Is your company thinking about the cloud or already in there but learning fast about the many challenges of the security and privacy of cloud data?
Learn more about the landscape of data in the cloud, and the obstacles that every company should consider when it comes to protecting their down.
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
Growing data volumes, cloud service options, and overwhelming number of mobile devices continue to add to the complexity of eDiscovery. Information dispersed across various data sources (endpoints and popular cloud applications) and outdated technology for eDiscovery make the collection and preservation of ESI not only a tedious and manual process but can also be the source of data spoliation.
The slides from this webcast show modern eDiscovery technologies enables organizations to accelerate the eDiscovery process while reducing costs and risk by:
* Automating legal hold, in place preservation, collection and processing utilizing a single platform from Exterro
* Collection and preservation of end-user (including existing employee) data across endpoints and popular cloud applications (through Druva)
* Streamlining data transfer and ingestion to eliminate technology bottlenecks for faster analysis and review
See the webcast at: http://bit.ly/2fBeLXW
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudDruva
Today legal hold data requests expand far beyond traditional email server requirements. Last year alone, 62% of requests included data from mobile devices and 37% from cloud application services. As the data volumes increase, Legal and IT teams can no longer continue to rely on legacy eDiscovery processes that are both inefficient and costly.
Our experts discussed how the latest generation of eDiscovery solutions, using native-cloud technologies, are dramatically reducing both data collection and ingestion times, while significantly increasing the speed and efficiencies of the analysis and review process. Hear how legal and IT teams can:
* Extend data collection to endpoints and cloud apps to centrally collect, preserve and classify information
* Increase transparency for senior lawyers and corporate counsel through automated real-time metrics
* Achieve cloud-to-cloud data transfer to reduce the risk of data spoliation while removing the need for physical collection and shipping
By moving your eDiscovery process to the cloud, IT can quickly respond to their legal department’s inquiries, and legal teams gain faster data ingestion times along with high speed processing, analysis, and review.
To view the webcast: http://pages2.druva.com/eDiscovery-in-Cloud_On-Demand.html
4 ways to cut your e discovery costs in half-webinar-exterro-druvaDruva
Growing data volumes, cloud service options, and overwhelming number of mobile devices continue to add to the complexity of eDiscovery. Information dispersed across various data sources (endpoints and popular cloud applications) and outdated technology for eDiscovery make the collection and preservation of ESI not only a tedious and manual process but can also be the source of data spoliation.
The slides from this webcast show modern eDiscovery technologies enables organizations to accelerate the eDiscovery process while reducing costs and risk by:
* Automating legal hold, in place preservation, collection and processing utilizing a single platform from Exterro
* Collection and preservation of end-user (including existing employee) data across endpoints and popular cloud applications (through Druva)
* Streamlining data transfer and ingestion to eliminate technology bottlenecks for faster analysis and review
See the webcast at: http://bit.ly/2fBeLXW
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
The state of data privacy with dimensional research Druva
Here are the slides from the Data Privacy webinar we hosted with Dimensional Research. Full access to the full data privacy report that's referenced in the slides, go here: http://bit.ly/1EoYo3r
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
Enterprise data governance is a critical, yet challenging, business process, and the rapidly expanding universe of data volumes and types make it a more significant undertaking, particularly for public sector organizations. In this session, attendees will learn how to bring comprehensive data governance to their organizations to ensure data collected and managed is handled and protected as required. Discover practical information on how to use the components and frameworks of the Hadoop stack to support your requirements for data auditing, lineage, metadata management, and policy enforcement, and hear recommendations on how to get started with measuring the progress of ethical big data usage--including what’s legal and what’s right. Bring your questions and join this lively, interactive dialogue.
Learn how our Advisory Services team guides customers through two critical processes. The first is the process of assessing where you are today and the second is the process of building a stronger privacy program for tomorrow customized to your organization.
Data breaches where millions of records are lost happen because of poor user access control. Do you know who has access to what data in your enterprise? Get better protection with BlueTalon data-centric security solution.
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
5 in 1 Data Protection - This solution is listed on "Gartner's Cool Vendor in Business Continuity and IT Disaster Recovery Management."
Always Protected. Always There.
- Automated Backup
- One-Click Disaster Recovery
- Local & Cloud-Based Protection
Cloud backup, archive, disaster recovery, and file sharing. Protecting servers (physical and virtual), desktops and laptops, and mobile endpoints coverage with your choice of cloud targets – your cloud, our cloud, or any cloud. This is data protection on your terms.
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceTata Consultancy Services
Attivio provides a unified information access (UIA) platform called the Active Intelligence Engine (AIE), having capabilities of enterprise search and business intelligence (BI) to JOIN related and relevant ‘content’ and ‘data’ with Google-like full text search and analytics with standard SQL.
