SlideShare a Scribd company logo
1 of 32
Download to read offline
Creating Cloud Confidence

Greg Brown
VP, CTO - Cloud and Data Center Solutions
www.mcafee.com/networksecurity
greg_brown@mcafee.com

August 2012
Can I Borrow $20?




                                      How About $100,00?
2                   August 28, 2012
And Now?




3          August 28, 2012
Should We Think About Data Center the Same Way?
Can We Apply the Security Here?
Challenges
     Loss of Physical Controls




• Fotostock
Challenges
     Loss of Physical Controls




• Fotostock
Challenges
New Attack Surfaces




                         Data
                      Application
                          OS
 Provisioning         Hypervisor
   Platform
                         BIOS

                       Processor
Challenges
New Attack Surfaces




                         Data                      Data
                      Application               Application
                          OS                        OS
 Provisioning                   Hypervisor
   Platform
                                      BIOS

                                    Processor
Challenge
Extending Compliance

                       VIRTUALIZED


       PHYSICAL        MFR | ENG | HR

                                              CLOUD


                                        Company A   Company B




 MFR     ENG      HR
Building Foundation of Client to Cloud Security
                                            Cloud Security Mission: Worry-Free Cloud Computing
                                            Make cloud security equal to or better than traditional best in class enterprise security



                        Public/Private Clouds                                                        User & Intelligent Devices
                       (Servers, Network, Storage)
                      Private
                       Cloud
                                                              Secure the Connections
                                   Public                           Apps, data, traffic
                                   Cloud




                 Secure Cloud Datacenters                                                              Secure the Devices
                 Infrastructure & data protection,                                                  Identity, device integrity & data
                         audit/compliance                                                                      protection



                                                       Common Security Standards & Broad
                                                            Industry Collaboration

                                  Hardware-enhanced security + software & services key to achieve mission

         11
McAfee Confidential
Up and Down – Integrity
Server Infrastructure

  Intel Identity Theft Protection (ITP)       Endpoint Aware Integrity
                                                  Client/cloud mutual trust
                                                                                         EMM/MMS, NG Endpoint

                                                  Real-time Integrity
                                                   Continuous monitoring                 GTI

                                               Security Stack Integrity                  MOVE, McAfee Application
                                                Security systems operational             Control, & Change Control

  Intel Virtualization Technology (VT)                VM Integrity
                                                                                         SIA – Vendors
                                              Ensure all VMs are “known good”

                                               Location & Asset Control
                                                 Control workload location
 Intel Trusted Execution Technology
                                                     Host Integrity
                              (TXT)
                                               Ensure server is “known good”


                                                  External Assessment             McAfee SiteAdvisor Enterprise
                                                    and Reputation
                                                                                  McAfee Cloud Secure
                                                   Digital Certificates
                                              Validate web server is authentic


       Will deliver on-going advancements to hardware & software security for greater controls & auditability

  12
Extending Security to the Virtual Cloud World
           Virtualized and Private Cloud Data                                                                                                             Public Cloud Data
                         Center                                                                                                                                Center

                                                                                               Extended Security Policy

                                                                                          Isolate, protect, control VMs                                                 Company
                                                                                  Intel Virtualization Tech., Intel Trusted Execution Tech.,                               A
                 Mfg                                  Sales                                           McAfee MOVE AV*
                                        HR            Sales                                                                                                   Company             Company
                                                                                           Provide visibility & reporting                                         B                  C
                 VMM
                                                                                 Apply security policy at multiple control
                                                                                                  points
                                                                                        Monitor workloads across cloud
                                                                                                infrastructures
                                                                                                       McAfee ePO, Intel TXT


                                                                                                            McAfee ePO1



                                  Intel Trusted Execution Technology                                                                           Intel Trusted Execution Technology
                                      is run: Server “known good”                                                                                             is run:
                                                                                                                                                         “issue identified”



 1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work
            13
McAfee Confidential                               *McAfee MOVE AV = McAfee Management of Optimized Virtualized Environments Anti-Virus
McAfee Datacenter Security
The Heart of a Flexible, Efficient, Secure Next Generation Data Center




