SlideShare a Scribd company logo
Uw werkplek- en datacenterspecialist
Ontwerpen • Implementeren • Optimaliseren
Inspiratiesessie
‘Cloud & Security’
Agenda
• 12.00 - 13.00 uur Lunch
• 13.00 - 13.15 uur Opening & welkom
• 13.15 - 14.15 uur Deel I - Cloud
• 14.15 - 14.45 uur Koffiepauze
• 14.45 - 16.00 uur Deel II - Security
• 16.00 - … uur Afsluiting & borrel
Even voorstellen
Arjen Visser
Directeur Sales
Over ICT-Partners
• 80 experts
• Meer dan 15 jaar ervaring
• Drie vestigingen
WEST
(opgericht	per	1	mei)
Noord	(Paterswolde)
Focus ICT-Partners
• Transities van werkplek- en datacenter infrastructuur
• Architectuur / Roadmapping
• Security
• Cloud (services, Azure, Office 365)
• Automation
Partners
ICT-Partners over ICT
Optimaliseer investeringen en investeer in innovatie
Maak van ICT een echte business-enabler
Een juist strategisch ICT-beleid omarmt technologische ontwikkelingen
die de concurrentiepositie van de business versterken.
Deel I - Cloud
‘De (praktijk)voordelen van Microsoft Cloud’
Door Jan Depping, Microsoft / André Kamman, ICT-Partners
Digital Transformation
Jan Depping
Partner Technology Strategist
MCSA Cloud
jan.depping@microsoft.com
https://www.linkedin.com/in/jdepping
Technology is fast
reshaping our world and
has the potential to change
everything – people,
businesses, communities
and nations.”
“
Employees work on nearly 2x the
number of teams than they did
five years ago*
41% employees say mobile business
apps are changing the way they work*
Information overload wastes
25% of employee time, costing
U.S. business $997B each year*
160M customer records leaked*
229 days to detect security infiltration*
- Luis Alvarez, CEO, Global Services, BT
BT Global Services CIO report 2016: The Digital CIO * Multiple industry sources.
T
D
RThink
Foresight
Reflect
Hindsight
Insight
Do
Automation
Change
Trust
Azure	Intelligent	Cloud
Jan Depping
Partner Technology Strategist
MCSA Cloud
jan.depping@microsoft.com
https://www.linkedin.com/in/jdepping
Usage is our way of living
Infinit
e
devices and data
Finite
time and
attention
DATA
Compliant and Trustworthy
Continuous Change
Freedom of Choice
Software Defined
Self-Service
Pay per Use
Build to Fail
Sharing
Ecosystem Provided
Languages, Dev
Tools & App
Containers
CMS & Apps
Devices
Databases
Management
MS Integrated
Operating
systems Bring
your own
libcloud
jclouds
IDE
West US
West US 2
Microsoft infrastructure
38 Cloud regions worldwide
Central US
East US
North Central US
Brazil South
West Europe
Japan East
South India
Southeast
Asia
Australia Southeast
Australia East
Central India
West India
Japan West
East Asia
China West1
North Europe
Germany
Northeast2
Canada East
Canada Central
South Central US
China East1
Germany
Central2
Korea
South3
East US 2
Korea Central3
United Kingdom West
United Kingdom
South
West Central US
US Gov Virginia
US Gov Iowa
US DoD East
US DoD
West
France3
France3
100+ datacenters
One of 3 largest networks in the world
1China datacenters operated by 21 Vianet
2German data trustee services provided by
T-systems
3France, South Korea and US Gov datacenter
regions have been announced but are not
currently operational
Sovereign datacenters
Global datacenters
US Gov Texas3
US Gov Arizona3
Hy
Partner IT
Responsibility
Storage
Servers
Networking
OS
Middleware
Virtualization
Applications
Data
Runtime
OS
Middleware
Applications
Data
Runtime
Data
Applications
Data
OS
Middleware
Applications
Data
Runtime
Virtualization
Hybrid cloudCustomized Commoditized
Platform Services
Infrastructure Services
Web
Apps
Mobile
Apps
API
Apps
Notification
Hubs
Hybrid
Cloud
Backup
StorSimple
Azure Site
Recovery
Import/Export
SQL
Database DocumentDB
Redis
Cache
Azure
Search
Storage
Tables
SQL Data
Warehouse
Azure AD
Health Monitoring
AD Privileged
Identity
Management
Operational
Analytics
Cloud
Services
Batch
RemoteApp
Service
Fabric
Visual Studio
Application
Insights
VS Team Services
Domain Services
HDInsight Machine
Learning Stream Analytics
Data
Factory
Event
Hubs
Data Lake
Analytics Service
IoT Hub
Data
Catalog
Security &
Management
Azure Active
Directory
Multi-Factor
Authentication
Automation
Portal
Key Vault
Store/
Marketplace
VM Image Gallery
& VM Depot
Azure AD
B2C
Scheduler
Xamarin
HockeyApp
Power BI
Embedded
SQL Server
Stretch Database
Mobile
Engagement
Functions
Cognitive Services Bot Framework Cortana
Security Center
Container
Service
VM
Scale Sets
Data Lake Store
BizTalk
Services
Service Bus
Logic
Apps
API
Management
Content
Delivery
Network
Media
Services
Media
Analytics
Reinventing Productivity
for the digital transformation
Office 365
The most complete, intelligent and secure service for digital work
Authoring
Word
Excel
PowerPoint
OneNote
Mail & Social
Outlook
Yammer
Sites & Content
OneDrive
SharePoint
Delve
Chat, Meetings
& Voice
Microsoft Teams
Skype for Business
Analytics
Power BI
MyAnalytics
Office 365 Groups Graph Security & Compliance
GDPR
Jan Depping
Partner Technology Strategist
MCSA Cloud
jan.depping@microsoft.com
https://www.linkedin.com/in/jdepping
Privacy, Trust, and the General
Data Protection Regulation (GDPR)
Providing	clarity	and	consistency	for	the	
protection	of	personal	data
Enhanced personal privacy rights
Increased duty for protecting data
Mandatory breach reporting
Significant penalties for non-compliance
The General Data Protection
Regulation (GDPR) imposes new
rules on organizations that offer goods
and services to people in the European
Union (EU), or that collect and analyze
data tied to EU residents, no matter
where they are located.
Personal
privacy
What	are	the	key	changes	with	the	GDPR?
Controls and
notifications
Transparent
policies
IT and training
Processors will need:
• Train privacy personnel
& employee
• Audit and update data
policies
• Employ a Data
Protection Officer (for
larger organizations)
• Create & manage
processor/vendor
contracts
Processors will need to:
• Protect personal data
using appropriate security
practices
• Notify authorities within
72 hours of breaches
• Receive consent before
processing personal data
• Keep records detailing
data processing
Individuals have the right to:
• Access their personal
data
• Correct errors in their
personal data
• Erase their personal data
• Object to processing of
their personal data
• Export personal data
Processors are required to:
• Provide clear notice of
data collection
• Outline processing
purposes and use cases
• Define data retention
and deletion policies
How do I get
started?
Identify what personal data you have and
where it resides
Discover1
Govern how personal data is used
and accessed
Manage2
Establish security controls to prevent, detect,
and respond to vulnerabilities & data breaches
Protect3
Keep required documentation, manage data
requests and breach notificationsReport4
Discover:
In-scope:
•
•
•
•
•
•
•
•
•
•
Inventory:
•
•
•
•
•
•
•
Microsoft Azure
Microsoft Azure Data Catalog
Enterprise Mobility + Security (EMS)
Microsoft Cloud App Security
Dynamics 365
Audit Data & User Activity
Reporting & Analytics
Office & Office 365
Data Loss Prevention
Advanced Data Governance
Office 365 eDiscovery
SQL Server and Azure SQL Database
SQL Query Language
Windows & Windows Server
Windows Search
Example solutions
1
2
Example solutions
Manage:
Data governance:
•
•
•
•
