SlideShare a Scribd company logo
1 of 15
Version2, Datacenter 2014 1
Hvorfor kun sikre Cloud’en halvt
- tænk sikkerhed fra starten…
Peter Schjøtt
Pr. Security Presales Engineer
Why Cloud
• Cloud characteristics – whether private or public
– Broad network access
– Rapid elasticity
– On-demand self-service
– Shared pool of resources
– Measured service
• Cost reduction through efficiency
• Comparable better security through standardisation
• Business focus on core, abstract from the rest
Version2, Datacenter 2014 3
Market Dynamics
4 4
Targeted Attacks & APT’s
Cloud
Private, Cloud, Hybrid
Change
Organization, Process, Regulation
Virtualization
& Software-Defined “X"
Version2, Datacenter 2014
5
Big Picture
5Version2, Datacenter 2014
Data Center Risks
Increased automation and the virtual layer increases the attack surface, convergence of
infrastructure creates big risk around privileged users.
Traditional Data Centers Private Cloud
Many servers, network and storage systems
in separate data centers with separate
admins; slow provisioning
Many servers, network and storage systems in
fewer consolidated data centers with high
automation and fewer admins; faster
provisioning
Large attack surface,
concentration of risk
Version2, Datacenter 2014 6
shifting gears the SDDC
7
Drivers
 Cost
 Speed
 Flexibility
Inhibitors
 Security Tax
 Complexity
 Compliance
The data center of the future is software-defined. It is dynamic and application-centric.
Our mission is to support our customers as they evolve to the SDDC.
DataCenterSecurity
Compute and Storage Virtualization
Network Virtualization
Software Defined Services
On-Prem/Private/Public Cloud Resources
Software-DefinedDataCenter
Applications and Policies
AutomationandManagementVersion2, Datacenter 2014
DataCenterSecurity
Compute and Storage Virtualization
Network Virtualization
Software Defined Services
On-Prem/Private/Public Cloud Resources
Software-DefinedDataCenter
Applications and Policies
AutomationandManagement
The Bets
Version2, Datacenter 2014
the
Cloud Betthe
virtualization Bet
78%
31%
25%
Securing private clouds is a good early
bet as private clouds will continue to be
strongly preferred over public and
hybrid clouds
HybridPublicPrivate
Source: IDC CloudTrack Survey, 2012
Security represents a large
opportunity as it is the key
obstacle for the
virtualization of mission
critical workloads
the
SDN Bet
Aligning with e.g. VMware
and Cisco to secure SDNs is
key as customers will
definitely adopt pure or
mixed SDNs at a rapid pace
the
SDDC Bet
DC Automation and
orchestration are key to
SDDCs and will mandate a
parallel need for security
orchestration.
67%
47%
57% 52%
41%
35% 40%
0%
20%
40%
60%
80%
Source: VMware Conference 2012
the
Data Center Bet
As Data Center
consolidation in combination
with virtualization increases
the concentration of risk, we
will see a corresponding
demand for security.
Data center consolidation is
projected to account for
27% of IT spend (2010-2016)
Gartner, 2011
8
DataCenterSecurity
Compute/Storage
Virtualization
Network
Virtualization
Software Defined
Services
On-Prem/Private/Public
Cloud Resources
Software-DefinedDataCenter Applications
and Policies
AutomationandManagement
Support for key
standards for private
clouds e.g. Openstack
and partner with
vendors delivering those
standards e.g.
Amazon, VMware, Ope
nstack
Security for leading
hypervisors
Security for hybrid
networks
Integrated security
orchestration
Dynamic, context-
based, policy-
centric security
Software Defined Security
“By 2015, 40% of
security controls
used in Enterprise
data centers will
be virtualized, up
from less than 5%
in 2010”
– Neil MacDonald
A dynamic, application-centric data center needs
dynamic, application-centric security.
SDN and SDDC platforms
will be enablers of security
consolidation offering a
platform for security
orchestration
the
Security Bet
Version2, Datacenter 2014 9
Version2, Datacenter 2014 10
Public Cloud
Cloud Computing Top Threats
• Data Breaches
• Data Loss
• Account or Service hijacking
• Insecure Interfaces and APIs
• Denial of Service
• Malicious Insiders
• Abuse of Cloud Services
• Insufficient Due Dilligence
• Shared Technology Vulnerablities
Version2, Datacenter 2014 11
What are my risks using Cloud
Identify the asset
Evaluate the asset
Map asset to Cloud
depl. models
Evaluate Cloud
service models and
providers
Map data flow
Conclusion
Version2, Datacenter 2014 12
HowdoyougetoutofaCloudagreement?
•Cloudvendorlock-in
•Datalock-in
Version2, Datacenter 2014 13
Summing up
Where can Symantec help
Version2, Datacenter 2014 14
Governance Prevention /
Protection /Assurace
Monitoring /
Reporting / Alerting
Mitigation /
Correction
Risk Analysis
Policies
Compliance
Vendor Risk
Risk modelling
Desktop/laptop/server
protection
Encryption
DLP
Messaging
Authentication
Certificates/PKI
Storage Management
Hypervisor hardening
Managed services
DeepSight
Backup
Archiving
Addressing Security Challenges Today
Version2, Datacenter 2014
Public
Cloud
Integrated Compliance
Views across platforms2
• Broadest Portfolio of Security
for physical & virtual1
Latest Offering –
DCS : Server and Advanced3
Best in Class Threat Intelligence
Symantec DeepSight / GIN4
• Symantec Protection Engine
for Cloud Services5
Information Security
• Threat Protection
• Server Hardening
• Hypervisor Hardening
• Encryption
• Data Protection
• Messaging Security
Information Assurance
• Archiving
• Backup
• Availability
Segmented
Physical/Virtual
Next Gen
SDDC
15
Thank you!
Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Other names may be trademarks of their respective owners.
This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or
implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.
Version2, Datacenter 2014 16
Peter Schjøtt
Peter_Schjott@symantec.com

