Enterprise File Synchronization and Sharing - Biscom VerosyncBiscomMarketing
Biscom Verosync is an Enterprise File Synchronization and Sharing Solution (EFSS) which allows users to share corporate documents easily while giving IT management and control of users, devices and access. Verosync
works within an organization's existing security and authentication infrastructure and allows them to meet compliance requirements. Users can access files securely any time and anywhere,
Privacy on the Series of Tubes of ThingsEFF-Austin
Created and presented by Todd Manning for the EFF-Austin Meetup on November 17, 2014 at Capital Factory in Austin, Texas.
https://www.youtube.com/watch?v=OiLpe3--ZB8
Enterprise File Synchronization and Sharing - Biscom VerosyncBiscomMarketing
Biscom Verosync is an Enterprise File Synchronization and Sharing Solution (EFSS) which allows users to share corporate documents easily while giving IT management and control of users, devices and access. Verosync
works within an organization's existing security and authentication infrastructure and allows them to meet compliance requirements. Users can access files securely any time and anywhere,
Privacy on the Series of Tubes of ThingsEFF-Austin
Created and presented by Todd Manning for the EFF-Austin Meetup on November 17, 2014 at Capital Factory in Austin, Texas.
https://www.youtube.com/watch?v=OiLpe3--ZB8
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
The final assignment in the Information Security 365/765 course I teach at UW-Madison, is for teams of students to put together company focused IT security presentations, in which they take the concepts learned in class throughout the entire semester, and apply them to a real company. Here is a sample from Team Netflix! I am proud of the students, and feel that they have gained a solid foundation in the field of information security. Another semester come and gone!
The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back.
Join us for a live webinar with James Condon, Director of Research at Lacework on the current and emerging threats to public cloud and how best to automate security and compliance across AWS, Azure, and GCP, including:
Current and emerging threats to AWS, Azure, and Google Cloud environments
Recommendations on how to prevent, detect, analyze, and respond to cloud cyber attacks
How to move away from a network-centric mindset and adopt a cloud approach
How Lacework can help you automate security and compliance across AWS, Azure, GCP, and private clouds
Translating Open Source Value to the CloudGordon Haff
Open source has not only helped free users from vendor lock-in; it has untapped new sources of innovation and enabled new opportunities for collaboration. These and other open source values are now serving to revolutionize cloud computing--indeed, to make it possible in the first place. Yet, it's not a simple literal translation. Open source protections such as licenses have different meanings, especially in public clouds. And new aspects of and potential threats to software freedom, like APIs, are central to cloud computing, whether on-premise or otherwise.
What is DRM?
DRM standards
Microsoft Playready , Apple FairPlay , OMA DRM
DRM Techniques
Streaming standards
HTTP live stream, MPEG DASH etc.
DRM content playback
Silverlight, Flash, HTML5 Premium Video Extensions
Rightscale Webinar: Building Blocks for Private and Hybrid CloudsRightScale
Looking for some solid guidance to help build your private or hybrid cloud? Want to turn your existing data center into a private cloud? Or perhaps you want to integrate your private cloud with a public cloud, but you’re not sure where to get started.
In this webinar you'll learn the key considerations for building a private or hybrid cloud, presented by the pros at RightScale who help our customers do this every single day.
We’ll discuss:
- Selecting hardware: How to decide which compute, networking and storage options to select.
- Private cloud considerations such as workload and infrastructure interaction, security, latency, user experience, and cost.
-Reference architectures and design considerations such as the location of physical hardware and configuration for availability and redundancy.
- Use cases and real-life scenarios: Private and hybrid clouds are especially well-suited for scalable applications with uncertain demand, disaster recovery and self-service IT portals.
- How to select the cloud solution provider that’s right for you, and how to manage your cloud resources effectively.
You’ll leave this webinar with a thorough understanding of building blocks for private and hybrid clouds.