•
•
•
•
Data classification:
•
•
•
•
•
•
•
Microsoft Azure
Azure Active Directory
Azure Role-Based Access Control (RBAC)
Enterprise Mobility + Security (EMS)
Azure Information Protection
Dynamics 365
Security Concepts
Office & Office 365
Advanced Data Governance
Journaling (Exchange Online)
Windows & Windows Server
Microsoft Data Classification Toolkit
3
Example solutions
Protect:
Preventing data
attacks:
•
•
•
•
•
•
•
•
Detecting &
responding to
breaches:
•
•
•
•
•
•
Microsoft Azure
Azure Key Vault
Enterprise Mobility + Security (EMS)
Azure Active Directory Premium
Microsoft Intune
Office & Office 365
Advanced Threat Protection
Threat Intelligence
SQL Server and Azure SQL Database
Transparent data encryption
Always Encrypted
Windows & Windows Server
Windows Defender Advanced Threat Protection
Windows Hello
Device Guard
4
Example solutions
Report:
Record-keeping:
•
•
•
•
•
Reporting tools:
•
•
•
•
•
•
Microsoft Trust Center
Service Trust Portal
Microsoft Azure
Azure Auditing & Logging
Microsoft Azure Monitor
Enterprise Mobility + Security (EMS)
Azure Information Protection
Dynamics 365
Reporting & Analytics
Office & Office 365
Service Assurance
Office 365 Audit Logs
Customer Lockbox
Windows & Windows Server
Windows Defender Advanced Threat Protection
Data governance &
rights management
Responsibility SaaS PaaS IaaS On-prem
Client endpoints
Account & access
management
Identity & directory
infrastructure
Application
Network controls
Operating system
Physical network
Physical datacenter
CustomerMicrosoft
Physical hosts
ALWAYS RETAINED BY CUSTOMER
VARIES BY SERVICE TYPE
TRANSFERS TO CLOUD PROVIDER
Cloud service provider responsibility
Customer responsibility
A Partnership
CLOUD CONSUMER
AS DATA
CONTROLLER
Information	security,	privacy,	
compliance,	legal,	policy	
requirements
1
CLOUD PROVIDER
AS DATA
PROCESSOR
MICROSOFT
COMMITMENTS
Customer	requests	
assurances	from	Cloud	
vendor
3
Customer	demonstrates
compliance.6
CUSTOM(ER)	CONTROLS	&	PROCESSES
Customer	evaluates claims	
and	adds additional controls5
CLOUD	PROVIDER	CLAIMS
RISKS
GOVERNANCE,	RISK	&	COMPLIANCE
Customer	continuous
assessment2
MITIGATING	CONTROLS	
Monitoring
Investigation
Examination
REAL	TIME	INSIGHTS
Microsoft	provides
attestations,	certifications and	
legal commitments
4CONTRACTING
INDEPENDENTLY	VERIFIED
DESCRIPTIVE	
INFORMATION
INTEGRATED	CONTROLS
CUSTOMER OR EMPLOYEE
OF CLOUD CONSUMER AS
DATA SUBJECT
Assurance process
The	coverage	reports	help	customers	to	
map	and	evaluate	Microsoft’s	assurances	to	
local	frameworks	(NEN7510	/	BIR)
CLOUD CONSUMER
AS DATA
CONTROLLER
Information	security,	privacy,	
compliance,	legal,	policy	
requirements
1
CLOUD PROVIDER
AS DATA
PROCESSOR
MICROSOFT
COMMITMENTS
Customer	requests	
assurances	from	Cloud	
vendor
3
Customer	demonstrates
compliance.6
CUSTOM(ER)	CONTROLS	&	PROCESSES
Customer	evaluates claims	
and	adds additional controls5
CLOUD	PROVIDER	CLAIMS
RISKS
GOVERNANCE,	RISK	&	COMPLIANCE
Customer	continuous
assessment2
MITIGATING	CONTROLS	
Monitoring
Investigation
Examination
REAL	TIME	INSIGHTS
Microsoft	provides
attestations,	certifications and	
legal commitments
4CONTRACTING
INDEPENDENTLY	VERIFIED
DESCRIPTIVE	
INFORMATION
INTEGRATED	CONTROLS
CUSTOMER OR EMPLOYEE
OF CLOUD CONSUMER AS
DATA SUBJECT
Assurance process
Online	Service	Terms	|	SLA
ISO	27001/2/17/18	|	ISAE	3000	SOC2-II	|	
FEDRamp	NIST	800-53r4
Trustcenter	|	white	papers	|	verbal	
discussions
EDISCOVERY	AND	ANALYTICS
ARCHIVING	AND	RETENTION
AUDITING	Activity	API/LOG
COMPLIANCE	STANDARDS
Resources
• Microsoft.com/GDPR
André Kamman
Introductie
Aanpak ICT-Partners
scans
workshops
adviesrapport
vernieuwingstraject
overdracht verbeterplan
Klanttevredenheid
IT Klantwaarde
Volwassenheidsmodel
Het moment om naar de cloud te gaan…
Wanneer
• Bij vernieuwing van software
• Bij verouderde hardware
• Extra functionaliteiten
• Capaciteit binnen de ICT-afdeling
• Workloads met piektijden
Wat
• Omzetten naar SaaS / Verplaatsen naar
cloud / Toch traditioneel datacenter
Bij een goede business case
Waarom
• Snelle implementatie
• Flexibiliteit
• Disaster recovery
• Automatische software updates
• Minder/geen Capital-expenditure
• Verhoogde samenwerking
• Locatie onafhankelijk
• Controle over documenten
• Security
• Beter omgaan met resources/energie
Infastructuur Stack
Housing
Netwerk
Compute &	Storage
(Compute,	Storage	en	Netwerk)
Virtualisatie
Windows	Servers
MiddleWare
Applicaties
IT-afdeling
Housing
Netwerk
Compute &	Storage
Housing
Netwerk
Compute &	Storage
(Compute,	Storage	en	Netwerk)
Virtualisatie
(Compute,	Storage	en	Netwerk)
Virtualisatie
Windows	Servers
MiddleWare
Housing
Netwerk
Compute &	Storage
(Compute,	Storage	en	Netwerk)
Virtualisatie
Windows	Servers
MiddleWare
Applicaties
SaaS
Diensten & applicaties
IaaS
PaaS
Use-Case scenario
Naar de cloud…
Voorbereidende stappen nemen
• Rationaliseer processen en bijbehorende applicaties
• Standaardiseer waar het kan
• Differentieer waar het waarde toevoegt
• Draagvlak creëren
Plannen
• Passend plan
• Gefaseerd / naast elkaar draaien
• Houd applicaties en data bij elkaar
• Lage risico apps eerst
Testen
• Testplan opstellen
• Scenario uitwerken
• Dummy testen
Use-Case 1: Microsoft Exchange
Aanleiding
Verouderde Exchange, te weinig opslagcapaciteit, ontbreken redundantie.
Migratie
• Technisch Ontwerp
• Planning
• Cut-over / Staged / IMAP of Hybrid migratie
• Dummy gebruikerstest
• Keyuser test (hybride test)
• Eindgebruikers overzetten
Voordelen
• Geen infrastructuur beheer meer
• Flexibele storage
• Archivering
• Geen Exchange migraties meer
• Ingebouwde back-up
Overige
• Je behoudt volledige controle
• Tenant aanvraag / subscription
• Beheren via GUI en Commandline
(scripts)
• Afbouwen oude omgeving
• Gebruikers opleiden
• Latency / wachttijden
Use-Case 2: Azure Backup & Site Recovery
Aanleiding
Verouderde back-upomgeving, tape drive defect, extra functionaliteiten.
Voordelen
• Geen infrastructuur beheer meer
• Geen tape handeling meer
• Lange termijn archivering
• Automatisch schalen
• Goedkope storage
• Redundantie in storage
• Noodscenario in de cloud
Overige
• Azure subscription
• Geen tape support
• Je behoudt volledige controle
• Beheer via Azure Backup Server
• Beheerders opleiden
• Backup, Restore en Site Recovery
• Latency / wachttijden
• Windows en Linux
Migratie
• Technisch Ontwerp
• Planning
• Migratie
• Data/vm/Exchange/SQL
• Backup en restore test
• Eerst kleine workload
• Volledig overzetten
• Afbouwen oude omgeving
Vragen
Deel II - Security
‘Hoe veilig is uw ICT-omgeving?’
Door Henri Vierhoven, ICT-Partners / Sjoerd de Jong, Exclusive Networks
Henri Vierhoven
Introductie
Onze oplossingen
ICT-Partners helpt u succesvol te zijn met uw ICT. Wij ontwerpen,
implementeren en optimaliseren ICT-omgevingen met de nieuwste
technologieën, die bijdragen aan continuïteit, stabiliteit en kostenbesparing.
Inhoud
• Geschiedenis security
• Wetgeving
• Bewustwording
• Quickscan
• Next-Generation Endpoint Security
ICT-security in het nieuws
Veranderingen binnen security domein
• Rechten
• Virus
• Internet
• Devices
• Websites
• Applicaties
• Wetgeving
Waarom anti-virus niet langer afdoende is
01100111
01010110
10101010
10100101
10001010
11010011
00101101
Wrappers
Veranderende ‘verschijning’ van een bestand