More Related Content

What's hot

security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computingUday Wankar
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMNexgen Technology
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responsesshafzonly
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...SlideTeam
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 

What's hot (20)

security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Ensuring data storage security in cloud computing
Ensuring data storage security in cloud computingEnsuring data storage security in cloud computing
Ensuring data storage security in cloud computing
 
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEMTWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...Cloud Computing Security Organization Assessments Service Categories Responsi...
Cloud Computing Security Organization Assessments Service Categories Responsi...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 

Viewers also liked

Masteruddannelsen i projektledelse - Eva Riis, Syddansk Universitet
Masteruddannelsen i projektledelse - Eva Riis, Syddansk UniversitetMasteruddannelsen i projektledelse - Eva Riis, Syddansk Universitet
Masteruddannelsen i projektledelse - Eva Riis, Syddansk UniversitetMediehuset Ingeniøren Live
 
Videregående projektledelse i Niras, Claus Pilvang
Videregående projektledelse i Niras, Claus PilvangVideregående projektledelse i Niras, Claus Pilvang
Videregående projektledelse i Niras, Claus PilvangMediehuset Ingeniøren Live
 
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...Mediehuset Ingeniøren Live
 
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdrift
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdriftClaus Johannessen - Building Information Modeling – fra skitse til bygningsdrift
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdriftMediehuset Ingeniøren Live
 
Deltek: Kona – Vidensdeling og Social Collaboration
Deltek: Kona – Vidensdeling og Social CollaborationDeltek: Kona – Vidensdeling og Social Collaboration
Deltek: Kona – Vidensdeling og Social CollaborationMediehuset Ingeniøren Live
 
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff model
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff modelPeak Consulting Group: Kompleksitet i projekter - Complexity cliff model
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff modelMediehuset Ingeniøren Live
 
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.Miljø- og bæredygtighed i byggerier samt dokumentation af dette.
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.Mediehuset Ingeniøren Live
 
Metier: "Sådan implementerer Post Danmark PRINCE2® med succes
Metier: "Sådan implementerer Post Danmark PRINCE2® med succesMetier: "Sådan implementerer Post Danmark PRINCE2® med succes
Metier: "Sådan implementerer Post Danmark PRINCE2® med succesMediehuset Ingeniøren Live
 
Christina Just - Capax Recruitment - Jagten på kvindelige kandidater
Christina Just - Capax Recruitment - Jagten på kvindelige kandidaterChristina Just - Capax Recruitment - Jagten på kvindelige kandidater
Christina Just - Capax Recruitment - Jagten på kvindelige kandidaterMediehuset Ingeniøren Live
 