We are changing passwords and security, forever. How? By training your files and folders to recognize only you. Our favorite pets recognize us as their owners thank to biological markers. The itsME Rocks solution to security relies on the same principle. Using existing cloud based bio-metric and quantum key technologies itsME Rocks combine those to make your data "smarter". Password access and data unlocking are only possible if the combination of positive results meets a combined threshold. Your data will only unlock itself if the biological and quantum key markers combine correctly.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Keeping data private and secure has always been a business imperative for data privacy and regulatory compliance reasons, and as businesses seriously consider migrating to the cloud, data security is one of the most significant concerns. Once data is moved to the cloud, it becomes vulnerable to a number of new threats, and data security must be addressed jointly by the cloud provider and the customer itself. In our presentation we will discuss the shared responsibility module, review the pros and cons of current approaches to cloud data security, and discuss new and emerging technologies such as split-key encryption and partially homomorphic key encryption that enables organizations to maintain data privacy in a public cloud environment.
This presentation brought to you by Ariel Dan, Co-Founder VP sales & Marketing at Porticor cloud security.
Frontier Technology: Demystifying 5 Myths of Cloud StorageFrontier Technology
Every organisation, on its cloud journey, starts with asking questions. A lot of questions, so they can have more clarity about what their cloud transformation will look like. At Frontier, we try to understand their biggest business objectives and challenges, so that we can create a tailor-made cloud roadmap for their business. During our journey of over fifteen years in the cloud business, we have come across many conversations and many more cloud myths that we kept on debunking. Thus, we decided to take this up with the entire cloud community and what could be a better opportunity for us to bust them here and now.
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
The final assignment in the Information Security 365/765 course I teach at UW-Madison, is for teams of students to put together company focused IT security presentations, in which they take the concepts learned in class throughout the entire semester, and apply them to a real company. Here is a sample from Team Netflix! I am proud of the students, and feel that they have gained a solid foundation in the field of information security. Another semester come and gone!
The vast majority of cloud security threats are from misconfigured IaaS instances, compromised accounts, and insider threats but there's emerging threats on the rise as well. And you’ll need deep visibility into your workloads and containers to fight back.
Join us for a live webinar with James Condon, Director of Research at Lacework on the current and emerging threats to public cloud and how best to automate security and compliance across AWS, Azure, and GCP, including:
Current and emerging threats to AWS, Azure, and Google Cloud environments
Recommendations on how to prevent, detect, analyze, and respond to cloud cyber attacks
How to move away from a network-centric mindset and adopt a cloud approach
How Lacework can help you automate security and compliance across AWS, Azure, GCP, and private clouds
Translating Open Source Value to the CloudGordon Haff
Open source has not only helped free users from vendor lock-in; it has untapped new sources of innovation and enabled new opportunities for collaboration. These and other open source values are now serving to revolutionize cloud computing--indeed, to make it possible in the first place. Yet, it's not a simple literal translation. Open source protections such as licenses have different meanings, especially in public clouds. And new aspects of and potential threats to software freedom, like APIs, are central to cloud computing, whether on-premise or otherwise.
What is DRM?
DRM standards
Microsoft Playready , Apple FairPlay , OMA DRM
DRM Techniques
Streaming standards
HTTP live stream, MPEG DASH etc.
DRM content playback
Silverlight, Flash, HTML5 Premium Video Extensions
Rightscale Webinar: Building Blocks for Private and Hybrid CloudsRightScale
Looking for some solid guidance to help build your private or hybrid cloud? Want to turn your existing data center into a private cloud? Or perhaps you want to integrate your private cloud with a public cloud, but you’re not sure where to get started.
In this webinar you'll learn the key considerations for building a private or hybrid cloud, presented by the pros at RightScale who help our customers do this every single day.
We’ll discuss:
- Selecting hardware: How to decide which compute, networking and storage options to select.
- Private cloud considerations such as workload and infrastructure interaction, security, latency, user experience, and cost.
-Reference architectures and design considerations such as the location of physical hardware and configuration for availability and redundancy.
- Use cases and real-life scenarios: Private and hybrid clouds are especially well-suited for scalable applications with uncertain demand, disaster recovery and self-service IT portals.
- How to select the cloud solution provider that’s right for you, and how to manage your cloud resources effectively.
You’ll leave this webinar with a thorough understanding of building blocks for private and hybrid clouds.
