIDC Cesano
MadernoMadernoMadernoMaderno
IDC RozzanoIDC RozzanoIDC RozzanoIDC Rozzano
DC BolognaDC BolognaDC BolognaDC Bologna
DC PadovaDC PadovaDC PadovaDC Padova
DC BariDC BariDC BariDC Bari
PalermPalermPalermPalerm
oooo
FirenFirenFirenFiren
zezezeze
TorinTorinTorinTorin
oooo
NapolNapolNapolNapol
iiii
DC OrioloDC OrioloDC OrioloDC Oriolo
RomanoRomanoRomanoRomano
IDC PomeziaIDC PomeziaIDC PomeziaIDC Pomezia
Nord Est AreaNord Est AreaNord Est AreaNord Est Area
BolognaBolognaBolognaBolognaPadovaPadovaPadovaPadova
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
15151515 23232323
>4.100>4.100>4.100>4.100 >4.300>4.300>4.300>4.300
>3.600 >3.300
>250 >280
>1.100>1.100>1.100>1.100 >950>950>950>950
>900 >600
Nord Ovest AreaNord Ovest AreaNord Ovest AreaNord Ovest Area
CesanoCesanoCesanoCesanoRozzanoRozzanoRozzanoRozzano
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
16161616 11111111
>4.800>4.800>4.800>4.800 >3.500>3.500>3.500>3.500
>4.500 >2.800
>280 >200
>4.700>4.700>4.700>4.700 >2.200>2.200>2.200>2.200
>1.300 >1.500
Center/South AreaCenter/South AreaCenter/South AreaCenter/South Area
OrioloOrioloOrioloOriolo
Systems rooms #
Systems Rooms available area
• Production Systems rooms area
• TLC Systems rooms area
Installed/Active Servers #
• Managed Servers #
13131313 16161616
>3.400>3.400>3.400>3.400 >6.600>6.600>6.600>6.600
>2.900 >6.100
>400 >400
>3.200>3.200>3.200>3.200 >5.400>5.400>5.400>5.400
>3.000 >3.000
BariBariBariBariPomeziaPomeziaPomeziaPomezia
6666
>2.000>2.000>2.000>2.000
>1.800
>90
>800>800>800>800
>700
AciliaAciliaAciliaAcilia
Work in progressWork in progressWork in progressWork in progress
ACILIAACILIAACILIAACILIA
Data Center TIER 4Data Center TIER 4Data Center TIER 4Data Center TIER 4
Area Size
Production System Rooms (6 m Height)
Hi Density power supply
Network supports
>>>>4.0000 mq4.0000 mq4.0000 mq4.0000 mq
>3.500 mq
Fino a 15 Kw/mq
SDN, NFV, NFV, NFV, NFV
6. 6
LogicalLogicalLogicalLogical Security: 1)Security: 1)Security: 1)Security: 1) ClarifyClarifyClarifyClarify ResponsabilitiesResponsabilitiesResponsabilitiesResponsabilities accordingaccordingaccordingaccording totototo
thethethethe choosenchoosenchoosenchoosen Service Model and Distribution ModelService Model and Distribution ModelService Model and Distribution ModelService Model and Distribution Model
7. 7
LogicalLogicalLogicalLogical Security: 2)Security: 2)Security: 2)Security: 2) ImplementImplementImplementImplement SecuritySecuritySecuritySecurity accordingaccordingaccordingaccording totototo
ResponsabilityResponsabilityResponsabilityResponsability
Cloud Service Provider Scope:
• Expose clear security levels of cloud SEs
• Inform customer about Certifications, Policies,
Processes, Responsabilities, Security Plan,
L. 196 obligations, and Checks (ex PT and VA)
in charge to TIM
• Contractually sign obligations and SLA
TIM
Customer
Customer Scope:
• Assist customer in understanding residual risk
• Consult the customer to secure its area of responsability
• Provide addictional Security Services and tools to mitigate its own risk
8. 8
LogicalLogicalLogicalLogical Security: 3) SecuritySecurity: 3) SecuritySecurity: 3) SecuritySecurity: 3) Security asasasas a service toa service toa service toa service to supportsupportsupportsupport SAASSAASSAASSAAS
TIM
Security
Competence
Center
TIM
Security
Operation
Center
9. 9
Market Security Addictional Services
Main Offered services
TIM Security Operation Center
AREAAREAAREAAREA
PROTECTIONPROTECTIONPROTECTIONPROTECTION
MAILMAILMAILMAIL
PROTECTIONPROTECTIONPROTECTIONPROTECTION
MSOCMSOCMSOCMSOC
HOSTHOSTHOSTHOST
PROTECTIONPROTECTIONPROTECTIONPROTECTION
SECURITYSECURITYSECURITYSECURITY
ASSESSMENTASSESSMENTASSESSMENTASSESSMENT
SECURITYSECURITYSECURITYSECURITY
MONITORINGMONITORINGMONITORINGMONITORING
DDOSDDOSDDOSDDOS
MITIGATIONMITIGATIONMITIGATIONMITIGATION
Virtual appliances to protect mission critical Web
Application, Data Bases o File Systems running into
the TIM cloud or on premises
Mail Relay service with Antispam &
Antivirus Layer for customer with Mail
Service offered by TIM or at Customer
Premises
Security Appliance Mgnt (IDS, IPS,
Boundary Antivirus, Web Content
Filtering, Antispam)
Distributed Denial-of-Service
Protection, to protect from attacks
aiming to block the service to
legitimate users.