Thomas Riis: Udfordringerne for små og mellemstore virksomheder
Thomas Riis: Udfordringerne for små og mellemstore virksomhederThomas Riis: Udfordringerne for små og mellemstore virksomheder
Thomas Riis: Udfordringerne for små og mellemstore virksomhederMediehuset Ingeniøren Live
 
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?Mediehuset Ingeniøren Live
 
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...Mediehuset Ingeniøren Live
 
Klaus Jørgensen: Erfaringer fra ingeniørverdnen
Klaus Jørgensen: Erfaringer fra ingeniørverdnen Klaus Jørgensen: Erfaringer fra ingeniørverdnen
Klaus Jørgensen: Erfaringer fra ingeniørverdnen Mediehuset Ingeniøren Live
 
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi liv
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi livHør om biotek- og lifescience virksomhederne i Aarhus - her redder vi liv
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi livMediehuset Ingeniøren Live
 

Viewers also liked (19)

Masteruddannelsen i projektledelse - Eva Riis, Syddansk Universitet
Masteruddannelsen i projektledelse - Eva Riis, Syddansk UniversitetMasteruddannelsen i projektledelse - Eva Riis, Syddansk Universitet
Masteruddannelsen i projektledelse - Eva Riis, Syddansk Universitet
 
Debugging 2013- Peter Makholm
Debugging 2013- Peter MakholmDebugging 2013- Peter Makholm
Debugging 2013- Peter Makholm
 
Videregående projektledelse i Niras, Claus Pilvang
Videregående projektledelse i Niras, Claus PilvangVideregående projektledelse i Niras, Claus Pilvang
Videregående projektledelse i Niras, Claus Pilvang
 
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...
Styrk din rekruttering af specialister med sociale medier- Hans Ubbe Ebbesen-...
 
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdrift
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdriftClaus Johannessen - Building Information Modeling – fra skitse til bygningsdrift
Claus Johannessen - Building Information Modeling – fra skitse til bygningsdrift
 
Deltek: Kona – Vidensdeling og Social Collaboration
Deltek: Kona – Vidensdeling og Social CollaborationDeltek: Kona – Vidensdeling og Social Collaboration
Deltek: Kona – Vidensdeling og Social Collaboration
 
Datacenter 2014: Conscia - Peter Arberg
Datacenter 2014: Conscia - Peter ArbergDatacenter 2014: Conscia - Peter Arberg
Datacenter 2014: Conscia - Peter Arberg
 
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff model
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff modelPeak Consulting Group: Kompleksitet i projekter - Complexity cliff model
Peak Consulting Group: Kompleksitet i projekter - Complexity cliff model
 
Præsentation hmn projektværktøjsdagen 2014
Præsentation hmn projektværktøjsdagen 2014Præsentation hmn projektværktøjsdagen 2014
Præsentation hmn projektværktøjsdagen 2014
 
Datacenter 2014: Interxion - Flemming Søeberg
Datacenter 2014: Interxion - Flemming SøebergDatacenter 2014: Interxion - Flemming Søeberg
Datacenter 2014: Interxion - Flemming Søeberg
 
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.Miljø- og bæredygtighed i byggerier samt dokumentation af dette.
Miljø- og bæredygtighed i byggerier samt dokumentation af dette.
 
Metier: "Sådan implementerer Post Danmark PRINCE2® med succes
Metier: "Sådan implementerer Post Danmark PRINCE2® med succesMetier: "Sådan implementerer Post Danmark PRINCE2® med succes
Metier: "Sådan implementerer Post Danmark PRINCE2® med succes
 
Debugging 2013- Fredrik simonsson
Debugging 2013- Fredrik simonssonDebugging 2013- Fredrik simonsson
Debugging 2013- Fredrik simonsson
 
Christina Just - Capax Recruitment - Jagten på kvindelige kandidater
Christina Just - Capax Recruitment - Jagten på kvindelige kandidaterChristina Just - Capax Recruitment - Jagten på kvindelige kandidater
Christina Just - Capax Recruitment - Jagten på kvindelige kandidater
 
Thomas Riis: Udfordringerne for små og mellemstore virksomheder
Thomas Riis: Udfordringerne for små og mellemstore virksomhederThomas Riis: Udfordringerne for små og mellemstore virksomheder
Thomas Riis: Udfordringerne for små og mellemstore virksomheder
 
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?
Mikkel Nonboe: Giver enhedspatenten en øget risiko for software-patenter?
 