We are changing passwords and security, forever. How? By training your files and folders to recognize only you. Our favorite pets recognize us as their owners thank to biological markers. The itsME Rocks solution to security relies on the same principle. Using existing cloud based bio-metric and quantum key technologies itsME Rocks combine those to make your data "smarter". Password access and data unlocking are only possible if the combination of positive results meets a combined threshold. Your data will only unlock itself if the biological and quantum key markers combine correctly.
Cloud Security & Cloud Encryption Explained by Porticor the industry leader in Cloud Data Security. Learn from Porticor the issues for cloud security and how to protect your data in the cloud. Learn more about cloud security at http://www.porticor.com
Keeping data private and secure has always been a business imperative for data privacy and regulatory compliance reasons, and as businesses seriously consider migrating to the cloud, data security is one of the most significant concerns. Once data is moved to the cloud, it becomes vulnerable to a number of new threats, and data security must be addressed jointly by the cloud provider and the customer itself. In our presentation we will discuss the shared responsibility module, review the pros and cons of current approaches to cloud data security, and discuss new and emerging technologies such as split-key encryption and partially homomorphic key encryption that enables organizations to maintain data privacy in a public cloud environment.
This presentation brought to you by Ariel Dan, Co-Founder VP sales & Marketing at Porticor cloud security.
Frontier Technology: Demystifying 5 Myths of Cloud StorageFrontier Technology
Every organisation, on its cloud journey, starts with asking questions. A lot of questions, so they can have more clarity about what their cloud transformation will look like. At Frontier, we try to understand their biggest business objectives and challenges, so that we can create a tailor-made cloud roadmap for their business. During our journey of over fifteen years in the cloud business, we have come across many conversations and many more cloud myths that we kept on debunking. Thus, we decided to take this up with the entire cloud community and what could be a better opportunity for us to bust them here and now.
1. Cloudy with a Chance
of Storms
Copyright and Confidentiality
for SaaS and Remote Computing
Chris Gatewood
GRIPLA
@gatewood5000
September
2011
www.thresholdcounsel.com
2. To the Cloud!
• In particular:
– SaaS
– Storage and sharing
• Ease of use
• Scalability
• Internal savings
3. 1: Copyright
Chance of Storms
1. Copyright
2. Confidentialit
y
4. 1: Copyright
Copyright Concerns
• Storage, sharing
• Sharepoint, Dropbox, Box.net
• “lets you bring your
photos, docs, and videos
anywhere and share them
easily”
• “secure, easy way for
businesses to manage
content, share large files and
collaborate online from
anywhere”
6. RIAA1: LimeWire, 2010-2011
v. Copyright
• Infringement and inducement
• Grokster part two
• intended to encourage infringement because:
1. aware of substantial infringement;
2. efforts to attract infringing users;
3. enabled and assisted users to commit infringement;
4. business based on infringement; and
5. failure to mitigate infringing activities
7. RIAA Copyright
1: v. Box.net, 2011
• “Move along, nothing to see here”
• RIAA sent a subpoena to Box.net for identity of users
• 17 U.S.C. § 512, safe harbor under DMCA for ISPs
• An ISP subpoena, like many torrent-type cases
• Box.net is not a target, simply like a Verizon or Comcast
8. 1:Cloud Storage
Copyright
What to watch
• Any new hub for
entertainment content
• How presented, how
used
• Benefits of the Grokster
and LimeWire lessons
9. Traditional Licensing:
1: Copyright
Software
• Business need
• Existing product or
build to
Specification
• Delivery
• Installation
10. Subscriptions: Software as a
1: Copyright
Service
• Business need
• Existing service
• Maybe customized
• Access
11. 1: Copyright
Different Agreements
• Product: License
• Copyright and code
• Service: Subscription
• SLAs
• Essentially a utility
• Remedies
12. 1: Copyright
Confidentiality
• Risk management
• Examine needs and
options
• Not everything
should go to the
cloud
13. Confidentiality
1: Copyright
Concerns
• Security
• Kick the tires, lift the hood
• Fight for real remedies
• Crossed wires
• Look hard at infrastructure
14. Confidentiality
1: Copyright
Concerns
• Contract Terms
• Security
• DIY backup
• Data ownership and portability
15. 1: Copyright
Suggestions
• Cloud is useful, here to stay
• Not a match for everything
• Keep some geeks
• Choose carefully where it
makes sense
• Shop for security
• Beware platform lock-in