                                             Security Management




14
McAfee Datacenter Security
The Heart of a Flexible, Efficient, Secure Next Generation Data Center


                                  Comprehensive Security for Servers

                                                                            Blacklisting – Advanced Anti-Malware Protection

                                                                                    McAfee Virus Scan Enterprise

                                                                         Whitelisting – Complete protection from malicious codes
                                                                                             and applications

                                                                                      McAfee Application Control
                Security Management
                                                                           System Control – Server configuration control and
                                                                                 tracking against internal “gold standards”

                                                                                       McAfee Change Control

                                                                           Virtualization – Advanced Anti-malware protection
                                                                                     extended to the Virtual Machines

                                                                                          McAfee MOVE-AV



15
McAfee Datacenter Security
The Heart of a Flexible, Efficient, Secure Next Generation Data Center


                Reliable Real-Time Protection for Business-Critical Databases


                                                                         Database discovery and comprehensive Vulnerability
                                                                                            Assessment


                                                                                   McAfee Vulnerability Manager
                                                                                         for Databases

                                                                         Non-intrusive, real-time database visibility &
                Security Management
                                                                                 protection across all threat vectors

                                                                                McAfee Database Activity Monitoring

                                                                                 Patch databases without downtime

                                                                               McAfee Virtual Patching for Databases




16
McAfee Datacenter Security
The Heart of a Flexible, Efficient, Secure Next Generation Data Center


                Industry leading next generation Network Protection Solutions

                                                                           Protection of network connected devices against
                                                                                              targeted attacks

                                                                                     McAfee Next Generation IPS

                                                                             High-assurance strong next-generation firewall
                                                                                 capabilities, including application visibility


                     Security                                                     McAfee Next Generation Firewall
                    Management
                                                                         Advanced threat response, behavioral analysis and
                                                                                  access control solutions for the network

                                                                         McAfee Network Threat Response, McAfee Network
                                                                         Access Control and McAfee Network Threat Behavior
                                                                                             Analysis




17
McAfee Datacenter Security
The Heart of a Flexible, Efficient, Secure Next Generation Data Center


                            Comprehensive Security for Storage Devices




                                                                         Continuous protection for storage devices and their
                                                                                                 data


                Security Management                                               Scan, detect and quarantine
                                                                                 files on NAS storage devices (NetAPP,
                                                                                      EMC, Hitachi, Sharepoint, etc.)


                                                                              McAfee Virus Scan Enterprise - Storage




18
McAfee Data Center Security
The Heart of a Flexible, Efficient, Secure Data Center


                Unified Security Management and Powerful Threat Intelligence

                                                         High-performance security information and event
                                                           management (SIEM) solutions for complete visibility and
                                                           situational awareness to protect critical information and
                                                                               infrastructure


                                                                               McAfee SIEM

                                                          Single Management Console for McAfee Security
                                                              Products and over 130 partner integrated Products
                     Security
                    Management                                                     McAfee ePO

                                                         Comprehensive threat intelligence from over 150
                                                         million sensors across the web, channeled into all products in
                                                                                   real time


                                                                  McAfee Global Threat Intelligence




19
Connecting to the Cloud With Confidence

                                                           • Flexible deployment options –
                   Cloud Ecosystem                           On-premise, Saas or virtual

                                                           • Protection and policies across Email and
      Email      Data Loss       Web           Identity
                                                             Web Channels
     Security    Prevention     Security     Management
                                                           • Confidence to migrate data safely to public
 Global Threat Intelligence                                  cloud

 McAfee ePolicy Orchestrator                               • Unify identity policies across SaaS and
                                                             federated solutions
 Enterprise
      Mobile           Enterprise          Private Cloud
      Users            Users               Applications




20
McAfee’s Tailored Data Protection Methodology


                              1
                                            •1 Discover and Learn
                                                Find all your sensitive data wherever it may be

                                        2   •2 Assess Risk
                                                Ensure secure data handling procedures are
                                                in place

                                            •3 Define Effective Policies
     5                                          Create policies to protect data and test them
                                                for effectiveness

                                            •4 Apply Controls
                                                Restrict access to authorized people and limit
                                                transmission
                                    3       •5 Monitor, Report and Audit
                                                Ensure successful data security through
              4                                 alerting and incident management