Digital Transformation is a key imperative for most organizations today. This presentation will cover the key drivers that are compelling businesses to take on Digital Transformation initiatives, and will discuss ways that organizations can accelerate their journey.
The state of data privacy with dimensional research Druva
Here are the slides from the Data Privacy webinar we hosted with Dimensional Research. Full access to the full data privacy report that's referenced in the slides, go here: http://bit.ly/1EoYo3r
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
Enterprise data governance is a critical, yet challenging, business process, and the rapidly expanding universe of data volumes and types make it a more significant undertaking, particularly for public sector organizations. In this session, attendees will learn how to bring comprehensive data governance to their organizations to ensure data collected and managed is handled and protected as required. Discover practical information on how to use the components and frameworks of the Hadoop stack to support your requirements for data auditing, lineage, metadata management, and policy enforcement, and hear recommendations on how to get started with measuring the progress of ethical big data usage--including what’s legal and what’s right. Bring your questions and join this lively, interactive dialogue.
Learn how our Advisory Services team guides customers through two critical processes. The first is the process of assessing where you are today and the second is the process of building a stronger privacy program for tomorrow customized to your organization.
Data breaches where millions of records are lost happen because of poor user access control. Do you know who has access to what data in your enterprise? Get better protection with BlueTalon data-centric security solution.
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
The Briefing Room with Dr. Robin Bloor and HP Security Voltage
Live Webcast September 22, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=45ece7082b1d7c2cc8179bc7a1a69ea5
Hadoop is rapidly becoming a development platform and dominant server environment, and organizations are keen to take advantage of its massively scalable – and relatively inexpensive – resources. It is not, however, without its limitations, and it often requires a contingent of complementary components in order to behave within an information architecture. One area often overlooked is security, a factor that, if not considered from the onset, can insert great risk when putting sensitive data in Hadoop.
Register for this episode of The Briefing Room to learn from veteran Analyst Dr. Robin Bloor as he discusses how security was never a design point for Hadoop and what organizations can do about it. He’ll be briefed by Sudeep Venkatesh of HP Security Voltage, who will explain the intricacies surrounding a secure Hadoop implementation. He will show how techniques like format-preserving and partial-field encryption can allow for analytics over protected data, with zero performance impact.
Visit InsideAnalysis.com for more information.
5 in 1 Data Protection - This solution is listed on "Gartner's Cool Vendor in Business Continuity and IT Disaster Recovery Management."
Always Protected. Always There.
- Automated Backup
- One-Click Disaster Recovery
- Local & Cloud-Based Protection
Cloud backup, archive, disaster recovery, and file sharing. Protecting servers (physical and virtual), desktops and laptops, and mobile endpoints coverage with your choice of cloud targets – your cloud, our cloud, or any cloud. This is data protection on your terms.
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceTata Consultancy Services
Attivio provides a unified information access (UIA) platform called the Active Intelligence Engine (AIE), having capabilities of enterprise search and business intelligence (BI) to JOIN related and relevant ‘content’ and ‘data’ with Google-like full text search and analytics with standard SQL.
Digital Transformation is a key imperative for most organizations today. This presentation will cover the key drivers that are compelling businesses to take on Digital Transformation initiatives, and will discuss ways that organizations can accelerate their journey.
Cloud computing means using multiple server computers via a digital network, as though they were one computer.
We can say , it is a new computing paradigm, involving data and/or computation outsourcing.
it has many issues like security issues, privacy issues, data issues, energy issues, bandwidth issues, cloud interoperability.
there are solutions like scaling of resources, distribute servers etc.
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned.
In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment.
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
Practical Advice for Cloud Data Security for Oracle
Learn about critical security issues in the Cloud in relation to databases
Learn about Cloud data security guidance and standards
Learn Cloud data security technologies, models and Cloud security in context to the enterprise
The rapid rise of cloud databases, storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned.
In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of usability, database indexing, database searches, separation of duties, key management, tokenization, compliance, privacy and security in the cloud environment.
In shared infrastructures such as clouds, sensitive or regulated data—including run-time and archived data—must be properly segregated from unauthorized users. Database and system administrators may have access to multiple clients’ data, and the location of stored data in a cloud may change rapidly. Compliance requirements such as Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA) and others may need to be met. This webinar will discuss how to help protect cloud-based customer information and intellectual property from both external and internal threats.
View the On-demand webinar: https://www2.gotomeeting.com/register/187735186
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
How should we prepare for this new brave world where many 3rd party security providers disappeared into cloud providers? This will greatly impact many 3rd party security vendors, organizations and investors.
Cloud transformations are accelerating. By 2020, cloud will increase by 157% and on-premises ’traditional’ IT infrastructure will decrease by 54%, according to 452 Research, 2018.
