I had the honour to present all the great work we are doing in transforming to cloud and running hybrid infrastructure for our clients at Gartner Summit in Berlin, and to discuss with current and potential clients.
Why Cloud? First of all, we need to ask ourselves..... Are we looking for an innovative way of doing business? Is an existing system/ apps supporting with BOTH lower cost AND faster time to the market? If your answers are yes and no (subsequently), then maybe its time for cloud!
I had the honour to present all the great work we are doing in transforming to cloud and running hybrid infrastructure for our clients at Gartner Summit in Berlin, and to discuss with current and potential clients.
Why Cloud? First of all, we need to ask ourselves..... Are we looking for an innovative way of doing business? Is an existing system/ apps supporting with BOTH lower cost AND faster time to the market? If your answers are yes and no (subsequently), then maybe its time for cloud!
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoicePeak 10
Your success and the success of your customers must be its prime directive. After that, choose a provider because it has the tools, skills and capabilities to create the one and only cloud solution that fits your needs better than any other. Here are 10 reasons why that choice should be Peak 10.
Navigating the new normal with self healing infrastructure automationPuppet
There is no secret that there is global uncertainty due to COVID-19. The emergence of a "new normal" is challenging how government IT teams operate over the next few months and quarters. With the passing of the CARES Act, the path forward requires a focus on optimizing the budget to deliver efficiency and optimize the agency. The Puppet ecosystem provides unique capabilities that accelerate your IT organization along the “new normal” path to success.
In this webinar, we will cover how Puppet can assist with these shifting priorities:
-Business continuity takes on a new meaning
-Remote work proliferates
-Speed to value has never been more important
-Security takes a front seat
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Codit
Swiss Re is exploring new business opportunities, embracing digital transformation and becoming more agile. Join us to hear how the Flight Delay Compensation project came to life, starting from an innovative business idea to an evolutive solution built in the Microsoft Azure cloud. Emanuele and Tom share their experiences on how the project evolved and how SwissRe and Codit collaborated on designing and building the platform. They will talk about how they worked as a distributed team, optimized costs, used DevOps to release changes without manual intervention and revisit the operating model, stepping away from the traditional way apps are delivered at Swiss Re.
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveePlus
Implementing body cameras for your force brings many benefits but getting started can raise many complex questions. ePlus and EMC can help you build a surveillance storage foundation to optimize your body camera deployment. Contact ePlus today to start leveraging the industry's largest and most advanced surveillance validation labs and explore your body camera initiative.
For the most part, business is being done in the cloud today. Cloud managed services involving security and infrastructure allow your business to scale and grow at whatever rate you're moving at. Along with that, you can move your email to the cloud as well. It's a low cost way to manage your data and keep it secure.
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Your IT infrastructure must transform along with the pace of business. And IT professionals need solutions that can support them wherever they are in their transformation process. The answer? Comprehensive virtual infrastructure solutions that can address IT needs today and tomorrow, no matter the business or industry.
Don’t fear Shadow IT, it offers great value to the organization. IT needs to work to minimize the any possible negative impact from security risks and spend control challenges. Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.
Cloud delivered desktop is the perfect answer for those companies that need to have complete control over their information. These are virtual desktops delivered via the cloud allowing you to enable you and your employees to securely access your applications and data from any device, from anywhere and at any time –– with the same access, security and productivity as from your own office environment.
Discover how the cloud will empower every organization on the planet to achie...Codit
Imagine a world without computers; a world without their impact. Where would we be? When you think about the history of human innovation, from the wheel to fire, the printing press to flight…these weren’t just solitary innovations, but accelerators that super-charged human progress in countless ways. In this presentation Michael Beal, General Manager of BeLux, will explain how Microsoft believes that the Cloud, AI, IoT… will empower every person and organization on the planet to achieve more.
Supportato da circa otto anni di ricerche lo studio “The Cost of Cybercrime” condotto dal Ponemon Institute e sponsorizzato da Accenture, ha elaborato 2182 interviste provenienti da 254 società in sette paesi – Australia, Francia, Germania, Italia, Giappone, Regno Unito e Stati Uniti. Le conseguenze del cyber crime sono per le aziende di tutto il mondo sempre più costose e gravi, non fa eccezione l’Italia.
The top 8 Gartner ITOSSS 2018 Takeaways.
What's the future of IT operations? The OpsRamp team went to Gartner ITOSSS 2018 in Orlando, Florida where the theme was "At the Crossroads of Change: Agility, Innovation & Transformation". We saw a glimpse of tomorrow. Here are our top 8 takeaways from the show.