Periodic Vulnerability Assessments,
Penetration Testing, Source Code Audit
executed by the TIM SOC
Monitoring of corporate anti-intrusion
systems to identify and block potential
attacks from internet as well as intranet
users and prevent system violation
• Cisco CCNA (Cisco Certified Network
Associate)
• Microsoft: “Microsoft Windows server”
• SCJP - Sun Certified Java Programmer
• ISO 20000 & 27001 Lead Auditor
• ECDL Core
• QCS - QualysGuard Certified Specialist
• Certified Information Forensics
Investigator – CIFI
• EC-Council Certified Security Analyst –
ECSA
• EC-Council Licensed Penetration Tester
– LTP
• Certified Ethical Hacker – CEH v7
• Microsoft Certified Systems Engineer
• CompTIA Security+ Certified (SYO-201)
• Fortinet Certified Network and Security
Associate (FCNSA)
• Juniper Networks Certified Internet
Associate (JNCIA-FWV)
• QualysGuard Certified Specialist
• Hands on Hacking Web Application
(HOH)
• Network and system security for
company and public administration
• Clavister Firewall Certification
• IT Security & Digital Forensics (Master)
• ISO 9000
• ISO 27001
10. 10
The world is changing rapidly: new security challanges
Where is my Perimeter? With Mobility and cloud, The company perimeter is now The
Internet! New cloud security Access Layers are required to secure corporate Apps
and data that are aware of used endpoint, access location, OS, Strong digital
Identity, and used application .
Titolo della Relazione
Nome del Relatore, Nome Struttura
How can I intelligently scan all of my Huge Cloud traffic? An enourmous amount of
information about activity monitoring Logs (users, Admins), Anomalies detection
(threads, usage, traffic, data scan) need to be handled every day. A big data
approch must be undertaken.
How I secure IoT? With IoT, Billions of low power and limited CPU devices with be
connected to applications generating trillions of daily events.
How I secure Smartphones? MDM and BYOD have low penetration. How do I secure
these endpoints in a more easy way?
11. 11
The world is changing rapidly: new security challanges
How can IHow can IHow can IHow can I enforceenforceenforceenforce datadatadatadata protectionprotectionprotectionprotection usingusingusingusing cloudcloudcloudcloud???? Corporate applications needs to
enforce data protection in different cloud deployment scenarios. How can I get
visibility on Shadow Cloud? How can I get contextual access control and prevent
data leakage on the cloud?
How can IHow can IHow can IHow can I securesecuresecuresecure the agile and collaborativethe agile and collaborativethe agile and collaborativethe agile and collaborative developmentsdevelopmentsdevelopmentsdevelopments???? Devops is growing
Fast. With continous Development, integration and delivery it is necessary to shift
from a traditional SLDC security enforcement to a more dynamic security
framework.
12. 12
Our Vision: Creating an Digital Ecosystem around the TIM
Cloud
• Expose our Infrastructural assets
(Network, BSS, CRM, Data Sets)
• Aggregate and attract Extewrnal
Communities (R&D, Start-ups, PPAA,
System Integrators, ISV,..)
• Broker Third Parties
(Cloud providers, SW Vendors,..)
• Enable an API economy
• Expose Commercial Capabilities
(sales force, resellers, payments)
• Enable collaborative Dev for
new generation of cloud- ready SAAS
(Mashup, Devops. Micro services)
• Sell IAAS, PAAS and SAAS
• Monetise the community
13. 13
New Security Requirements
• In the new Cloud Ecosystem new security requirements arise:
Titolo della Relazione
Nome del Relatore, Nome Struttura
• Secuity Pre-scan at Dev Stage
• Automatic Testing at Build and Push Time
• Secure microservices Registry
• Scanning container at run time
• WL/BL Container Registry
• Signed containers
• Centralise Log (Big Data)
• Contextual Access Control
• Ecrypt data in motion and data at rest
• Orchestrate enviroments (Dev, Test, Prod)
• Provide Dashboard for security Risk Ass
• Discover Shadow cloud apps
• Protect Mobile and IoT devices with
client less approach
• Provide SSO / Digital ID across apps
• Multi Factor Strong Auth
• IAM across apps
14. 14
Conclusions
• The trend of porting into the cloud existing legacy applications with well defined monolithic
sw architecture will fade away with time
• New security threads are continously arising from new emerging technologies such as IoT,
PAAS, middleware frameworks, microservices, containers,..
• The new TIM cloud will quickly become a collaborative enviroment where a number of
different entities will create together new services by aggregating capabilities under the form
of API, Building blocks, micro-services offered by community members.
Titolo della Relazione
Nome del Relatore, Nome Struttura
The scientific community need to help CPs with new Security Technologies,
Solutions, Methodologies and Standards.
The Cloud MUST Communicate SECURITY By Design!