SlideShare a Scribd company logo
1 of 8
Download to read offline
Practical view of cloud security
          Guy Bejerano - CSO
lligent Engagement

   Monitor web visitor s behavior
   (Over 1.2 B visits each month)   15 years, Public (LP

                                    10,000 customers
   Rank and Segmentation
                                    110 M$ in revenue

   Providing Engagement platform    500 employees
   (Over 10 M chats each month)
Only SAAS mode…no on-premise




Deploying code on customers websites




Process and Store customers data on our systems
cials   Hi-Tech   Telco   Retai
er 170 annual security audit (ENT customers)

                                                     Safe	
  Harbor	
  
                                                          3%	
             PCI	
  

 plica<on	
                                                                6%	
         Security	
  R&R	
  
                                                                                            9%	
  
b	
  Vulnerabili<es	
                                                                                           Event	
  
cy	
  Customiza<on	
                         SAS70	
                                                          Management	
  
                                              10%	
                                                               7%	
              Policy	
  Customiza<on	
  

rvice	
  
                                                                                                                                                3%	
  


icated	
  Security	
  Team	
  
nt	
  Management	
  

 rastructure	
                      DR	
  
                                   14%	
                                                                        Web	
  Vulnerabili<es	
  
work	
                                                                                                                   18%	
  




 mpliance	
  
bal	
  –	
  Safe	
  Harbor	
  
 	
  companies	
  –	
  SAS70	
  
  ncial	
  -­‐	
  PCI	
                                                   Network	
  
                                                                            30%	
  
rotect their data
 omply w/ their regulations   TRUST
ansparency & Control




             CSO       CTO
Remember who owns the data

Get familiar w/ local privacy regulations

Know your PII

Sometimes removing data is the best solution

 ncryption, Encryption, Encryption

Access control – Flexible & Audited
Thank You!



@liveperson.com
2546691381

More Related Content

Viewers also liked

Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityCSAIsrael
 
Mitesh Patel "Searching for new physics with the LHCb experiment"
Mitesh Patel "Searching for new physics with the LHCb experiment"Mitesh Patel "Searching for new physics with the LHCb experiment"
Mitesh Patel "Searching for new physics with the LHCb experiment"Yandex
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSKCSAIsrael
 
OpenStack and Rackspace
OpenStack and RackspaceOpenStack and Rackspace
OpenStack and RackspaceEverett Toews
 
Mirantis OpenStack 5.0 Overview
Mirantis OpenStack 5.0 OverviewMirantis OpenStack 5.0 Overview
Mirantis OpenStack 5.0 OverviewMirantis
 

Viewers also liked (7)

Oded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud SecurityOded Tsur - Ca Cloud Security
Oded Tsur - Ca Cloud Security
 
Mitesh Patel "Searching for new physics with the LHCb experiment"
Mitesh Patel "Searching for new physics with the LHCb experiment"Mitesh Patel "Searching for new physics with the LHCb experiment"
Mitesh Patel "Searching for new physics with the LHCb experiment"
 
Big datainmemory pub
Big datainmemory pubBig datainmemory pub
Big datainmemory pub
 
Open stack
Open stackOpen stack
Open stack
 
Ariel Litvin - CCSK
Ariel Litvin - CCSKAriel Litvin - CCSK
Ariel Litvin - CCSK
 
OpenStack and Rackspace
OpenStack and RackspaceOpenStack and Rackspace
OpenStack and Rackspace
 
Mirantis OpenStack 5.0 Overview
Mirantis OpenStack 5.0 OverviewMirantis OpenStack 5.0 Overview
Mirantis OpenStack 5.0 Overview
 

Similar to Guy Bejerano: A practical view of cloud security

Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the CloudRoman Stanek
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Scott Winter
 
PayGenius commercial presentation december
PayGenius commercial presentation decemberPayGenius commercial presentation december
PayGenius commercial presentation decemberCarole Rossetti
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A OperationalSOA Symposium
 
Sink Or Swim: Transitioning Your Software Business To SaaS
Sink Or Swim: Transitioning Your Software Business To SaaSSink Or Swim: Transitioning Your Software Business To SaaS
Sink Or Swim: Transitioning Your Software Business To SaaSApprenda
 