21
Cloud Identity Manager


                                        Account
                           SSO        Provisioning    Strong Auth


  Laptop                                                              Access 100s of
                                                                    External SaaS Apps


                User


  Mobile                             McAfee Cloud
                                   Identity Manager
Internal User




 Any Device
  Any Time
 Any Where
                       AD, LDAP, Database, SAML IdP, OpenID, etc.
Security and Cloud Adoption

                                                          CLOUD

                                   VIRTUALIZED
                                                      IaaS     PaaS
           PHYSICAL
                                 MFR | ENG | HR




                                                   • Enable Adoption
     MFR     ENG      HR
                                                   • Ensure Compliance
                              • Unified Security
                                Process
                              • Optimized
    • Sustained investment      Performance
    • Continuous Protection
Usage Case
       Financial Transaction Clearinghouse

            Financial Institution                                                            Service Provider


  Financial Transaction Records                                                                     Clearing House

                                            FW/DLP/
                                              …

                                                                                                     Bot
                              FW: Protocol Secure                   ✔
                              FW: Intended Destination              ✔


There is no model to create awareness of the health of the system receiving the data. This is generally true of all systems outside the
                                                             perimeter
       25                                                    August 28, 2012
Financial Transaction Clearinghouse

           Financial Institution                                                            Clearing House

                                 Healthy
                                                                                                Assessment
 Financial Transaction Records


                                              FW
                                                                             Data transmitted based
                                                                              on health measure of
                                                                                     service.
                            FW: Protocol Secure                   ✔                                              ✔
                            FW: Intended Destination              ✔


McAfee is well positioned both in technology assets and in brand permission to become the standard for conveying system integrity
                                                  across management domains.
      26                                                   August 28, 2012
Trapezoid RSA Demo
   Enabling Private Cloud Adoption
   ePO is not aware of Hypervisor
      or physical sever risks           ePO




                                                                                                  Once the application server is built the the system
                                                                                                  admin turns it over to the DC operations team to
                                                                                                   deploy on the PRIVATE CLOUD infrastructure.

                                        Provisions virtual
                                                                        Hypervisor                The system admin is blind to all of the underlying
                                        sever to DC
                                                                         Server                                  infrastructure.


System Admin in finance builds new                               ePO has no visibility into the
payroll application on virtual server                        hypervisor or the infrastructure today.




                                                                         Corporate
   27                                                                   Data Center
Sample Usage Case
Enabling Public Cloud Adoption
                                                          3. Customer ePO queries
                                     ePO                       GTI for integrity
                                                                                                                      2. ePO sends integrity to GTI




                                                                                                                            Cloud Provider
        4. Payroll application reported                                                                                         ePO
          compliant while running in
                Public Cloud
                                                                                                      1. TXT signals TRUSTED Hypervisor
                                                                                                                     to ePO




                                    Provisions virtual                                DC Ops Pushes virtual
                                    sever to DC                   Hypervisor          sever to Cloud Provider                     Hypervisor
                                                                   Server                                                          Server

                                                                         TRUSTED                                                          TRUSTED


                                                         Safe Private Cloud Enabled                                    Safe Public Cloud Enabled
Net Result:
- CIO public cloud objectives
  enabled
- Cloud provider preferred over
  others – Greater Value!                                         Corporate                                                 Public Cloud
                                                                 Data Center                                                Data Center
Cut Costs And Increase The Level of
     Content And Data Protection
     • Proliferation of Technology at The Gateway
        – Adoption of point solutions has increased operational costs

       Firewall




                     Proxy        Cache    Anti-     Web        URL      SSL InspectionInstant Messaging   Users and
                                           Virus    Exploit     Filter                     Inspection        Data
                                                   Protection




29                    McAfee Web Gateway
Types of SSO Connectors


      SAML                • SAML2 or SAML 1.1 federation




  Proprietary             • custom method supported by the target application




      Agent               • agent needs to be installed on the target app. Java,
                            .NET, and PHP agents available today




  HTTP-Post               • username/password are captured during first login,
                            and automated HTTP form post is performed in
                            subsequent logins
Front-end Authentication into Cloud Identity Manager