Variations / Obfuscators
Veranderende inhoudelijke code om uniek over
te komen
Packers
Bedoeld om enkel op een echte machine te
draaien (anti-VM, sleepers, interactions, anti-
debug)
Targeting
Bedoeld om enkel op een specifieke machine of
configuratie te draaien
Malicious Code
De daadwerkelijke onderliggende code met als
doelstelling informatie te stelen of te bewerken
Toenemend aantal aanvalskanalen
MALWARE EXPLOITS
File-less
• Memory-only
malware
Executables
• Ransomware
• Trojans
• Worms
• Backdoors
Browser
• Drive-by
Downloads
• Flash, Java
• iframe/html5,
plug-ins
Documents
• Office Doc
Exploits
• Adobe Macros
• SpearPhishing
e-mails
LIVE/INSIDER
Scripts
• Powershell
• PowerSploit
• WMI, VBS
Credentials
• Credential
Scraping
• Mimikatz
• Tokens
Wetgeving/richtlijnen
• Wet Meldplicht Datalekken 01-01-2016
• General Data Protection Regulation 25-05-2018
• BIG / BIR 2012 (Gemeenten)
• NEN7510 (Zorg)
• ISO27001 (Algemeen)
Quickscan ICT-Partners
• Inzicht – Bewustwording – Actie
• Pragmatische aanpak
• Leidraad van 9 punten + klantspecifieke
vraagstelling
• Vooraf doornemen van aanwezige
documentatie
• Interviews op verschillende organisatieniveaus
• Heldere rapportage
• Concrete vervolgstappen
• Quick wins
Endpoint Security
Toegepaste technologieën
Bron: 2017 Cyberthreat Defense Report
Endpoint Security Technology
Succesvolle aanvallen
Bron: 2017 Cyberthreat Defense Report
Aanvallen in het komende jaar
Bron: 2017 Cyberthreat Defense Report
Schade
Waarom Next-Generation Endpoint Security?
• Geschikt voor alle besturingssystemen
• Geschikt voor alle devices
• Trigger op niet toegestane gedragingen
• Toekomstbestendig
• Bewijslast t.b.v. wetgevingen datalekken (WMD, GDPR)
• Voorkomt dataverlies
• Voorkomt reputatieschade (WMD)
• Voorkomt downtime
Real-time, Unified Endpoint
Protection
Cybercrime
1903
1957
1981 2001
1988 2003
2007
2014
Geschiedenis
Bestaansrecht Cybercrime
1: Geld 2: Oorlogsvoering /
Hacktivisme
Makkelijk geld verdienen
Weinig risico
--------------------------------- +
Veel gegadigden
Online oorlog land tegen land
Doel: schade aanrichten, spionage en
onderbreken systemen.
à Cyber Warfare onderdeel van
strategie
Hacktivisme: Organisaties tegen
landen of andere organisaties.
Doel: Statement of onderbreking
systemen
Huidige Status
What’s Happening in Today’s Threat Landscape
In the past 12 months:
52%
compromised
1 to 5 times
by cyber attacks
Top 3
most difficult to secure
(along with mobile devices, social
media apps)
2014 2015 2016
56%
67%
86%
% of org’s to
augment/replace
existing endpoint
protection
Today’s Enterprises Face 3 BILLION Attacks
Legacy Threats
BLOCKED
Advanced Threats
DETECTED
Advanced Threats
UNDETECTED
50%
25%
25%
Traditional, AV-based Protection
Sandboxing Solutions
“Next-Generation”
Endpoint Security
Today’s Threats Easily Evade Detection by AV-based Solutions
01100111
01010110
10101010
10100101
10001010
11010011
00101101
Wrappers
Designed to turn known code into a new binary
Variations / Obfuscators
Designed to slightly alter code to make known
code appear new/different
Packers
Designed to make sure code runs only on a
real machine (anti-VM, sleepers, interactions,
anti-debug)
Targeting
Designed to allow code to run only on a
specific target machine/configuration
Malicious Code
The attack code that runs with the goal of
persisting, stealing, spying, or exfiltrating data
Endpoints are Vulnerable to Multiple Attack Vectors
MALWARE EXPLOITS
File-less
• Memory-only
malware
Executables
• Ransomware
• Trojans
• Worms
• Backdoors
Browser
• Drive-by
Downloads
• Flash, Java
• iframe/html5,
plug-ins
Documents
• Office Doc
Exploits
• Adobe Macros
• SpearPhishing e-
mails
LIVE/INSIDER
Scripts
• Powershell
• PowerSploit
• WMI, VBS
Credentials
• Credential
Scraping
• Mimikatz
• Tokens
Het antwoord
Endpoint Protection Essentials
FORENSICS
MITIGATION
REMEDIATION
DYNAMIC MALWARE DETECTION
DYNAMIC EXPLOIT DETECTION
PREVENTION
Whitelisting Blacklisting DFI
The SentinelOne Endpoint Protection Platform
Dynamic
Whitelisting /
Blacklisting
Cloud
Intelligence
PREVENTION
DETECTION RESPONSE
360-degree
Attack View
Forensics
Mitigation
Remediation
Rollback
Auto-immunize
Advanced
Static
Analysis
PRE-EXECUTION POST-EXECUTIONON-EXECUTION
STATIC
PROTECTION
DYNAMIC
PROTECTION
Dynamic
Behavior
Detection
Single Autonomous
Agent
70MB
Memory Footprint
Single Management
Console
Supports up to
25,000
Endpoints
Cloud
or
On-Premise
Deployment
Advanced Static Prevention
§ Major breakthrough in signature-less
detection, based on machine learning
§ Deep File Inspection (DFI) engine prevents
advanced malware-- on access
§ Supported on all endpoint platforms:
Windows / MacOS / Linux
§ Engine supports all mitigation actions
31,000
Unique file
characteristics
defined and referenced
Known and unknown
file-based malware
Detection: Distinguishing Malicious Behavior from Benign Behavior is
Complicated
Benign
Behavior
Malicious
Behavior
¹
Detection: Dynamic Behavior Tracking: A Machine Learning
Approach
SentinelOne
Agent
§ Monitors all system-
level activity:
§ System calls
§ Network calls
§ I/O transactions
§ Memory transactions
§ Builds full context of
endpoint’s application
behavior
001101
010100
110111
010000
101100
100101
010001
000101
110101
101010
101100
101011
110101
010110
101000
100101
011011
101001
001010
001110
001010
111011
001011
101011
011001
110101
110001
010111
001101
010100
110111
010000
101010
111010
110001
001100
000001
001110
101001
011101
101010
100111
110101
110110
101110
101101
101011
001001
111011
010101
011011
101110
110111
101010
001010
011010
110110
101100
101001
010010
100100
101010
110100
100100
100111
101101
010101
101110
111011
011110
Detection: Dynamic Behavior Tracking: A Machine Learning
Approach
SentinelOne
Agent
101000
100101
011011
101001
001010
001110
001010
111011
001011
101011
011001
110101
110001
010111
File creates a copy of itself
Opens up cmd.exe and
deletes the original file
Creates an autorun registry
key
Encrypts other files /
connects to outbound network /
logs keystrokes
MALWARE
DETECTED
.exe
Response: Deep Endpoint Visibility and 360o View of Attacks
Lightweight, autonomous agent
▪ Continuously monitors all user/kernel
activity on the user endpoint or server,
online or offline
▪ Server agents sit out-of-band,
preserving performance
Full-context forensics in real
time
▪ 360-degree view of threats, from
inception to termination
Accreditatie
Gartner Jan 2017
“SentinelOne Most Visionary”
“SentinelOne is the only vendor in this analysis
that includes full EDR-type functionality in the
core platform. SentinelOne is a good prospect to
replace or augment existing EPP solutions for
any company looking for a fresh approach and
integrated EDR…”
NSS Labs Jan 2017
“SentinelOne offers Best ROI”
Certified Replacement for Anti-Virus
§ SentinelOne outperforms and replaces
traditional AV-based solutions
§ Lightweight, fully-autonomous agent monitors
endpoints constantly
§ Dynamic Behavior Tracking identifies threats
across all vectors– not just malware
§ Product excellence
recognized across the IT
industry
Demonstratie
Vragen
Afsluiting
Bedankt!
ICT-Partners
PWA-laan 210
7311 SZ Apeldoorn
T 055 528 22 22
E Connect@ict-partners.nl
Hoofdweg 290
9765 CN Paterswolde
T 050 364 31 02
E Connect@ict-partners.nl