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...
Ulla Klinge: En yderligere mulighed for patentbeskyttelse i Europa – hvornår ...
 
Klaus Jørgensen: Erfaringer fra ingeniørverdnen
Klaus Jørgensen: Erfaringer fra ingeniørverdnen Klaus Jørgensen: Erfaringer fra ingeniørverdnen
Klaus Jørgensen: Erfaringer fra ingeniørverdnen
 
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi liv
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi livHør om biotek- og lifescience virksomhederne i Aarhus - her redder vi liv
Hør om biotek- og lifescience virksomhederne i Aarhus - her redder vi liv
 

Similar to Datacenter 2014: Symantec - Peter Schjøtt

Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloudJorge Sebastiao
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26TT L
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
The Future of Software Defined Data Center (SDDC)
The Future of Software Defined Data Center (SDDC)The Future of Software Defined Data Center (SDDC)
The Future of Software Defined Data Center (SDDC)Ahmed Banafa
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptxGopalThapa9
 

Similar to Datacenter 2014: Symantec - Peter Schjøtt (20)

Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Cloud security
Cloud security Cloud security
Cloud security
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Cloud security risks
Cloud security risksCloud security risks
Cloud security risks
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
The Future of Software Defined Data Center (SDDC)
The Future of Software Defined Data Center (SDDC)The Future of Software Defined Data Center (SDDC)
The Future of Software Defined Data Center (SDDC)
 
Citrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects failCitrix Synergy 2014 - Syn231 Why cloud projects fail
Citrix Synergy 2014 - Syn231 Why cloud projects fail
 
70 74
70 7470 74
70 74
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Datacenter 2014: Symantec - Peter Schjøtt

