SlideShare a Scribd company logo
1 of 148
Download to read offline
Learn How Trend Micro Used AWS to
Build their Enterprise Security Offering
(Deep Security as a Service)
Mark Nunnikhoven, Principal Engineer at Trend Micro
November 14, 2013

© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
Friday, November 15, 13
"The following story is fictional and does
not depict any actual person or event"

Friday, November 15, 13
"The following story is completely real and
depicts actual people & events"
* Only the names have been changes to protect the innocent ;-)

Friday, November 15, 13
The stage

Friday, November 15, 13
What is Deep Security?

Centralized security control management

Friday, November 15, 13
What is Deep Security?

Centralized security control management
Manager

Friday, November 15, 13
What is Deep Security?

Centralized security control management
Manager

Friday, November 15, 13

Agent
What could be...

Friday, November 15, 13
What could be...
•

Friday, November 15, 13

For the cloud
What could be...

For the cloud
• In the cloud
•

Friday, November 15, 13
What was

Determine what an
appropriate visual here would
be (old style for contrast?)

Friday, November 15, 13
What was
•

Determine what an
appropriate visual here would
be (old style for contrast?)

Friday, November 15, 13

For the data center
What was

For the data center
• In the data center
•

Determine what an
appropriate visual here would
be (old style for contrast?)

Friday, November 15, 13
The story so far...

Friday, November 15, 13
Deep Security—The Early Years

Security for servers and virtual machines

Friday, November 15, 13
Deep Security—The Early Years

Security for servers and virtual machines
Product focus

•

Enterprise only

•

Tight integration with virtualization platform

•

Focused on Windows platforms

Friday, November 15, 13
Deep Security—The Middle Years

Security for servers and virtual machines

Friday, November 15, 13
Deep Security—The Middle Years

Security for servers and virtual machines
Big changes

•

Acquired by Trend Micro in 2009

•

Provided more protection

•

Agentless protection is key

•

Expanded platform support

Friday, November 15, 13
Deep Security—Now

Friday, November 15, 13
Deep Security—Now

Product changes

•

Protection regardless of location

•

“Single pane of glass”

•

Smart, simple, security that fits taken to heart

Friday, November 15, 13
Deep Security—Now

Security for servers, virtual machines
Product changes

•

Protection regardless of location

•

“Single pane of glass”

•

Smart, simple, security that fits taken to heart

Friday, November 15, 13
Deep Security—Now

Security for servers, virtual machines, & the cloud
Product changes

•

Protection regardless of location

•

“Single pane of glass”

•

Smart, simple, security that fits taken to heart

Friday, November 15, 13
The Decision

Time to offer Deep Security as a service

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

•

Work directly with clients

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

•

Work directly with clients

•

Smaller feedback loop for new features

Friday, November 15, 13
The players

Friday, November 15, 13
Internal Teams

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

People to win over
Executives
Information Security
Operations
R&D Product Team

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

vs

People to win over
Executives
Information Security
Operations
R&D Product Team

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

vs

People to win over
Executives
Information Security
Operations
R&D Product Team

Friday, November 15, 13
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

Friday, November 15, 13

+

People who helped
Executives
Information Security
Operations
R&D Product Team
Internal Teams

The Service Team
Executive sponsor
Key R&D product team
members
DevOps*

Friday, November 15, 13

+

People who helped
Executives
Information Security
Operations
R&D Product Team
Team Profile

Information Security
•

Own existing security policy

Friday, November 15, 13
Friday, November 15, 13
Team Profile

Information Security
•

Own existing security policy

Friday, November 15, 13
Team Profile

Information Security
•

Own existing security policy

•

400+ requirements for operational services

Friday, November 15, 13
Team Profile

Information Security
•

Own existing security policy

•

400+ requirements for operational services

•

Wants development of cloud best practices

Friday, November 15, 13
Team Profile

Operations
•

Run several data centers worldwide

Friday, November 15, 13
Team Profile

Operations
•

Run several data centers worldwide

•

Rigid change management with complex schedules

Friday, November 15, 13
Team Profile

Operations
•

Run several data centers worldwide

•

Rigid change management with complex schedules

•

Wants development of DevOps runbook

Friday, November 15, 13
Team Profile

R&D Product Team
•

Develop & maintain the product

Friday, November 15, 13
Team Profile

R&D Product Team
•

Develop & maintain the product

•

Only operational work is emergency support

Friday, November 15, 13
Team Profile

R&D Product Team
•

Develop & maintain the product

•

Only operational work is emergency support

•

Wants tighter feedback loop

Friday, November 15, 13
The details

Friday, November 15, 13
High Level Architecture

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Load balancers

Friday, November 15, 13
High Level Architecture

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Load Balancers

Friday, November 15, 13
Load Balancers

Requirements

•

3 flows, all incoming on :443

Friday, November 15, 13
Load Balancers

Requirements

•

3 flows, all incoming on :443

•

SSL off loading

Friday, November 15, 13
Load Balancers

Requirements

•

3 flows, all incoming on :443

•

SSL off loading

•

High number of concurrent connections

Friday, November 15, 13
Load Balancers

HAProxy
Met requirements
2+ instances required (for HA)
EC2 instance costs
More boxes to maintain