More Related Content

What's hot

How to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
How to Architect a Serverless Cloud Data Lake for Enhanced Data AnalyticsHow to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
How to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
Informatica
 
The Future of Data Management: The Enterprise Data Hub
The Future of Data Management: The Enterprise Data HubThe Future of Data Management: The Enterprise Data Hub
The Future of Data Management: The Enterprise Data HubCloudera, Inc.
 
Marketing Digital Command Center
Marketing Digital Command CenterMarketing Digital Command Center
Marketing Digital Command Center
DataWorks Summit
 
A Continuously Deployed Hadoop Analytics Platform?
A Continuously Deployed Hadoop Analytics Platform?A Continuously Deployed Hadoop Analytics Platform?
A Continuously Deployed Hadoop Analytics Platform?
DataWorks Summit/Hadoop Summit
 
Building big data solutions on azure
Building big data solutions on azureBuilding big data solutions on azure
Building big data solutions on azure
Eyal Ben Ivri
 
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
Cloudera, Inc.
 
Breaking the Silos: Storage for Analytics & AI
Breaking the Silos: Storage for Analytics & AIBreaking the Silos: Storage for Analytics & AI
Breaking the Silos: Storage for Analytics & AI
DataWorks Summit
 
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
DataWorks Summit/Hadoop Summit
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
Cloudera, Inc.
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
DataWorks Summit
 
Big data on Azure for Architects
Big data on Azure for ArchitectsBig data on Azure for Architects
Big data on Azure for Architects
Tomasz Kopacz
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
DataWorks Summit/Hadoop Summit
 
Azure Big data
Azure Big data Azure Big data
Azure Big data
Michel HUBERT
 
Democratizing Data Science on Kubernetes
Democratizing Data Science on Kubernetes Democratizing Data Science on Kubernetes
Democratizing Data Science on Kubernetes
John Archer
 
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
DataWorks Summit/Hadoop Summit
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache Metron
DataWorks Summit
 
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
DataWorks Summit
 
Big Data with Azure
Big Data with AzureBig Data with Azure
Big Data with Azure
Aaron (Ari) Bornstein
 
Customer Best Practices: Optimizing Cloudera on AWS
Customer Best Practices: Optimizing Cloudera on AWSCustomer Best Practices: Optimizing Cloudera on AWS
Customer Best Practices: Optimizing Cloudera on AWS
Cloudera, Inc.
 
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
DataStax
 

What's hot (20)

How to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
How to Architect a Serverless Cloud Data Lake for Enhanced Data AnalyticsHow to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
How to Architect a Serverless Cloud Data Lake for Enhanced Data Analytics
 
The Future of Data Management: The Enterprise Data Hub
The Future of Data Management: The Enterprise Data HubThe Future of Data Management: The Enterprise Data Hub
The Future of Data Management: The Enterprise Data Hub
 
Marketing Digital Command Center
Marketing Digital Command CenterMarketing Digital Command Center
Marketing Digital Command Center
 
A Continuously Deployed Hadoop Analytics Platform?
A Continuously Deployed Hadoop Analytics Platform?A Continuously Deployed Hadoop Analytics Platform?
A Continuously Deployed Hadoop Analytics Platform?
 
Building big data solutions on azure
Building big data solutions on azureBuilding big data solutions on azure
Building big data solutions on azure
 
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
Realizing the Promise of Big Data with Hadoop - Cloudera Summer Webinar Serie...
 
Breaking the Silos: Storage for Analytics & AI
Breaking the Silos: Storage for Analytics & AIBreaking the Silos: Storage for Analytics & AI
Breaking the Silos: Storage for Analytics & AI
 
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
A Tale of Two Regulations: Cross-Border Data Protection For Big Data Under GD...
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
Verizon: Finance Data Lake implementation as a Self Service Discovery Big Dat...
 
Big data on Azure for Architects
Big data on Azure for ArchitectsBig data on Azure for Architects
Big data on Azure for Architects
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Azure Big data
Azure Big data Azure Big data
Azure Big data
 
Democratizing Data Science on Kubernetes
Democratizing Data Science on Kubernetes Democratizing Data Science on Kubernetes
Democratizing Data Science on Kubernetes
 
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
Worldpay - Delivering Multi-Tenancy Applications in A Secure Operational Plat...
 
Just the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache MetronJust the sketch: advanced streaming analytics in Apache Metron
Just the sketch: advanced streaming analytics in Apache Metron
 
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
Beyond Kerberos and Ranger - Tips to discover, track and manage risks in hybr...
 