TOP 10 Reasons to Make Peak 10 Your Cloud Provider of ChoicePeak 10
Your success and the success of your customers must be its prime directive. After that, choose a provider because it has the tools, skills and capabilities to create the one and only cloud solution that fits your needs better than any other. Here are 10 reasons why that choice should be Peak 10.
Navigating the new normal with self healing infrastructure automationPuppet
There is no secret that there is global uncertainty due to COVID-19. The emergence of a "new normal" is challenging how government IT teams operate over the next few months and quarters. With the passing of the CARES Act, the path forward requires a focus on optimizing the budget to deliver efficiency and optimize the agency. The Puppet ecosystem provides unique capabilities that accelerate your IT organization along the “new normal” path to success.
In this webinar, we will cover how Puppet can assist with these shifting priorities:
-Business continuity takes on a new meaning
-Remote work proliferates
-Speed to value has never been more important
-Security takes a front seat
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Codit
Swiss Re is exploring new business opportunities, embracing digital transformation and becoming more agile. Join us to hear how the Flight Delay Compensation project came to life, starting from an innovative business idea to an evolutive solution built in the Microsoft Azure cloud. Emanuele and Tom share their experiences on how the project evolved and how SwissRe and Codit collaborated on designing and building the platform. They will talk about how they worked as a distributed team, optimized costs, used DevOps to release changes without manual intervention and revisit the operating model, stepping away from the traditional way apps are delivered at Swiss Re.
Looking at a Body Camera Initiative from an IT Infrastructure PerspectiveePlus
Implementing body cameras for your force brings many benefits but getting started can raise many complex questions. ePlus and EMC can help you build a surveillance storage foundation to optimize your body camera deployment. Contact ePlus today to start leveraging the industry's largest and most advanced surveillance validation labs and explore your body camera initiative.
For the most part, business is being done in the cloud today. Cloud managed services involving security and infrastructure allow your business to scale and grow at whatever rate you're moving at. Along with that, you can move your email to the cloud as well. It's a low cost way to manage your data and keep it secure.
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
The Internet of Things (IoT) market has begun to take off. Consumers can buy connected versions of nearly every household appliance available. However, despite its increasing acceptance by consumers, recent studies of IoT devices seem to agree that “security” is not a word that gets associated with this category of devices, leaving consumers potentially exposed.
To find out for ourselves how IoT devices fare when it comes to security, we analyzed 50 smart home devices that are available today. We found that none of the devices enforced strong passwords, used mutual authentication, or protected accounts against brute-force attacks. Almost two out of ten of the mobile apps used to control the tested IoT devices did not use Secure Sockets Layer (SSL) to encrypt communications to the cloud. The tested IoT technology also contained many common vulnerabilities.
All of the potential weaknesses that could afflict IoT systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices. IoT vendors need to do a better job on security before their devices become ubiquitous in every home, leaving millions of people at risk of cyberattacks
Your IT infrastructure must transform along with the pace of business. And IT professionals need solutions that can support them wherever they are in their transformation process. The answer? Comprehensive virtual infrastructure solutions that can address IT needs today and tomorrow, no matter the business or industry.
Don’t fear Shadow IT, it offers great value to the organization. IT needs to work to minimize the any possible negative impact from security risks and spend control challenges. Learn how to provide users a “carrot” without the “stick” through an approved marketplace for purchasing public cloud. At the same time, you give IT the visibility and traceability to manage security and costs.
Cloud delivered desktop is the perfect answer for those companies that need to have complete control over their information. These are virtual desktops delivered via the cloud allowing you to enable you and your employees to securely access your applications and data from any device, from anywhere and at any time –– with the same access, security and productivity as from your own office environment.
Discover how the cloud will empower every organization on the planet to achie...Codit
Imagine a world without computers; a world without their impact. Where would we be? When you think about the history of human innovation, from the wheel to fire, the printing press to flight…these weren’t just solitary innovations, but accelerators that super-charged human progress in countless ways. In this presentation Michael Beal, General Manager of BeLux, will explain how Microsoft believes that the Cloud, AI, IoT… will empower every person and organization on the planet to achieve more.
Supportato da circa otto anni di ricerche lo studio “The Cost of Cybercrime” condotto dal Ponemon Institute e sponsorizzato da Accenture, ha elaborato 2182 interviste provenienti da 254 società in sette paesi – Australia, Francia, Germania, Italia, Giappone, Regno Unito e Stati Uniti. Le conseguenze del cyber crime sono per le aziende di tutto il mondo sempre più costose e gravi, non fa eccezione l’Italia.
The top 8 Gartner ITOSSS 2018 Takeaways.