We will cover how many security solutions will change, including:
- WAF – Web Application Firewalls
- SIEM
- Firewalls
- Encryption
- Tokenization
- Key Management
- AV – Anti Virus
- Network
- And more...
Spoke on Securing Data in the Cloud at GISEC on 23rd May 2017. Touched on the trends, perceptions, and various controls to protect data. Finally, discussed various approaches to secure data in the cloud
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned.
In this session Protegrity CTO and data security thought leader Ulf Mattsson will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, Ulf will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment.
Key Topics include:
What is “Cloud” computing?
Security issues in the Cloud
Cloud data security guidance
Cloud data security technologies and models
Cloud security in context to the enterprise
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
Data breaches are on the rise. The constant threat of cyber attacks combined with the high cost and a shortage of skilled security engineers has put many companies at risk. There is a shift in cybersecurity investment and IT risk and security leaders must move from trying to prevent every threat and acknowledge that perfect protection is not achievable. PCI DSS 3.2 is out with an important update on data discovery and requirements to detect security control failures.
In this webinar, cybersecurity expert Ulf Mattsson will highlight current trends in the security landscape based on major industry report findings, and discuss how we should re-think our security approach.
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
From this presentation you will learn:
· A brief history of encryption
· How encryption is now deployed in the enterprise
· Encryption and key management best practices to keep data safe
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...ATMOSPHERE .
In this webinar, Francisco Brasileiro and Ignacio Blanquer will discuss the trustworthiness requirements of big-data applications deployed atop cloud infrastructures, and how the ATMOSPHERE platform can be used to handle them. This will be explained using as example a medical application developed in the context of the ATMOSPHERE project, and deployed over a transatlantic federated cloud infrastructure.
View on-demand recording: http://securityintelligence.com/events/how-vulnerable-is-your-critical-data/
Data infrastructures are highly dynamic, with changes in accounts, configurations and patches occurring regularly. Within your data infrastructure you need to understand the data. Not all data is the same. You need to protect the data that is considered high risk. However, most organizations lack the centralized control or skilled resources to review changes systematically to determine if they have introduced security gaps. While there are no silver bullets, there are key steps organizations can take to understand and reduce their risk and lower TCO.
In this presentation, Luis Casco-Arias, Senior Product Manager for IBM Security Guardium, describes best practices for:
- Assessing vulnerabilities and exposures
- Locking down critical data in various environments
- Aligning remediation workflows to prevent breaches and policy violations
Michael Appelby: Why the protection of information is critical for our society
http://www.infinit.dk/dk/nyheder-og-reportager/cyber-security-4-0-reportage.htm
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
Watch full webinar here: https://bit.ly/3xWXuSN
Malgré le besoin croissant d'agilité, les entreprises restent réticientes à héberger leur données sensibles dans le Cloud pour des raisons de sécurité. Par ailleurs, le chiffrement basique ne suffit plus, car masquer la donnée ou la fournir de façon partielle empêche son utilisation.
La cryptographie avancée associée à la Logical Data Fabric constitue un duo gagnant pour intensifier l’utilisation de ces données sensibles dans le Cloud tout en garantissant le maximum de sécurité et de confidentialité. D’une part, la Logical Data Fabric permet aux organisations ayant un écosystème hybride d’accéder à l’ensemble de leur patrimoine data en temps réel tout en étalissant des politiques de sécurité, alors que la cryptographie avancée permet de stocker les données chiffrées dans le cloud, même pendant son utilisation, tout en y incluant des droits d’accès.
Rejoignez ce webinar pour découvrir :
- Les enjeux d’accès et de partage des données dans les environnements hybrides et multiclouds.
- Comment la Logical Data Fabric de Denodo simplifie l’adoption du Cloud grâce à un point unique d’accès à la donnée tout en fournissant une couche de sécurité et de gouvernance.
- Comment les fonctionnalités avancées de la cryptographie de Cosmian se différencient des approches traditionnelles de chiffrement.
- Une démo live sur comment la cryptographie applicative permet de créer des politiques de sécurité et d’accès aux données dans des environnements zéro trust.
Similar to Security and privacy of cloud data: what you need to know (Interop) (20)
ANDRITZ, a global manufacturing company formed by acquisitions, with over 50 offices and a virtual IT department, decided that a cloud-first strategy for server backups was the only solution for a disparate and dispersed environment. Brian Bagwell, IT Director of North America and Trey Brown, IT Manager, discussed the company’s challenges to gain more visibility of their data and a cloud-based disaster recovery solution.