Big Data with Azure
Big Data with AzureBig Data with Azure
Big Data with Azure
 
Customer Best Practices: Optimizing Cloudera on AWS
Customer Best Practices: Optimizing Cloudera on AWSCustomer Best Practices: Optimizing Cloudera on AWS
Customer Best Practices: Optimizing Cloudera on AWS
 
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
Webinar - DataStax Enterprise 5.1: 3X the operational analytics speed, help f...
 

Similar to Inspiratiesessie Cloud en Security

ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
Albert Hoitingh
 
Aws compete latest (00000005) js
Aws compete latest (00000005) jsAws compete latest (00000005) js
Aws compete latest (00000005) js
SoHo Dragon
 
GIS Into to Cloud Microsoft Azure
GIS  Into  to Cloud Microsoft Azure GIS  Into  to Cloud Microsoft Azure
GIS Into to Cloud Microsoft Azure
Usama Wahab Khan Cloud, Data and AI
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
 
Microsoft Azure BI Solutions in the Cloud
Microsoft Azure BI Solutions in the CloudMicrosoft Azure BI Solutions in the Cloud
Microsoft Azure BI Solutions in the Cloud
Mark Kromer
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
Denodo
 
Accelerate Self-Service Analytics with Data Virtualization and Visualization
Accelerate Self-Service Analytics with Data Virtualization and VisualizationAccelerate Self-Service Analytics with Data Virtualization and Visualization
Accelerate Self-Service Analytics with Data Virtualization and Visualization
Denodo
 
Project Presentation_Group 2.pptx
Project Presentation_Group 2.pptxProject Presentation_Group 2.pptx
Project Presentation_Group 2.pptx
HarshSingh594306
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxAmazon Web Services
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
David J Rosenthal
 
Digital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdfDigital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdf
ssuserd23711
 
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptx
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptxTrack 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptx
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptxAmazon Web Services
 
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the CloudFSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
Amazon Web Services
 
GDPR
GDPRGDPR
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
DataWorks Summit
 
When SAP alone is not enough
When SAP alone is not enoughWhen SAP alone is not enough
When SAP alone is not enough
Cloudera, Inc.
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Customer migration to Azure SQL database, December 2019
Customer migration to Azure SQL database, December 2019Customer migration to Azure SQL database, December 2019
Customer migration to Azure SQL database, December 2019
George Walters
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Amazon Web Services
 

Similar to Inspiratiesessie Cloud en Security (20)

ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
ExpertsLive NL 2022 - Microsoft Purview - What's in it for my organization?
 
Aws compete latest (00000005) js
Aws compete latest (00000005) jsAws compete latest (00000005) js
Aws compete latest (00000005) js
 
GIS Into to Cloud Microsoft Azure
GIS  Into  to Cloud Microsoft Azure GIS  Into  to Cloud Microsoft Azure
GIS Into to Cloud Microsoft Azure
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Microsoft Azure BI Solutions in the Cloud
Microsoft Azure BI Solutions in the CloudMicrosoft Azure BI Solutions in the Cloud
Microsoft Azure BI Solutions in the Cloud
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
 
Accelerate Self-Service Analytics with Data Virtualization and Visualization
Accelerate Self-Service Analytics with Data Virtualization and VisualizationAccelerate Self-Service Analytics with Data Virtualization and Visualization
Accelerate Self-Service Analytics with Data Virtualization and Visualization
 
Project Presentation_Group 2.pptx
Project Presentation_Group 2.pptxProject Presentation_Group 2.pptx
Project Presentation_Group 2.pptx
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
 
Microsoft Azure Cloud Services
Microsoft Azure Cloud ServicesMicrosoft Azure Cloud Services
Microsoft Azure Cloud Services
 
Digital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdfDigital_IOT_(Microsoft_Solution).pdf
Digital_IOT_(Microsoft_Solution).pdf
 
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptx
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptxTrack 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptx
Track 6 Session 1_進入 AI 領域的第一步驟_資料平台的建置.pptx
 
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the CloudFSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
FSI201 FINRA’s Managed Data Lake – Next Gen Analytics in the Cloud
 
GDPR
GDPRGDPR
GDPR
 
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
Transforming and Scaling Large Scale Data Analytics: Moving to a Cloud-based ...
 
When SAP alone is not enough
When SAP alone is not enoughWhen SAP alone is not enough
When SAP alone is not enough
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Customer migration to Azure SQL database, December 2019
Customer migration to Azure SQL database, December 2019Customer migration to Azure SQL database, December 2019
Customer migration to Azure SQL database, December 2019
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 

More from ICT-Partners

Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaarWebinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
ICT-Partners
 
Experiencing the hyperconverged
Experiencing the hyperconvergedExperiencing the hyperconverged
Experiencing the hyperconverged
ICT-Partners
 
De innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplekDe innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplek
ICT-Partners
 
Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?
ICT-Partners
 
Citrix en Nutanix: de kracht van de combinatie
Citrix en Nutanix: de kracht van de combinatieCitrix en Nutanix: de kracht van de combinatie
Citrix en Nutanix: de kracht van de combinatie
ICT-Partners
 
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
ICT-Partners
 
The next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, SecureThe next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, Secure
ICT-Partners
 
Terug naar eenvoud in ICT
Terug naar eenvoud in ICTTerug naar eenvoud in ICT
Terug naar eenvoud in ICT
ICT-Partners
 
Mobiliteit zonder grenzen
Mobiliteit zonder grenzenMobiliteit zonder grenzen
Mobiliteit zonder grenzen
ICT-Partners
 
IoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UCIoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UC
ICT-Partners
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
ICT-Partners
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw data
ICT-Partners
 
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
ICT-Partners
 
Inzicht2
Inzicht2Inzicht2
Inzicht2
ICT-Partners
 
Uw datacenter als nutsvoorziening
Uw datacenter als nutsvoorzieningUw datacenter als nutsvoorziening
Uw datacenter als nutsvoorziening
ICT-Partners
 
Nutanix Technology Bootcamp
Nutanix Technology BootcampNutanix Technology Bootcamp
Nutanix Technology Bootcamp
ICT-Partners
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijven
ICT-Partners
 
Nutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieënNutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieën
ICT-Partners
 
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
ICT-Partners
 
Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)
ICT-Partners
 

More from ICT-Partners (20)

Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaarWebinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
 
Experiencing the hyperconverged
Experiencing the hyperconvergedExperiencing the hyperconverged
Experiencing the hyperconverged
 
De innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplekDe innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplek
 
Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?
 