  Username/Password         • User store - Directory (AD / LDAP), Database, CAS



                            • OTP (built-in)
  2-factor authentication   • Facial Recognition (through partner BioID)


                            • AD IWA
      First mile SSO        • 3rd party IdM session (such as CA Siteminder)
                            • Accept SAML assertion

                            • Facebook
     Internet Identity      • OpenID (Google, Yahoo, Paypal, etc.)
        Providers           • SAML (Salesforce)
Strong Authentication Features

                                                  Software OTP
                                                     • Coverage across multiple devices
                                                       and delivery methods
                                                     • Simple & fast to roll out with user
                                                       self enrollment
                                                     – Mobile Token - Pledge
                                                     – USB Key - YubiKey
                                                     – Email
                                                     – Runs on all platforms: iPhone,
                                                       BlackBerry, WinMobile, etc.

  Silicon OTP
    • IPT - Secure ME layer in Intel chip
    • “hardens” software OTP
    • Attest that SSO came from corp issued
      laptop
                                                                         Embedded in Ultra Books
               Deliver a more secure Cloud SSO by invoking strong auth from
                            hardware or mobile software clients

More Related Content

What's hot

Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Private Cloud
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocioJaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negociodatacentersummit
 
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...Novell
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsIBM India Smarter Computing
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBootOpSource
 

What's hot (19)

Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocioJaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
 
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
A Practical Approach to Delivering Cloud Platforms Using Novell Solutions: Ho...
 
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott DavisMassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
MassTLC Cloud summit keynote presentation from CTO of VMWare, Scott Davis
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Monitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring OptionsMonitoring Principles & z/VSE Monitoring Options
Monitoring Principles & z/VSE Monitoring Options
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Case Study: AlertBoot
Case Study: AlertBootCase Study: AlertBoot
Case Study: AlertBoot
 

Viewers also liked

What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Theintercloud
 
Intel Cloud Summit: Liam Keating Keynote
Intel Cloud Summit: Liam Keating  KeynoteIntel Cloud Summit: Liam Keating  Keynote
Intel Cloud Summit: Liam Keating KeynoteIntelAPAC
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetupBeMyApp
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB ResultsSymantec
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the CloudsAndy Piper
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey ResultsMichael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemReuven Lerner
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the EnterpriseWSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSun Digital, Inc.
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesCompTIA
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud OutageNewvewm
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud OutageNati Shalom
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingMark Hinkle
 
Delivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareDelivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareMark Hinkle
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingDavid Linthicum
 

Viewers also liked (20)

What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017
 
Intel Cloud Summit: Liam Keating Keynote
Intel Cloud Summit: Liam Keating  KeynoteIntel Cloud Summit: Liam Keating  Keynote
Intel Cloud Summit: Liam Keating Keynote
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetup
 
Google Cloud Platform
Google Cloud Platform Google Cloud Platform
Google Cloud Platform
 
I'm Cloud Confused!
I'm Cloud Confused!I'm Cloud Confused!
I'm Cloud Confused!
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud Outage
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
 
Delivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareDelivering IaaS with Open Source Software
Delivering IaaS with Open Source Software
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computing
 

Similar to Intel Cloud Summit: Greg Brown McAfee

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityArrow ECS UK
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloudJoseph Remesar
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentationeraz
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 

Similar to Intel Cloud Summit: Greg Brown McAfee (20)

AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
VMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised securityVMware and Trend Micro, partnering to revolutionise virtualised security
VMware and Trend Micro, partnering to revolutionise virtualised security
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
What is behind the cloud
What is behind the cloudWhat is behind the cloud
What is behind the cloud
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Symantec VMworld 2011 News
Symantec VMworld 2011 NewsSymantec VMworld 2011 News
Symantec VMworld 2011 News
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentation
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 

More from IntelAPAC

Intel apj cloud big data summit sdi press briefing - panhorst
Intel apj cloud  big data summit   sdi press briefing - panhorstIntel apj cloud  big data summit   sdi press briefing - panhorst
Intel apj cloud big data summit sdi press briefing - panhorstIntelAPAC
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressIntelAPAC
 
Netweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-studyNetweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-studyIntelAPAC
 
2 pc enterprise summit cronin newfinal aug 18
2 pc enterprise summit cronin newfinal aug 182 pc enterprise summit cronin newfinal aug 18
2 pc enterprise summit cronin newfinal aug 18IntelAPAC
 
5 Cronin Steen - IOT Smart Cities
5 Cronin Steen - IOT Smart Cities5 Cronin Steen - IOT Smart Cities
5 Cronin Steen - IOT Smart CitiesIntelAPAC
 
Gab Genai Cloudera - Going Beyond Traditional Analytic
Gab Genai Cloudera - Going Beyond Traditional Analytic Gab Genai Cloudera - Going Beyond Traditional Analytic
Gab Genai Cloudera - Going Beyond Traditional Analytic IntelAPAC
 
1 RK Hiremane
1 RK Hiremane1 RK Hiremane
1 RK HiremaneIntelAPAC
 
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntelAPAC
 
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntelAPAC
 
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High Gear
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High GearIntel APJ Enterprise Day - Intel puts Automotive Innovation into High Gear
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High GearIntelAPAC
 
Intel APJ Enterprise Day - Intro to Intel Collaboration Centre
Intel APJ Enterprise Day - Intro to Intel Collaboration CentreIntel APJ Enterprise Day - Intro to Intel Collaboration Centre
Intel APJ Enterprise Day - Intro to Intel Collaboration CentreIntelAPAC
 
Intel APJ Enterprise Day - Strategic IT, A New Way of Business
Intel APJ Enterprise Day - Strategic IT, A New Way of Business Intel APJ Enterprise Day - Strategic IT, A New Way of Business
Intel APJ Enterprise Day - Strategic IT, A New Way of Business IntelAPAC
 
Intel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntelAPAC
 
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki KaishaIntel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki KaishaIntelAPAC
 
RedHat - Intel Big Data & Cloud Summit 2013
RedHat - Intel Big Data & Cloud Summit 2013RedHat - Intel Big Data & Cloud Summit 2013
RedHat - Intel Big Data & Cloud Summit 2013IntelAPAC
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013IntelAPAC
 
TWSE - Intel Big Data & Cloud Summit 2013
TWSE - Intel Big Data & Cloud Summit 2013TWSE - Intel Big Data & Cloud Summit 2013
TWSE - Intel Big Data & Cloud Summit 2013IntelAPAC
 
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)IntelAPAC
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
Girish Juneja - Intel Big Data & Cloud Summit 2013
Girish Juneja - Intel Big Data & Cloud Summit 2013Girish Juneja - Intel Big Data & Cloud Summit 2013
Girish Juneja - Intel Big Data & Cloud Summit 2013IntelAPAC
 

More from IntelAPAC (20)

Intel apj cloud big data summit sdi press briefing - panhorst
Intel apj cloud  big data summit   sdi press briefing - panhorstIntel apj cloud  big data summit   sdi press briefing - panhorst
Intel apj cloud big data summit sdi press briefing - panhorst
 
Day 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_pressDay 2 aziz apj aziz_big_datakeynote_press
Day 2 aziz apj aziz_big_datakeynote_press
 
Netweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-studyNetweb flytxt-big-data-case-study
Netweb flytxt-big-data-case-study
 
2 pc enterprise summit cronin newfinal aug 18
2 pc enterprise summit cronin newfinal aug 182 pc enterprise summit cronin newfinal aug 18
2 pc enterprise summit cronin newfinal aug 18
 
5 Cronin Steen - IOT Smart Cities
5 Cronin Steen - IOT Smart Cities5 Cronin Steen - IOT Smart Cities
5 Cronin Steen - IOT Smart Cities
 
Gab Genai Cloudera - Going Beyond Traditional Analytic
Gab Genai Cloudera - Going Beyond Traditional Analytic Gab Genai Cloudera - Going Beyond Traditional Analytic
Gab Genai Cloudera - Going Beyond Traditional Analytic
 
1 RK Hiremane
1 RK Hiremane1 RK Hiremane
1 RK Hiremane
 
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
 
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration CenterIntel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
Intel APJ Enterprise Day - Synopses of Demos at Intel Collaboration Center
 