  • 1. Version2, Datacenter 2014 1 Hvorfor kun sikre Cloud’en halvt - tænk sikkerhed fra starten… Peter Schjøtt Pr. Security Presales Engineer
  • 2. Why Cloud • Cloud characteristics – whether private or public – Broad network access – Rapid elasticity – On-demand self-service – Shared pool of resources – Measured service • Cost reduction through efficiency • Comparable better security through standardisation • Business focus on core, abstract from the rest Version2, Datacenter 2014 3
  • 3. Market Dynamics 4 4 Targeted Attacks & APT’s Cloud Private, Cloud, Hybrid Change Organization, Process, Regulation Virtualization & Software-Defined “X" Version2, Datacenter 2014
  • 5. Data Center Risks Increased automation and the virtual layer increases the attack surface, convergence of infrastructure creates big risk around privileged users. Traditional Data Centers Private Cloud Many servers, network and storage systems in separate data centers with separate admins; slow provisioning Many servers, network and storage systems in fewer consolidated data centers with high automation and fewer admins; faster provisioning Large attack surface, concentration of risk Version2, Datacenter 2014 6
  • 6. shifting gears the SDDC 7 Drivers  Cost  Speed  Flexibility Inhibitors  Security Tax  Complexity  Compliance The data center of the future is software-defined. It is dynamic and application-centric. Our mission is to support our customers as they evolve to the SDDC. DataCenterSecurity Compute and Storage Virtualization Network Virtualization Software Defined Services On-Prem/Private/Public Cloud Resources Software-DefinedDataCenter Applications and Policies AutomationandManagementVersion2, Datacenter 2014
  • 7. DataCenterSecurity Compute and Storage Virtualization Network Virtualization Software Defined Services On-Prem/Private/Public Cloud Resources Software-DefinedDataCenter Applications and Policies AutomationandManagement The Bets Version2, Datacenter 2014 the Cloud Betthe virtualization Bet 78% 31% 25% Securing private clouds is a good early bet as private clouds will continue to be strongly preferred over public and hybrid clouds HybridPublicPrivate Source: IDC CloudTrack Survey, 2012 Security represents a large opportunity as it is the key obstacle for the virtualization of mission critical workloads the SDN Bet Aligning with e.g. VMware and Cisco to secure SDNs is key as customers will definitely adopt pure or mixed SDNs at a rapid pace the SDDC Bet DC Automation and orchestration are key to SDDCs and will mandate a parallel need for security orchestration. 67% 47% 57% 52% 41% 35% 40% 0% 20% 40% 60% 80% Source: VMware Conference 2012 the Data Center Bet As Data Center consolidation in combination with virtualization increases the concentration of risk, we will see a corresponding demand for security. Data center consolidation is projected to account for 27% of IT spend (2010-2016) Gartner, 2011 8
  • 8. DataCenterSecurity Compute/Storage Virtualization Network Virtualization Software Defined Services On-Prem/Private/Public Cloud Resources Software-DefinedDataCenter Applications and Policies AutomationandManagement Support for key standards for private clouds e.g. Openstack and partner with vendors delivering those standards e.g. Amazon, VMware, Ope nstack Security for leading hypervisors Security for hybrid networks Integrated security orchestration Dynamic, context- based, policy- centric security Software Defined Security “By 2015, 40% of security controls used in Enterprise data centers will be virtualized, up from less than 5% in 2010” – Neil MacDonald A dynamic, application-centric data center needs dynamic, application-centric security. SDN and SDDC platforms will be enablers of security consolidation offering a platform for security orchestration the Security Bet Version2, Datacenter 2014 9
  • 9. Version2, Datacenter 2014 10 Public Cloud
  • 10. Cloud Computing Top Threats • Data Breaches • Data Loss • Account or Service hijacking • Insecure Interfaces and APIs • Denial of Service • Malicious Insiders • Abuse of Cloud Services • Insufficient Due Dilligence • Shared Technology Vulnerablities Version2, Datacenter 2014 11
  • 11. What are my risks using Cloud Identify the asset Evaluate the asset Map asset to Cloud depl. models Evaluate Cloud service models and providers Map data flow Conclusion Version2, Datacenter 2014 12 HowdoyougetoutofaCloudagreement? •Cloudvendorlock-in •Datalock-in
  • 12. Version2, Datacenter 2014 13 Summing up
  • 13. Where can Symantec help Version2, Datacenter 2014 14 Governance Prevention / Protection /Assurace Monitoring / Reporting / Alerting Mitigation / Correction Risk Analysis Policies Compliance Vendor Risk Risk modelling Desktop/laptop/server protection Encryption DLP Messaging Authentication Certificates/PKI Storage Management Hypervisor hardening Managed services DeepSight Backup Archiving
  • 14. Addressing Security Challenges Today Version2, Datacenter 2014 Public Cloud Integrated Compliance Views across platforms2 • Broadest Portfolio of Security for physical & virtual1 Latest Offering – DCS : Server and Advanced3 Best in Class Threat Intelligence Symantec DeepSight / GIN4 • Symantec Protection Engine for Cloud Services5 Information Security • Threat Protection • Server Hardening • Hypervisor Hardening • Encryption • Data Protection • Messaging Security Information Assurance • Archiving • Backup • Availability Segmented Physical/Virtual Next Gen SDDC 15
  • 15. Thank you! Copyright © 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Version2, Datacenter 2014 16 Peter Schjøtt Peter_Schjott@symantec.com

Editor's Notes

  1. Based on interviews with customers as part of the VMware 2013 Journey to IT-as-a-Service Survey, 26% of respondents were in Stage I, 54% in Stage II and 21% in Stage III of this Journey.
  2. The way we have secured assets in the data center has changed over the last 10-15 years which was labour intensive as well as physically intensive. With the opportunities for customers that Virtualization and Private Clouds bring, the same security issues remain.
  3. Our product bets are being made to support customers are virtualizing everything they can to make it faster, more secure and easier to deliver new assets.We are building new products that deliver similar protection for the physical or virtual asset to assist them to secure the DCCS and SDN’s to help them properly realize the benefits of securing their critical data center infrastructure with the top vendors such as VMware, cisco
  4. As we focus on delivering our new Data Center Security products we are delivering highly flexible products to meet the challenges you have in an DNS supporting your businesses dynamic changes.