Citrix en Nutanix: de kracht van de combinatie
Citrix en Nutanix: de kracht van de combinatieCitrix en Nutanix: de kracht van de combinatie
Citrix en Nutanix: de kracht van de combinatie
 
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
 
The next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, SecureThe next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, Secure
 
Terug naar eenvoud in ICT
Terug naar eenvoud in ICTTerug naar eenvoud in ICT
Terug naar eenvoud in ICT
 
Mobiliteit zonder grenzen
Mobiliteit zonder grenzenMobiliteit zonder grenzen
Mobiliteit zonder grenzen
 
IoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UCIoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UC
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw data
 
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
 
Inzicht2
Inzicht2Inzicht2
Inzicht2
 
Uw datacenter als nutsvoorziening
Uw datacenter als nutsvoorzieningUw datacenter als nutsvoorziening
Uw datacenter als nutsvoorziening
 
Nutanix Technology Bootcamp
Nutanix Technology BootcampNutanix Technology Bootcamp
Nutanix Technology Bootcamp
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijven
 
Nutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieënNutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieën
 
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
 
Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Inspiratiesessie Cloud en Security

  • 1. Uw werkplek- en datacenterspecialist Ontwerpen • Implementeren • Optimaliseren
  • 3. Agenda • 12.00 - 13.00 uur Lunch • 13.00 - 13.15 uur Opening & welkom • 13.15 - 14.15 uur Deel I - Cloud • 14.15 - 14.45 uur Koffiepauze • 14.45 - 16.00 uur Deel II - Security • 16.00 - … uur Afsluiting & borrel
  • 5. Over ICT-Partners • 80 experts • Meer dan 15 jaar ervaring • Drie vestigingen WEST (opgericht per 1 mei) Noord (Paterswolde)
  • 6. Focus ICT-Partners • Transities van werkplek- en datacenter infrastructuur • Architectuur / Roadmapping • Security • Cloud (services, Azure, Office 365) • Automation
  • 8. ICT-Partners over ICT Optimaliseer investeringen en investeer in innovatie Maak van ICT een echte business-enabler Een juist strategisch ICT-beleid omarmt technologische ontwikkelingen die de concurrentiepositie van de business versterken.
  • 9. Deel I - Cloud ‘De (praktijk)voordelen van Microsoft Cloud’ Door Jan Depping, Microsoft / André Kamman, ICT-Partners
  • 10. Digital Transformation Jan Depping Partner Technology Strategist MCSA Cloud jan.depping@microsoft.com https://www.linkedin.com/in/jdepping
  • 11. Technology is fast reshaping our world and has the potential to change everything – people, businesses, communities and nations.” “ Employees work on nearly 2x the number of teams than they did five years ago* 41% employees say mobile business apps are changing the way they work* Information overload wastes 25% of employee time, costing U.S. business $997B each year* 160M customer records leaked* 229 days to detect security infiltration* - Luis Alvarez, CEO, Global Services, BT BT Global Services CIO report 2016: The Digital CIO * Multiple industry sources.
  • 13. Azure Intelligent Cloud Jan Depping Partner Technology Strategist MCSA Cloud jan.depping@microsoft.com https://www.linkedin.com/in/jdepping
  • 14.
  • 15. Usage is our way of living
  • 17. Compliant and Trustworthy Continuous Change Freedom of Choice Software Defined Self-Service Pay per Use Build to Fail Sharing
  • 18.
  • 19. Ecosystem Provided Languages, Dev Tools & App Containers CMS & Apps Devices Databases Management MS Integrated Operating systems Bring your own libcloud jclouds IDE
  • 20.
  • 21.
  • 22. West US West US 2 Microsoft infrastructure 38 Cloud regions worldwide Central US East US North Central US Brazil South West Europe Japan East South India Southeast Asia Australia Southeast Australia East Central India West India Japan West East Asia China West1 North Europe Germany Northeast2 Canada East Canada Central South Central US China East1 Germany Central2 Korea South3 East US 2 Korea Central3 United Kingdom West United Kingdom South West Central US US Gov Virginia US Gov Iowa US DoD East US DoD West France3 France3 100+ datacenters One of 3 largest networks in the world 1China datacenters operated by 21 Vianet 2German data trustee services provided by T-systems 3France, South Korea and US Gov datacenter regions have been announced but are not currently operational Sovereign datacenters Global datacenters US Gov Texas3 US Gov Arizona3
  • 24. Platform Services Infrastructure Services Web Apps Mobile Apps API Apps Notification Hubs Hybrid Cloud Backup StorSimple Azure Site Recovery Import/Export SQL Database DocumentDB Redis Cache Azure Search Storage Tables SQL Data Warehouse Azure AD Health Monitoring AD Privileged Identity Management Operational Analytics Cloud Services Batch RemoteApp Service Fabric Visual Studio Application Insights VS Team Services Domain Services HDInsight Machine Learning Stream Analytics Data Factory Event Hubs Data Lake Analytics Service IoT Hub Data Catalog Security & Management Azure Active Directory Multi-Factor Authentication Automation Portal Key Vault Store/ Marketplace VM Image Gallery & VM Depot Azure AD B2C Scheduler Xamarin HockeyApp Power BI Embedded SQL Server Stretch Database Mobile Engagement Functions Cognitive Services Bot Framework Cortana Security Center Container Service VM Scale Sets Data Lake Store BizTalk Services Service Bus Logic Apps API Management Content Delivery Network Media Services Media Analytics
  • 25.
  • 26. Reinventing Productivity for the digital transformation
  • 27. Office 365 The most complete, intelligent and secure service for digital work Authoring Word Excel PowerPoint OneNote Mail & Social Outlook Yammer Sites & Content OneDrive SharePoint Delve Chat, Meetings & Voice Microsoft Teams Skype for Business Analytics Power BI MyAnalytics Office 365 Groups Graph Security & Compliance
  • 28. GDPR Jan Depping Partner Technology Strategist MCSA Cloud jan.depping@microsoft.com https://www.linkedin.com/in/jdepping
  • 29. Privacy, Trust, and the General Data Protection Regulation (GDPR)
  • 30. Providing clarity and consistency for the protection of personal data Enhanced personal privacy rights Increased duty for protecting data Mandatory breach reporting Significant penalties for non-compliance The General Data Protection Regulation (GDPR) imposes new rules on organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents, no matter where they are located.
  • 31. Personal privacy What are the key changes with the GDPR? Controls and notifications Transparent policies IT and training Processors will need: • Train privacy personnel & employee • Audit and update data policies • Employ a Data Protection Officer (for larger organizations) • Create & manage processor/vendor contracts Processors will need to: • Protect personal data using appropriate security practices • Notify authorities within 72 hours of breaches • Receive consent before processing personal data • Keep records detailing data processing Individuals have the right to: • Access their personal data • Correct errors in their personal data • Erase their personal data • Object to processing of their personal data • Export personal data Processors are required to: • Provide clear notice of data collection • Outline processing purposes and use cases • Define data retention and deletion policies