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High Gear
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High GearIntel APJ Enterprise Day - Intel puts Automotive Innovation into High Gear
Intel APJ Enterprise Day - Intel puts Automotive Innovation into High Gear
 
Intel APJ Enterprise Day - Intro to Intel Collaboration Centre
Intel APJ Enterprise Day - Intro to Intel Collaboration CentreIntel APJ Enterprise Day - Intro to Intel Collaboration Centre
Intel APJ Enterprise Day - Intro to Intel Collaboration Centre
 
Intel APJ Enterprise Day - Strategic IT, A New Way of Business
Intel APJ Enterprise Day - Strategic IT, A New Way of Business Intel APJ Enterprise Day - Strategic IT, A New Way of Business
Intel APJ Enterprise Day - Strategic IT, A New Way of Business
 
Intel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK HiremaneIntel APJ Enterprise Day - Keynote by RK Hiremane
Intel APJ Enterprise Day - Keynote by RK Hiremane
 
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki KaishaIntel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
Intel APJ Enterprise Day - Introduction to Intel Kabushiki Kaisha
 
RedHat - Intel Big Data & Cloud Summit 2013
RedHat - Intel Big Data & Cloud Summit 2013RedHat - Intel Big Data & Cloud Summit 2013
RedHat - Intel Big Data & Cloud Summit 2013
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013
 
TWSE - Intel Big Data & Cloud Summit 2013
TWSE - Intel Big Data & Cloud Summit 2013TWSE - Intel Big Data & Cloud Summit 2013
TWSE - Intel Big Data & Cloud Summit 2013
 
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
Lynn Comp - Intel Big Data & Cloud Summit 2013 (2)
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
Girish Juneja - Intel Big Data & Cloud Summit 2013
Girish Juneja - Intel Big Data & Cloud Summit 2013Girish Juneja - Intel Big Data & Cloud Summit 2013
Girish Juneja - Intel Big Data & Cloud Summit 2013
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Intel Cloud Summit: Greg Brown McAfee