Sink Or Swim Transitioning Your Software Business To Saa S Scio And Apprenda
Sink Or Swim Transitioning Your Software Business To Saa S Scio And ApprendaSink Or Swim Transitioning Your Software Business To Saa S Scio And Apprenda
Sink Or Swim Transitioning Your Software Business To Saa S Scio And ApprendaScioSales
 
Itam Consulting Group Aug 2009
Itam Consulting Group Aug 2009Itam Consulting Group Aug 2009
Itam Consulting Group Aug 2009eashford
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...IBM India Smarter Computing
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...Ahmed Al Enizi
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCloud Congress
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringQ1 Labs
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easyosmius
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011Satish Hemachandran
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 

Similar to Guy Bejerano: A practical view of cloud security (20)

The Perfect Storm
The Perfect StormThe Perfect Storm
The Perfect Storm
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the Cloud
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02
 
PayGenius commercial presentation december
PayGenius commercial presentation decemberPayGenius commercial presentation december
PayGenius commercial presentation december
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Stefan Pappe Making S O A Operational
Stefan  Pappe    Making  S O A  OperationalStefan  Pappe    Making  S O A  Operational
Stefan Pappe Making S O A Operational
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
Sink Or Swim: Transitioning Your Software Business To SaaS
Sink Or Swim: Transitioning Your Software Business To SaaSSink Or Swim: Transitioning Your Software Business To SaaS
Sink Or Swim: Transitioning Your Software Business To SaaS
 
Sink Or Swim Transitioning Your Software Business To Saa S Scio And Apprenda
Sink Or Swim Transitioning Your Software Business To Saa S Scio And ApprendaSink Or Swim Transitioning Your Software Business To Saa S Scio And Apprenda
Sink Or Swim Transitioning Your Software Business To Saa S Scio And Apprenda
 
Itam Consulting Group Aug 2009
Itam Consulting Group Aug 2009Itam Consulting Group Aug 2009
Itam Consulting Group Aug 2009
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
 
Security Patterns How To Make Security Arch Easy To Consume
Security Patterns   How To Make Security Arch Easy To ConsumeSecurity Patterns   How To Make Security Arch Easy To Consume
Security Patterns How To Make Security Arch Easy To Consume
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
CCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas IlyadisCCCC Broadcom Nicholas Ilyadis
CCCC Broadcom Nicholas Ilyadis
 
Continuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk ScoringContinuous Monitoring and Real Time Risk Scoring
Continuous Monitoring and Real Time Risk Scoring
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Osmius: Monitoring Made Easy
Osmius: Monitoring Made EasyOsmius: Monitoring Made Easy
Osmius: Monitoring Made Easy
 
SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011SunGard Enterprise Cloud Services @ Cloud Connect 2011
SunGard Enterprise Cloud Services @ Cloud Connect 2011
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 

Guy Bejerano: A practical view of cloud security

  • 1. Practical view of cloud security Guy Bejerano - CSO
  • 2. lligent Engagement Monitor web visitor s behavior (Over 1.2 B visits each month) 15 years, Public (LP 10,000 customers Rank and Segmentation 110 M$ in revenue Providing Engagement platform 500 employees (Over 10 M chats each month)
  • 3. Only SAAS mode…no on-premise Deploying code on customers websites Process and Store customers data on our systems
  • 4. cials Hi-Tech Telco Retai
  • 5. er 170 annual security audit (ENT customers) Safe  Harbor   3%   PCI   plica<on   6%   Security  R&R   9%   b  Vulnerabili<es   Event   cy  Customiza<on   SAS70   Management   10%   7%   Policy  Customiza<on   rvice   3%   icated  Security  Team   nt  Management   rastructure   DR   14%   Web  Vulnerabili<es   work   18%   mpliance   bal  –  Safe  Harbor    companies  –  SAS70   ncial  -­‐  PCI   Network   30%  
  • 6. rotect their data omply w/ their regulations TRUST ansparency & Control CSO CTO
  • 7. Remember who owns the data Get familiar w/ local privacy regulations Know your PII Sometimes removing data is the best solution ncryption, Encryption, Encryption Access control – Flexible & Audited