Friday, November 15, 13
Load Balancers

HAProxy

Elastic Load Balancing

Met requirements

Can meet requirements

2+ instances required (for HA)

3 load balancers required (1x
flow)

EC2 instance costs
More boxes to maintain

Cheap
Minimal maintenance

Friday, November 15, 13
Load Balancer Architecture

Fix

Load
Balancer

Friday, November 15, 13
Load Balancer Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer
Load Balancer Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer
Load Balancer Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
Load Balancer Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Load Balancer Architecture

Bi-direction communications

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Manager + Relay

Friday, November 15, 13
High Level Architecture

Load
Balancer

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Manager + Relay

Friday, November 15, 13
Manager + Relay

Requirements

•

Hosts JVM-based application

Friday, November 15, 13
Manager + Relay

Requirements

•

Hosts JVM-based application

•

Memory, CPU, and network are constraints

Friday, November 15, 13
Manager + Relay

AWS Windows Base
Met requirements
Harder to script
More expensive

Friday, November 15, 13
Manager + Relay

AWS Windows Base

AWS Linux Base

Met requirements

Met requirements

Harder to script

Simple scripting

More expensive

Cheaper

Friday, November 15, 13
Manager + Relay Architecture

Fix

Load
Balancer

Friday, November 15, 13
Manager + Relay Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer
Manager + Relay Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer
Manager + Relay Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
Manager + Relay Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Manager + Relay Architecture

Bi-direction communications

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Manager + Relay—Tips & Tricks

Friday, November 15, 13
Manager + Relay—Tips & Tricks

Tips & tricks

•

We don’t use AMIs

Friday, November 15, 13
Manager + Relay—Tips & Tricks

Tips & tricks

•

We don’t use AMIs

•

Auto-scale only for failover

Friday, November 15, 13
Database

Friday, November 15, 13
High Level Architecture

Load
Balancer

Friday, November 15, 13

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Database

Friday, November 15, 13
Database

Requirements

•

MS SQL or Oracle

Friday, November 15, 13
Database

Requirements

•

MS SQL or Oracle

•

Low latency path to Manager + Relay nodes

Friday, November 15, 13
Manager + Relay

on Amazon EC2
Met requirements
2x cost for clustered pairs
More maintenance

Friday, November 15, 13
Manager + Relay

on Amazon EC2

on Amazon RDS

Met requirements

Can meet requirements

2x cost for clustered pairs

1.3x cost for clustered pairs

More maintenance

Less effort

Friday, November 15, 13
Manager + Relay

MS SQL
Teams are more familiar
Better tools available*
30 DB limit per Amazon RDS
instance

Friday, November 15, 13
Manager + Relay

MS SQL

Oracle

Teams are more familiar

Forces product improvements

Better tools available*

“Encourages” learning

30 DB limit per Amazon RDS
instance

No tablespace limits

Friday, November 15, 13
Database Architecture

Fix

Load
Balancer

Friday, November 15, 13

Manager
+ Relay
Database Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
Database Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay
Database Architecture

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Database Architecture

Bi-direction communications

Fix

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Final(ish) Design

Friday, November 15, 13
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture
Add highly detailed graphic
here

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture
Add highly detailed graphic
here

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
High Level Architecture
Add highly detailed graphic
here