  • 1. Creating Cloud Confidence Greg Brown VP, CTO - Cloud and Data Center Solutions www.mcafee.com/networksecurity greg_brown@mcafee.com August 2012
  • 2. Can I Borrow $20? How About $100,00? 2 August 28, 2012
  • 3. And Now? 3 August 28, 2012
  • 4. Should We Think About Data Center the Same Way?
  • 5. Can We Apply the Security Here?
  • 6. Challenges Loss of Physical Controls • Fotostock
  • 7. Challenges Loss of Physical Controls • Fotostock
  • 8. Challenges New Attack Surfaces Data Application OS Provisioning Hypervisor Platform BIOS Processor
  • 9. Challenges New Attack Surfaces Data Data Application Application OS OS Provisioning Hypervisor Platform BIOS Processor
  • 10. Challenge Extending Compliance VIRTUALIZED PHYSICAL MFR | ENG | HR CLOUD Company A Company B MFR ENG HR
  • 11. Building Foundation of Client to Cloud Security Cloud Security Mission: Worry-Free Cloud Computing Make cloud security equal to or better than traditional best in class enterprise security Public/Private Clouds User & Intelligent Devices (Servers, Network, Storage) Private Cloud Secure the Connections Public Apps, data, traffic Cloud Secure Cloud Datacenters Secure the Devices Infrastructure & data protection, Identity, device integrity & data audit/compliance protection Common Security Standards & Broad Industry Collaboration Hardware-enhanced security + software & services key to achieve mission 11 McAfee Confidential
  • 12. Up and Down – Integrity Server Infrastructure Intel Identity Theft Protection (ITP) Endpoint Aware Integrity Client/cloud mutual trust EMM/MMS, NG Endpoint Real-time Integrity Continuous monitoring GTI Security Stack Integrity MOVE, McAfee Application Security systems operational Control, & Change Control Intel Virtualization Technology (VT) VM Integrity SIA – Vendors Ensure all VMs are “known good” Location & Asset Control Control workload location Intel Trusted Execution Technology Host Integrity (TXT) Ensure server is “known good” External Assessment McAfee SiteAdvisor Enterprise and Reputation McAfee Cloud Secure Digital Certificates Validate web server is authentic Will deliver on-going advancements to hardware & software security for greater controls & auditability 12
  • 13. Extending Security to the Virtual Cloud World Virtualized and Private Cloud Data Public Cloud Data Center Center Extended Security Policy Isolate, protect, control VMs Company Intel Virtualization Tech., Intel Trusted Execution Tech., A Mfg Sales McAfee MOVE AV* HR Sales Company Company Provide visibility & reporting B C VMM Apply security policy at multiple control points Monitor workloads across cloud infrastructures McAfee ePO, Intel TXT McAfee ePO1 Intel Trusted Execution Technology Intel Trusted Execution Technology is run: Server “known good” is run: “issue identified” 1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work 13 McAfee Confidential *McAfee MOVE AV = McAfee Management of Optimized Virtualized Environments Anti-Virus
  • 14. McAfee Datacenter Security The Heart of a Flexible, Efficient, Secure Next Generation Data Center Security Management 14
  • 15. McAfee Datacenter Security The Heart of a Flexible, Efficient, Secure Next Generation Data Center Comprehensive Security for Servers Blacklisting – Advanced Anti-Malware Protection McAfee Virus Scan Enterprise Whitelisting – Complete protection from malicious codes and applications McAfee Application Control Security Management System Control – Server configuration control and tracking against internal “gold standards” McAfee Change Control Virtualization – Advanced Anti-malware protection extended to the Virtual Machines McAfee MOVE-AV 15
  • 16. McAfee Datacenter Security The Heart of a Flexible, Efficient, Secure Next Generation Data Center Reliable Real-Time Protection for Business-Critical Databases Database discovery and comprehensive Vulnerability Assessment McAfee Vulnerability Manager for Databases Non-intrusive, real-time database visibility & Security Management protection across all threat vectors McAfee Database Activity Monitoring Patch databases without downtime McAfee Virtual Patching for Databases 16
  • 17. McAfee Datacenter Security The Heart of a Flexible, Efficient, Secure Next Generation Data Center Industry leading next generation Network Protection Solutions Protection of network connected devices against targeted attacks McAfee Next Generation IPS High-assurance strong next-generation firewall capabilities, including application visibility Security McAfee Next Generation Firewall Management Advanced threat response, behavioral analysis and access control solutions for the network McAfee Network Threat Response, McAfee Network Access Control and McAfee Network Threat Behavior Analysis 17
  • 18. McAfee Datacenter Security The Heart of a Flexible, Efficient, Secure Next Generation Data Center Comprehensive Security for Storage Devices Continuous protection for storage devices and their data Security Management Scan, detect and quarantine files on NAS storage devices (NetAPP, EMC, Hitachi, Sharepoint, etc.) McAfee Virus Scan Enterprise - Storage 18