What's the future of IT operations? The OpsRamp team went to Gartner ITOSSS 2018 in Orlando, Florida where the theme was "At the Crossroads of Change: Agility, Innovation & Transformation". We saw a glimpse of tomorrow. Here are our top 8 takeaways from the show.
What kept your CISO up last night? What market forces and threats are most impactful to your peers? How will these shape the future of enterprise security? Bill Burns, Informatica CISO and former Scale Venture Partners Executive-in-Residence, formed an InfoSec investment thesis by combining his 20+ years of domain expertise with over 100 CISO peer interviews and online survey responses. In this session Bill will share his results and perspectives on what's ahead for practical enterprise security.
Michael Daly, Chief Technology Officer for Cybersecurity & Special Missions at Raytheon, described global cybersecurity trends during his presentation at the 2015 Chief Information Officer Leadership Forum in Boston on March 26. In his presentation, “Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs,” Daly pointed out that cybersecurity is becoming a major concern for C-level executives.
VMUGIT Meeting - Lecce, 5 Aprile 2018
Rodolfo Rotondo VMware Sr. Business Solution Strategist, SEMEA - Difendere tutto... difendere niente! Come sviluppare un approccio strategico alla cyber security nell'era del mobile-cloud e degli oggetti interconnessi
Sicurezza IT: una nuova cultura del rischio IT per promuovere la trasformazio...IDC Italy
Abstract della presentazione di Giancarlo Vercellino, Research & Consulting Manager di IDC Italia, tenuta all'evento IDC Security Conference 2017 di Milano l'11 maggio 2017
Nuovi modelli di sicurezza IT: le trasformazioni degli Innovation AcceleratorsIDC Italy
Abstract della presentazione di Giancarlo Vercellino, Research & Consulting Manager di IDC Italia, tenuta nel corso dell'evento Outthink Threats a Roma il 6 luglio 2016
By 2020, more than 25 billion devices will have extensive Internet capabilities. These range from your refrigerator and other consumer electronics and our connected cars. Along the way there are several challenges to overcome in providing a secure platform for our Internet of things, among them the limited performance and memory of the device, the ever increasing volume of data and rising demand of users within given standards. The detection of Cyber-threats in real time and prevention of dynamic attacks as they occur will be essential for the success of the Internet of Things and Industrie4.0. Christian Milde will explain how we will address these issues.
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
The new age of cyber threats is not limited to data breaches and ransomware attacks. They have become much more advanced with AI-based security analysis, crypto-jacking, facial recognition, and voice cloning via deep fake, IoT compromise, and cloud-based DDoS attacks.
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
Surprisingly, Deepfake Technology, which was once used for fun, has now enabled phishing attacks. Rick McRoy detected a deep fake-based voice call that caused a CEO to transfer a sum amount of $35 Million.
Further, AI-powered cyberattacks also pose a serious security risk. Existing cybersecurity tools are not enough to counter this cyber weaponry.
In the wake of such incidents, the need for advanced cybersecurity tools is growing important.
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
View on-demand presentation: http://securityintelligence.com/events/ibm-2015-cyber-security-intelligence-index/
The cyber threat landscape is increasing in complexity and frequency. Organizations that have historically not been the target of cyber attacks now make headline news with large data losses and compromised transactions. Organizations need a clear point of view on how to respond to these threats, and one that incorporates not only the relevant technology but also the organizational changes needed.
Nick Bradley, Practice Leader of the IBM Threat Research Group and the X-Force Threat Analysis Team, and Nick Coleman, Global Head Cyber Security Intelligence Services outline what organizations need to do now and in the future to stay ahead of the growing cyber security threat.
The 1% Who Can Take Down your OrganizationCloudLock
The Cloud Cybersecurity Lessons We Learned from 10M Users. Learn about the top cloud cybersecurity trends that fly under your radar, what the distribution of cloud cybersecurity risk means for your ability to act on it, along with 3 key security skills you should master for an immediately safer cloud environment.
The pace and scale of technology advancements have created extraordinary avenues for businesses to grow. But with opportunities come risks, which need to be constantly navigated. Read this blog to uncover the top 5 cybersecurity trends to watch out for in 2021 and beyond.