  • 32. How do I get started? Identify what personal data you have and where it resides Discover1 Govern how personal data is used and accessed Manage2 Establish security controls to prevent, detect, and respond to vulnerabilities & data breaches Protect3 Keep required documentation, manage data requests and breach notificationsReport4
  • 33. Discover: In-scope: • • • • • • • • • • Inventory: • • • • • • • Microsoft Azure Microsoft Azure Data Catalog Enterprise Mobility + Security (EMS) Microsoft Cloud App Security Dynamics 365 Audit Data & User Activity Reporting & Analytics Office & Office 365 Data Loss Prevention Advanced Data Governance Office 365 eDiscovery SQL Server and Azure SQL Database SQL Query Language Windows & Windows Server Windows Search Example solutions 1
  • 34. 2 Example solutions Manage: Data governance: • • • • • • • • Data classification: • • • • • • • Microsoft Azure Azure Active Directory Azure Role-Based Access Control (RBAC) Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Security Concepts Office & Office 365 Advanced Data Governance Journaling (Exchange Online) Windows & Windows Server Microsoft Data Classification Toolkit
  • 35. 3 Example solutions Protect: Preventing data attacks: • • • • • • • • Detecting & responding to breaches: • • • • • • Microsoft Azure Azure Key Vault Enterprise Mobility + Security (EMS) Azure Active Directory Premium Microsoft Intune Office & Office 365 Advanced Threat Protection Threat Intelligence SQL Server and Azure SQL Database Transparent data encryption Always Encrypted Windows & Windows Server Windows Defender Advanced Threat Protection Windows Hello Device Guard
  • 36. 4 Example solutions Report: Record-keeping: • • • • • Reporting tools: • • • • • • Microsoft Trust Center Service Trust Portal Microsoft Azure Azure Auditing & Logging Microsoft Azure Monitor Enterprise Mobility + Security (EMS) Azure Information Protection Dynamics 365 Reporting & Analytics Office & Office 365 Service Assurance Office 365 Audit Logs Customer Lockbox Windows & Windows Server Windows Defender Advanced Threat Protection
  • 37. Data governance & rights management Responsibility SaaS PaaS IaaS On-prem Client endpoints Account & access management Identity & directory infrastructure Application Network controls Operating system Physical network Physical datacenter CustomerMicrosoft Physical hosts ALWAYS RETAINED BY CUSTOMER VARIES BY SERVICE TYPE TRANSFERS TO CLOUD PROVIDER Cloud service provider responsibility Customer responsibility A Partnership
  • 38. CLOUD CONSUMER AS DATA CONTROLLER Information security, privacy, compliance, legal, policy requirements 1 CLOUD PROVIDER AS DATA PROCESSOR MICROSOFT COMMITMENTS Customer requests assurances from Cloud vendor 3 Customer demonstrates compliance.6 CUSTOM(ER) CONTROLS & PROCESSES Customer evaluates claims and adds additional controls5 CLOUD PROVIDER CLAIMS RISKS GOVERNANCE, RISK & COMPLIANCE Customer continuous assessment2 MITIGATING CONTROLS Monitoring Investigation Examination REAL TIME INSIGHTS Microsoft provides attestations, certifications and legal commitments 4CONTRACTING INDEPENDENTLY VERIFIED DESCRIPTIVE INFORMATION INTEGRATED CONTROLS CUSTOMER OR EMPLOYEE OF CLOUD CONSUMER AS DATA SUBJECT Assurance process The coverage reports help customers to map and evaluate Microsoft’s assurances to local frameworks (NEN7510 / BIR)
  • 39. CLOUD CONSUMER AS DATA CONTROLLER Information security, privacy, compliance, legal, policy requirements 1 CLOUD PROVIDER AS DATA PROCESSOR MICROSOFT COMMITMENTS Customer requests assurances from Cloud vendor 3 Customer demonstrates compliance.6 CUSTOM(ER) CONTROLS & PROCESSES Customer evaluates claims and adds additional controls5 CLOUD PROVIDER CLAIMS RISKS GOVERNANCE, RISK & COMPLIANCE Customer continuous assessment2 MITIGATING CONTROLS Monitoring Investigation Examination REAL TIME INSIGHTS Microsoft provides attestations, certifications and legal commitments 4CONTRACTING INDEPENDENTLY VERIFIED DESCRIPTIVE INFORMATION INTEGRATED CONTROLS CUSTOMER OR EMPLOYEE OF CLOUD CONSUMER AS DATA SUBJECT Assurance process Online Service Terms | SLA ISO 27001/2/17/18 | ISAE 3000 SOC2-II | FEDRamp NIST 800-53r4 Trustcenter | white papers | verbal discussions EDISCOVERY AND ANALYTICS ARCHIVING AND RETENTION AUDITING Activity API/LOG COMPLIANCE STANDARDS
  • 41.
  • 45.
  • 46.
  • 47. Het moment om naar de cloud te gaan… Wanneer • Bij vernieuwing van software • Bij verouderde hardware • Extra functionaliteiten • Capaciteit binnen de ICT-afdeling • Workloads met piektijden Wat • Omzetten naar SaaS / Verplaatsen naar cloud / Toch traditioneel datacenter Bij een goede business case Waarom • Snelle implementatie • Flexibiliteit • Disaster recovery • Automatische software updates • Minder/geen Capital-expenditure • Verhoogde samenwerking • Locatie onafhankelijk • Controle over documenten • Security • Beter omgaan met resources/energie
  • 48. Infastructuur Stack Housing Netwerk Compute & Storage (Compute, Storage en Netwerk) Virtualisatie Windows Servers MiddleWare Applicaties IT-afdeling Housing Netwerk Compute & Storage Housing Netwerk Compute & Storage (Compute, Storage en Netwerk) Virtualisatie (Compute, Storage en Netwerk) Virtualisatie Windows Servers MiddleWare Housing Netwerk Compute & Storage (Compute, Storage en Netwerk) Virtualisatie Windows Servers MiddleWare Applicaties SaaS Diensten & applicaties IaaS PaaS Use-Case scenario
  • 49. Naar de cloud… Voorbereidende stappen nemen • Rationaliseer processen en bijbehorende applicaties • Standaardiseer waar het kan • Differentieer waar het waarde toevoegt • Draagvlak creëren Plannen • Passend plan • Gefaseerd / naast elkaar draaien • Houd applicaties en data bij elkaar • Lage risico apps eerst Testen • Testplan opstellen • Scenario uitwerken • Dummy testen
  • 50. Use-Case 1: Microsoft Exchange Aanleiding Verouderde Exchange, te weinig opslagcapaciteit, ontbreken redundantie.
  • 51. Migratie • Technisch Ontwerp • Planning • Cut-over / Staged / IMAP of Hybrid migratie • Dummy gebruikerstest • Keyuser test (hybride test) • Eindgebruikers overzetten Voordelen • Geen infrastructuur beheer meer • Flexibele storage • Archivering • Geen Exchange migraties meer • Ingebouwde back-up Overige • Je behoudt volledige controle • Tenant aanvraag / subscription • Beheren via GUI en Commandline (scripts) • Afbouwen oude omgeving • Gebruikers opleiden • Latency / wachttijden
  • 52. Use-Case 2: Azure Backup & Site Recovery Aanleiding Verouderde back-upomgeving, tape drive defect, extra functionaliteiten.
  • 53. Voordelen • Geen infrastructuur beheer meer • Geen tape handeling meer • Lange termijn archivering • Automatisch schalen • Goedkope storage • Redundantie in storage • Noodscenario in de cloud Overige • Azure subscription • Geen tape support • Je behoudt volledige controle • Beheer via Azure Backup Server • Beheerders opleiden • Backup, Restore en Site Recovery • Latency / wachttijden • Windows en Linux
  • 54. Migratie • Technisch Ontwerp • Planning • Migratie • Data/vm/Exchange/SQL • Backup en restore test • Eerst kleine workload • Volledig overzetten • Afbouwen oude omgeving
  • 56.
  • 57. Deel II - Security ‘Hoe veilig is uw ICT-omgeving?’ Door Henri Vierhoven, ICT-Partners / Sjoerd de Jong, Exclusive Networks
  • 59. Onze oplossingen ICT-Partners helpt u succesvol te zijn met uw ICT. Wij ontwerpen, implementeren en optimaliseren ICT-omgevingen met de nieuwste technologieën, die bijdragen aan continuïteit, stabiliteit en kostenbesparing.
  • 60. Inhoud • Geschiedenis security • Wetgeving • Bewustwording • Quickscan • Next-Generation Endpoint Security