Bi-direction communications

Agent

Friday, November 15, 13

Load
Balancer

Manager
+ Relay

Database
Supporting Services

Friday, November 15, 13
Supporting Services

Amazon Route 53 for all
DNS

Friday, November 15, 13
Supporting Services

Amazon S3 for
deployment storage

Friday, November 15, 13
Supporting Services
Change graphic

AWS Trusted Advisor for
sanity checks

Friday, November 15, 13
Supporting Services
Change graphic

Premium Support for CYA

Friday, November 15, 13
“Soft” (not easy) changes

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Information Security
•

Own existing security policy

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Information Security
•

Own existing security policy

•

400+ requirements for operational services

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Information Security
•

Own existing security policy

•

400+ requirements for operational services

•

Wants development of cloud best practices

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Operations
•

Run several data centers worldwide

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Operations
•

Run several data centers worldwide

•

Rigid change management with complex schedules

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Operations
•

Run several data centers worldwide

•

Rigid change management with complex schedules

•

Wants development of DevOps runbook

Friday, November 15, 13
Chart Example
Region 1

Region 2

2007
Add stats for Service

2008

Add goals for other Trend
services

2009
2010
0

Friday, November 15, 13

25

50

75

100
Team Profile
Validating lessons for the
team

R&D Product Team
•

Develop & maintain the product

Friday, November 15, 13
Team Profile
Validating lessons for the
team

R&D Product Team
•

Develop & maintain the product

•

Only operational work is emergency support

Friday, November 15, 13
Team Profile
Validating lessons for the
team

R&D Product Team
•

Develop & maintain the product

•

Only operational work is emergency support

•

Wants tighter feedback loop

Friday, November 15, 13
Chart Example
Region 1

Region 2

2007
Add bug/feature stats

2008
2009
2010
0

Friday, November 15, 13

25

50

75

100
Team Profile
Validating lessons for the
team

Service Team
•

Own existing security policy

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Service Team
•

Own existing security policy

•

400+ requirements for operational services

Friday, November 15, 13
Team Profile
Validating lessons for the
team

Service Team
•

Own existing security policy

•

400+ requirements for operational services

•

Wants development of cloud best practices

Friday, November 15, 13
Chart Example
Region 1

Region 2

2007
Add stats for support?

2008
2009
2010
0

Friday, November 15, 13

25

50

75

100
Well?

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

•

Work directly with clients

Friday, November 15, 13
Why a Service?

Security for servers, virtual machines
Drivers

•

Face the same challenges as our clients

•

Work directly with clients

•

Smaller feedback loop for new features

Friday, November 15, 13
Please give us your feedback on this
presentation

SEC307
As a thank you, we will select prize
winners daily for completed surveys!

Friday, November 15, 13

Thank You

More Related Content

What's hot

Ponencia Principal - AWS Summit - Madrid
Ponencia Principal - AWS Summit - MadridPonencia Principal - AWS Summit - Madrid
Ponencia Principal - AWS Summit - MadridAmazon Web Services
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveAmazon Web Services
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveAmazon Web Services
 
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...Amazon Web Services
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Amazon Web Services
 
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)Amazon Web Services
 
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)Amazon Web Services
 
Getting Started with Amazon Redshift
Getting Started with Amazon RedshiftGetting Started with Amazon Redshift
Getting Started with Amazon RedshiftAmazon Web Services
 
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)Amazon Web Services Korea
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Building Your First Big Data Application on AWS
Building Your First Big Data Application on AWSBuilding Your First Big Data Application on AWS
Building Your First Big Data Application on AWSAmazon Web Services
 
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...Amazon Web Services
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveAmazon Web Services
 
ENT309 scaling up to your first 10 million users
ENT309 scaling up to your first 10 million usersENT309 scaling up to your first 10 million users
ENT309 scaling up to your first 10 million usersAmazon Web Services
 

What's hot (20)

Ponencia Principal - AWS Summit - Madrid
Ponencia Principal - AWS Summit - MadridPonencia Principal - AWS Summit - Madrid
Ponencia Principal - AWS Summit - Madrid
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and Archive
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and Archive
 
Getting Started with AWS IoT
Getting Started with AWS IoTGetting Started with AWS IoT
Getting Started with AWS IoT
 
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
ENT305 Migrating Your Databases to AWS: Deep Dive on Amazon Relational Databa...
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
 
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...
AWS re:Invent 2016: Case Study: How Atlassian Uses Amazon EFS with JIRA to Cu...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)
AWS re:Invent 2016: Workshop: Addressing Your Business Needs with AWS (ARC210)
 
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)
AWS re:Invent 2016: Getting Started with Amazon Aurora (DAT203)
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Getting Started with Amazon Redshift
Getting Started with Amazon RedshiftGetting Started with Amazon Redshift
Getting Started with Amazon Redshift
 
Sec301 Security @ (Cloud) Scale
Sec301 Security @ (Cloud) ScaleSec301 Security @ (Cloud) Scale
Sec301 Security @ (Cloud) Scale
 
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)
찾아가는 AWS 세미나(구로,가산,판교) - AWS 기반 빅데이터 활용 방법 (김일호 솔루션즈 아키텍트)
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Building Your First Big Data Application on AWS
Building Your First Big Data Application on AWSBuilding Your First Big Data Application on AWS
Building Your First Big Data Application on AWS
 