  • 19. McAfee Data Center Security The Heart of a Flexible, Efficient, Secure Data Center Unified Security Management and Powerful Threat Intelligence High-performance security information and event management (SIEM) solutions for complete visibility and situational awareness to protect critical information and infrastructure McAfee SIEM Single Management Console for McAfee Security Products and over 130 partner integrated Products Security Management McAfee ePO Comprehensive threat intelligence from over 150 million sensors across the web, channeled into all products in real time McAfee Global Threat Intelligence 19
  • 20. Connecting to the Cloud With Confidence • Flexible deployment options – Cloud Ecosystem On-premise, Saas or virtual • Protection and policies across Email and Email Data Loss Web Identity Web Channels Security Prevention Security Management • Confidence to migrate data safely to public Global Threat Intelligence cloud McAfee ePolicy Orchestrator • Unify identity policies across SaaS and federated solutions Enterprise Mobile Enterprise Private Cloud Users Users Applications 20
  • 21. McAfee’s Tailored Data Protection Methodology 1 •1 Discover and Learn Find all your sensitive data wherever it may be 2 •2 Assess Risk Ensure secure data handling procedures are in place •3 Define Effective Policies 5 Create policies to protect data and test them for effectiveness •4 Apply Controls Restrict access to authorized people and limit transmission 3 •5 Monitor, Report and Audit Ensure successful data security through 4 alerting and incident management 21
  • 22. Cloud Identity Manager Account SSO Provisioning Strong Auth Laptop Access 100s of External SaaS Apps User Mobile McAfee Cloud Identity Manager Internal User Any Device Any Time Any Where AD, LDAP, Database, SAML IdP, OpenID, etc.
  • 23. Security and Cloud Adoption CLOUD VIRTUALIZED IaaS PaaS PHYSICAL MFR | ENG | HR • Enable Adoption MFR ENG HR • Ensure Compliance • Unified Security Process • Optimized • Sustained investment Performance • Continuous Protection
  • 24.
  • 25. Usage Case Financial Transaction Clearinghouse Financial Institution Service Provider Financial Transaction Records Clearing House FW/DLP/ … Bot FW: Protocol Secure ✔ FW: Intended Destination ✔ There is no model to create awareness of the health of the system receiving the data. This is generally true of all systems outside the perimeter 25 August 28, 2012
  • 26. Financial Transaction Clearinghouse Financial Institution Clearing House Healthy Assessment Financial Transaction Records FW Data transmitted based on health measure of service. FW: Protocol Secure ✔ ✔ FW: Intended Destination ✔ McAfee is well positioned both in technology assets and in brand permission to become the standard for conveying system integrity across management domains. 26 August 28, 2012
  • 27. Trapezoid RSA Demo Enabling Private Cloud Adoption ePO is not aware of Hypervisor or physical sever risks ePO Once the application server is built the the system admin turns it over to the DC operations team to deploy on the PRIVATE CLOUD infrastructure. Provisions virtual Hypervisor The system admin is blind to all of the underlying sever to DC Server infrastructure. System Admin in finance builds new ePO has no visibility into the payroll application on virtual server hypervisor or the infrastructure today. Corporate 27 Data Center
  • 28. Sample Usage Case Enabling Public Cloud Adoption 3. Customer ePO queries ePO GTI for integrity 2. ePO sends integrity to GTI Cloud Provider 4. Payroll application reported ePO compliant while running in Public Cloud 1. TXT signals TRUSTED Hypervisor to ePO Provisions virtual DC Ops Pushes virtual sever to DC Hypervisor sever to Cloud Provider Hypervisor Server Server TRUSTED TRUSTED Safe Private Cloud Enabled Safe Public Cloud Enabled Net Result: - CIO public cloud objectives enabled - Cloud provider preferred over others – Greater Value! Corporate Public Cloud Data Center Data Center
  • 29. Cut Costs And Increase The Level of Content And Data Protection • Proliferation of Technology at The Gateway – Adoption of point solutions has increased operational costs Firewall Proxy Cache Anti- Web URL SSL InspectionInstant Messaging Users and Virus Exploit Filter Inspection Data Protection 29 McAfee Web Gateway
  • 30. Types of SSO Connectors SAML • SAML2 or SAML 1.1 federation Proprietary • custom method supported by the target application Agent • agent needs to be installed on the target app. Java, .NET, and PHP agents available today HTTP-Post • username/password are captured during first login, and automated HTTP form post is performed in subsequent logins
  • 31. Front-end Authentication into Cloud Identity Manager Username/Password • User store - Directory (AD / LDAP), Database, CAS • OTP (built-in) 2-factor authentication • Facial Recognition (through partner BioID) • AD IWA First mile SSO • 3rd party IdM session (such as CA Siteminder) • Accept SAML assertion • Facebook Internet Identity • OpenID (Google, Yahoo, Paypal, etc.) Providers • SAML (Salesforce)
  • 32. Strong Authentication Features Software OTP • Coverage across multiple devices and delivery methods • Simple & fast to roll out with user self enrollment – Mobile Token - Pledge – USB Key - YubiKey – Email – Runs on all platforms: iPhone, BlackBerry, WinMobile, etc. Silicon OTP • IPT - Secure ME layer in Intel chip • “hardens” software OTP • Attest that SSO came from corp issued laptop Embedded in Ultra Books Deliver a more secure Cloud SSO by invoking strong auth from hardware or mobile software clients