  • 62. Veranderingen binnen security domein • Rechten • Virus • Internet • Devices • Websites • Applicaties • Wetgeving
  • 63. Waarom anti-virus niet langer afdoende is 01100111 01010110 10101010 10100101 10001010 11010011 00101101 Wrappers Veranderende ‘verschijning’ van een bestand Variations / Obfuscators Veranderende inhoudelijke code om uniek over te komen Packers Bedoeld om enkel op een echte machine te draaien (anti-VM, sleepers, interactions, anti- debug) Targeting Bedoeld om enkel op een specifieke machine of configuratie te draaien Malicious Code De daadwerkelijke onderliggende code met als doelstelling informatie te stelen of te bewerken
  • 64. Toenemend aantal aanvalskanalen MALWARE EXPLOITS File-less • Memory-only malware Executables • Ransomware • Trojans • Worms • Backdoors Browser • Drive-by Downloads • Flash, Java • iframe/html5, plug-ins Documents • Office Doc Exploits • Adobe Macros • SpearPhishing e-mails LIVE/INSIDER Scripts • Powershell • PowerSploit • WMI, VBS Credentials • Credential Scraping • Mimikatz • Tokens
  • 65. Wetgeving/richtlijnen • Wet Meldplicht Datalekken 01-01-2016 • General Data Protection Regulation 25-05-2018 • BIG / BIR 2012 (Gemeenten) • NEN7510 (Zorg) • ISO27001 (Algemeen)
  • 66. Quickscan ICT-Partners • Inzicht – Bewustwording – Actie • Pragmatische aanpak • Leidraad van 9 punten + klantspecifieke vraagstelling • Vooraf doornemen van aanwezige documentatie • Interviews op verschillende organisatieniveaus • Heldere rapportage • Concrete vervolgstappen • Quick wins
  • 68. Toegepaste technologieën Bron: 2017 Cyberthreat Defense Report
  • 70. Succesvolle aanvallen Bron: 2017 Cyberthreat Defense Report
  • 71. Aanvallen in het komende jaar Bron: 2017 Cyberthreat Defense Report
  • 73. Waarom Next-Generation Endpoint Security? • Geschikt voor alle besturingssystemen • Geschikt voor alle devices • Trigger op niet toegestane gedragingen • Toekomstbestendig • Bewijslast t.b.v. wetgevingen datalekken (WMD, GDPR) • Voorkomt dataverlies • Voorkomt reputatieschade (WMD) • Voorkomt downtime
  • 77.
  • 78. Bestaansrecht Cybercrime 1: Geld 2: Oorlogsvoering / Hacktivisme Makkelijk geld verdienen Weinig risico --------------------------------- + Veel gegadigden Online oorlog land tegen land Doel: schade aanrichten, spionage en onderbreken systemen. à Cyber Warfare onderdeel van strategie Hacktivisme: Organisaties tegen landen of andere organisaties. Doel: Statement of onderbreking systemen
  • 80. What’s Happening in Today’s Threat Landscape In the past 12 months: 52% compromised 1 to 5 times by cyber attacks Top 3 most difficult to secure (along with mobile devices, social media apps) 2014 2015 2016 56% 67% 86% % of org’s to augment/replace existing endpoint protection
  • 81. Today’s Enterprises Face 3 BILLION Attacks Legacy Threats BLOCKED Advanced Threats DETECTED Advanced Threats UNDETECTED 50% 25% 25% Traditional, AV-based Protection Sandboxing Solutions “Next-Generation” Endpoint Security
  • 82. Today’s Threats Easily Evade Detection by AV-based Solutions 01100111 01010110 10101010 10100101 10001010 11010011 00101101 Wrappers Designed to turn known code into a new binary Variations / Obfuscators Designed to slightly alter code to make known code appear new/different Packers Designed to make sure code runs only on a real machine (anti-VM, sleepers, interactions, anti-debug) Targeting Designed to allow code to run only on a specific target machine/configuration Malicious Code The attack code that runs with the goal of persisting, stealing, spying, or exfiltrating data
  • 83. Endpoints are Vulnerable to Multiple Attack Vectors MALWARE EXPLOITS File-less • Memory-only malware Executables • Ransomware • Trojans • Worms • Backdoors Browser • Drive-by Downloads • Flash, Java • iframe/html5, plug-ins Documents • Office Doc Exploits • Adobe Macros • SpearPhishing e- mails LIVE/INSIDER Scripts • Powershell • PowerSploit • WMI, VBS Credentials • Credential Scraping • Mimikatz • Tokens
  • 85. Endpoint Protection Essentials FORENSICS MITIGATION REMEDIATION DYNAMIC MALWARE DETECTION DYNAMIC EXPLOIT DETECTION PREVENTION Whitelisting Blacklisting DFI
  • 86. The SentinelOne Endpoint Protection Platform Dynamic Whitelisting / Blacklisting Cloud Intelligence PREVENTION DETECTION RESPONSE 360-degree Attack View Forensics Mitigation Remediation Rollback Auto-immunize Advanced Static Analysis PRE-EXECUTION POST-EXECUTIONON-EXECUTION STATIC PROTECTION DYNAMIC PROTECTION Dynamic Behavior Detection Single Autonomous Agent 70MB Memory Footprint Single Management Console Supports up to 25,000 Endpoints Cloud or On-Premise Deployment
  • 87. Advanced Static Prevention § Major breakthrough in signature-less detection, based on machine learning § Deep File Inspection (DFI) engine prevents advanced malware-- on access § Supported on all endpoint platforms: Windows / MacOS / Linux § Engine supports all mitigation actions 31,000 Unique file characteristics defined and referenced Known and unknown file-based malware
  • 88. Detection: Distinguishing Malicious Behavior from Benign Behavior is Complicated Benign Behavior Malicious Behavior ¹
  • 89. Detection: Dynamic Behavior Tracking: A Machine Learning Approach SentinelOne Agent § Monitors all system- level activity: § System calls § Network calls § I/O transactions § Memory transactions § Builds full context of endpoint’s application behavior 001101 010100 110111 010000 101100 100101 010001 000101 110101 101010 101100 101011 110101 010110 101000 100101 011011 101001 001010 001110 001010 111011 001011 101011 011001 110101 110001 010111 001101 010100 110111 010000 101010 111010 110001 001100 000001 001110 101001 011101 101010 100111 110101 110110 101110 101101 101011 001001 111011 010101 011011 101110 110111 101010 001010 011010 110110 101100 101001 010010 100100 101010 110100 100100 100111 101101 010101 101110 111011 011110
  • 90. Detection: Dynamic Behavior Tracking: A Machine Learning Approach SentinelOne Agent 101000 100101 011011 101001 001010 001110 001010 111011 001011 101011 011001 110101 110001 010111 File creates a copy of itself Opens up cmd.exe and deletes the original file Creates an autorun registry key Encrypts other files / connects to outbound network / logs keystrokes MALWARE DETECTED .exe
  • 91. Response: Deep Endpoint Visibility and 360o View of Attacks Lightweight, autonomous agent ▪ Continuously monitors all user/kernel activity on the user endpoint or server, online or offline ▪ Server agents sit out-of-band, preserving performance Full-context forensics in real time ▪ 360-degree view of threats, from inception to termination
  • 93. Gartner Jan 2017 “SentinelOne Most Visionary” “SentinelOne is the only vendor in this analysis that includes full EDR-type functionality in the core platform. SentinelOne is a good prospect to replace or augment existing EPP solutions for any company looking for a fresh approach and integrated EDR…”
  • 94. NSS Labs Jan 2017 “SentinelOne offers Best ROI”
  • 95. Certified Replacement for Anti-Virus § SentinelOne outperforms and replaces traditional AV-based solutions § Lightweight, fully-autonomous agent monitors endpoints constantly § Dynamic Behavior Tracking identifies threats across all vectors– not just malware § Product excellence recognized across the IT industry
  • 97.
  • 101. ICT-Partners PWA-laan 210 7311 SZ Apeldoorn T 055 528 22 22 E Connect@ict-partners.nl Hoofdweg 290 9765 CN Paterswolde T 050 364 31 02 E Connect@ict-partners.nl