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...
AWS re:Invent 2016: re:Source Mini Con for Security Services State of the Uni...
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and Archive
 
ENT309 scaling up to your first 10 million users
ENT309 scaling up to your first 10 million usersENT309 scaling up to your first 10 million users
ENT309 scaling up to your first 10 million users
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
 

Viewers also liked

Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a ServiceUS-Ignite
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service BriefNishongo Gangchil
 
Security Service Management
Security Service ManagementSecurity Service Management
Security Service ManagementSakti Sumarna
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A ServiceMichael Davis
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceGeorge Fares
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedmounika k
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Javier Losa
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOCSolar Security
 

Viewers also liked (14)

Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service Brief
 
Security Service Management
Security Service ManagementSecurity Service Management
Security Service Management
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
 

Similar to How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AWS re:Invent 2013

Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013
Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013
Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013Amazon Web Services
 
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Amazon Web Services
 
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...Amazon Web Services
 
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...Amazon Web Services
 
Unlocked London - General Session
Unlocked London - General SessionUnlocked London - General Session
Unlocked London - General SessionWayne Walls
 
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013Amazon Web Services
 
The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersMarc Manthey
 
"Unlocked: The Hybrid Cloud" Business Track
"Unlocked: The Hybrid Cloud" Business Track"Unlocked: The Hybrid Cloud" Business Track
"Unlocked: The Hybrid Cloud" Business TrackHart Hoover
 
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...Amazon Web Services
 
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...Amazon Web Services
 
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...Amazon Web Services
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingSiva Arunachalam
 
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013Amazon Web Services
 
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...New Relic
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with ChefChef Software, Inc.
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...Ryan Koop
 
Sharing Best Practices and Recommendations from the Integration Battlefield
Sharing Best Practices and Recommendations from the Integration BattlefieldSharing Best Practices and Recommendations from the Integration Battlefield
Sharing Best Practices and Recommendations from the Integration BattlefieldWSO2
 
Webinar: How Viable is Google ColdLine Cloud Storage?
Webinar: How Viable is Google ColdLine Cloud Storage?Webinar: How Viable is Google ColdLine Cloud Storage?
Webinar: How Viable is Google ColdLine Cloud Storage?Storage Switzerland
 

Similar to How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AWS re:Invent 2013 (20)

Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013
Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013
Diving Into the New AWS SDK for Ruby (TLS305) | AWS re:Invent 2013
 
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013
 
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...
2nd Annual Start-up Launches with Dr. Werner Vogels (SPOT101) | AWS re:Invent...
 
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...
Scaling a Mobile Web App to 100 Million Clients and Beyond (MBL302) | AWS re:...
 
Unlocked London - General Session
Unlocked London - General SessionUnlocked London - General Session
Unlocked London - General Session
 
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013
SmugMug's Zero-Downtime Migration to AWS (ARC312) | AWS re:Invent 2013
 
The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side Developers
 
"Unlocked: The Hybrid Cloud" Business Track
"Unlocked: The Hybrid Cloud" Business Track"Unlocked: The Hybrid Cloud" Business Track
"Unlocked: The Hybrid Cloud" Business Track
 
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...
DevOps Nirvana: Seven Steps to a Peaceful Life on AWS (ARC210) | AWS re:Inven...
 
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
 
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...
Big Data Integration & Analytics Data Flows with AWS Data Pipeline (BDT207) |...
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
The Rise of BaaS
The Rise of BaaSThe Rise of BaaS
The Rise of BaaS
 
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013
A Modern Framework for Amazon Elastic MapReduce (BDT309) | AWS re:Invent 2013
 
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...
FUTURESTACK13: What’s New and Upcoming with New Relic from Patrick Lightbody,...
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with Chef
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
NATO IST Symposium 2013
NATO IST Symposium 2013NATO IST Symposium 2013
NATO IST Symposium 2013
 
Sharing Best Practices and Recommendations from the Integration Battlefield
Sharing Best Practices and Recommendations from the Integration BattlefieldSharing Best Practices and Recommendations from the Integration Battlefield
Sharing Best Practices and Recommendations from the Integration Battlefield
 
Webinar: How Viable is Google ColdLine Cloud Storage?
Webinar: How Viable is Google ColdLine Cloud Storage?Webinar: How Viable is Google ColdLine Cloud Storage?
Webinar: How Viable is Google ColdLine Cloud Storage?
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AWS re:Invent 2013