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
The attached deck "Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them" talks about strategic and tactical attacks to watch out for in 2019 and the defensive strategies to deploy against these emerging threats.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Retail Week: Cloud Security
1. Cloud Security
For Retail01
How Not To Make
The Headlines:
Kevin Linsell
Director, Strategy & Architecture
Adapt
Richard Cassidy
Technical Director
Alert Logic
5 Ways To Kill The
Cyber Security Threat
4. 04 Cloud: The Retail Enabler04
Source: IDC FutureScape, 2015
as many retailers as now
will explicitly underpin
their customer and
operations strategies on
3rd platform technologies
by 2017
3x
5. Cloud Adoption Trends05
Sources:
1. Cloud Industry Forum, 2015 (n=250)
2. Adapt Cloud Adoption Survey, 2015 (n=200)
2
years on:
84%
of UK businesses use cloud
services today1
48 53 61 69 78 84
52 47 39 31 22 16
0%
20%
40%
60%
80%
100%
2010 2011 2012 2013 2014 2015
And 78%
use more
than one
cloud-based
service1
32%
22%
35%
43%
16% 29%
7% 7%
9% 8%
2014 2015
One Two Three Four Five+
38%will increase their
cloud adoption
25%will refine their cloud
environment
18%will transform their
cloud environment2
6. An Evolving Landscape06
Early 2000s Mid 2000s 2015 & Beyond
Always
Online
Smartphone
Revolution
End Of The
Dot.com
In Pursuit Of
Omni-Channel
Shopping Trolley
Goes Mobile
Brick & Mortar +
1-Way Online
HybridVirtualPhysical
Advanced, Multi
Vector Attacks
Proliferation &
Organisation
Basic Malware,
Solo Mischief
Consumer
Technology
Data Centre
Retail
Threats &
Attacks
7. 07 Stats That Keep You Up At Night…07
Sources: 1. The UK Cyber Security Strategy: Landscape Review – NAO 2013
2. ACI Worldwide, 2014
Almost 33% of online consumers don’t
trust retail security2
£35,000 to £65,000 is the average cost of
SME cyber/data loss1
The cost of cyber crime in the UK in 2013 was estimated to be between
£18 billion & £27 billion1
7,000 Distributed Denial of Service (DDoS)
attacks daily1
For larger businesses, the average cost is
£450,000 to £850,0001
9. 09 The Retail Cyber Kill Chain
1 – IDC Worldwide Security and Vulnerability Management 2014–2018 Forecast
2 – M-Trends 2015: A View from the Front Lines
Attacks are multi-stage using multiple threat
vectors
On average, it takes organizations 205 days to
identify they have been compromised1
Over two-thirds of organizations find out from
a 3rd partythey have been compromised2
IDENTIFY
& RECON
INITIAL
ATTACK
COMMAND
& CONTROL
DISCOVER/
SPREAD
EXTRACT/
EXFILTRATE
11. 011 Cybercrime: The Main Enablers
Anonymity
Crypto Currencies
Underground Market
12. 012 Have You Been Affected?
Source: Alert Logic CSR 2015. n=3026
39%
24%
22%
9%
6%
App Attack Brute Force Suspicious Activity Recon Trojan
13. 013 Why Are You Of Interest?
Large volumes of
personal/ financial data
eCommerce
Application
Diverse, physically
insecure infrastructure
14. Richard Cassidy
Technical Director, Alert Logic
Kevin Linsell
Director, Strategy & Architecture, Adapt
How To Kill The Cyber
Security Threat
15. 015 Continuous, End-to-End Protection
Continuous
protection
from threat &
exposure
Threat
Intelligence
& Security
Content
24 x 7
Monitoring
&
Escalation
Your IT
Environment
Cloud, Hybrid
On-Premises
Network Events &
Vulnerability
Scanning
Log Data
Web Application
Events
Data
Collection
Big Data
Analytics
Platform
16. 016 5 Ways To Kill The Cyber Security Threat
Stay Informed &…
Best Practice
Secure your
applications first
Create robust
access management
policies
Adopt a patch
management
approach
Review logs
regularly
Build a security
toolkit
1 Assume the worst can (and will!) happen
2 Fully assess what is at risk
3 Give responsibility to the right people
4 Plan for rapid recovery
5 View strong risk mgmt & security as an enabler
17. 017 Security: A Shared Responsibility
ServiceProviderResponsibility
Foundation Services
(ISO 27001 compliant)
Hypervisor & OS
• Firewall & perimeter security services
• Segregation of Adapt & Customer Networks
• Regular Pen-tested network
• Accredited platform design & build
• Controlled access for customers
• Guest OS hardening
• Patch management
• Infrastructure updates
• Client access management
• Permission policies
• Security monitoring
• Log analysis
Apps
• Secure coding and best practices
• Software and virtual patching
• Configuration management
• Access management
• Application level attack monitoring
• Network threat
detection
• Security monitoring
• DDoS ProtectionNetworks
Compute Storage DB Network
CustomerResponsibility