With Druva, they discuss:
* Managing complexities of multi-site server recovery requirements being maintained by a virtual IT staff
* Best practices for server backup and data retention with centralized control
* Immediate benefits realized by ANDRITZ such as server restores in seconds, data privacy, and cost savings
To hear the recording, please visit: http://pages2.druva.com/Rethink-Server-Backup-and-Regain-Control-On-Demand.html?utm_source=Social&utm_medium=slideshare
Taking a Proactive Approach to Combat Ransomware [Druva Webinar]Druva
According to CNN, ransomware incidents are expected to cost enterprises $1B in 2016 and no organization is immune. Healthcare, law enforcement and others have been attacked with malware, restricting access to systems and data until a ransom is paid. With ransomware attacks on the rise, organizations have found themselves vulnerable and struggling to reduce risk or proactively prepare for an attack response.
John Shier, Sr. Security Officer at Sophos and Sey Verma, Product Marketing Manager at Druva provide insights into how to confidently prepare your organization to combat ransomware threat including:
* Proactive strategies to protect data before a malicious attack occurs
* Factors and issues that can complicate your organization’s risks
* Measures to gain immediate access to data during and after an attack.
As attacks become more sophisticated, IT organizations need to become ever-vigilant and proactive in mitigating ransomware and other malware attacks.
You can access the live recording at: http://pages2.druva.com/Proactive-Approach-to-Combat-Ransomware-Webinar-On-Demand.html
Where in the world is your PII and other sensitive data? by @druva incDruva
Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Full blog here: http://bit.ly/1Jtzym5
Black Hat 2015 Survey: The Challenge of Data SprawlDruva
We asked Black Hat 2015 attendees about six common data risk scenarios. The findings show that the majority are struggling to protect sensitive corporate data across laptops, phones and in the cloud.
Take a look at these findings. How does your business handle these common and increasingly critical data protection scenarios? http://bit.ly/1TP8RmD
Consumers rely on businesses to keep their personal information safe. Too few of those businesses are actively protecting that data. Here’s what’s gone wrong, and how businesses should be responding. Full blog here: http://bit.ly/1Jtzym5
How prepared are you when it comes to Data Privacy? Take the enterprise data privacy quiz to find out. Follow along and mark your answers to see how you stack against your peers or read the report here: http://bit.ly/1DUGMfH.
Is your company prepared over the security and privacy of its data? Check out the 4 recommended aspects that we think deserve a bit more thought. http://bit.ly/1EqKe5P
AWS reInvent: Building an enterprise class backup and archival solution on AWSDruva
AWS re:Invent 2014 session: A technical deep dive on how inSync utilizes AWS architecture: S3, Glacier, and Dynamo DB. Full event recap here: http://bit.ly/1yTWOFM
What are some items every CIO should review when making the decision on whether or not to cloud? This infographic covers the most important aspects. More here: http://bit.ly/1vpGeKL
In a world of evolving threats, your mobile data is in constant danger. All corporate data used to reside in the data center. Safe and sound behind the corporate firewall. But now, employees have multiple devices—usually a laptop, a tablet, and a smartphone—that they use both inside and outside of the office. Plus often they’re using their own personal devices to access corporate data. And outside the corporate firewall, it’s a wild world. Learn more at wild.druva.com.
Here are 40 scary stats about endpoint data at risk that we've compiled -- and turning a blind eye won't make them go away. Go to wild.druva.com to learn more!
The Challenges of Windows XP Migration (infographic)Druva
n April 2014, support for Windows XP ends. If you still have computers to migrate, you have a lot of work on your hands: it takes 4-6 hours to migrate a single device from Windows XP, and most employees have more than 2 devices. With a traditional migration tool, there’s a 50% chance you’ll put in evening and weekend hours to migrate. It’s time to get your head out of the sand and begin planning your migration. Learn about the easier way to migrate: www.druva.com/migrate-your-os
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Security and privacy of cloud data: what you need to know (Interop)
1. Security & Privacy of Cloud Data
What You Need to Know
Dave Packer, Vice President Product Marketing
April, 2015
2. 2Data Protection and Governance at the Edge
“Druva has been a
phenomenal answer to Dell
for protecting our data”
About Druva
Company
• Fastest growing data protection and
governance company
• Over 3,000 customers
• Protecting 3.0m+ endpoints globally
Ranked #1 by Gartner two years running
Data Protection 2014
Brad Hammack
IT Emerging Technologies
3. 3Data Protection and Governance at the Edge
inSync
Efficient Endpoint Backup to the Cloud
4. 4Data Protection and Governance at the Edge
Dramatic Shift in Cloud Adoption
2013
75%
25%
2014
20%
80%
5. 5Data Protection and Governance at the Edge
The Global Hurdles of Cloud Adoption
• PRISM
• Sectoral Regulations
o HIPAA, FINRA, GLBA, COPPA, …
• Evolving Global Privacy Regulations
o EU, Germany, France, Russia, …
• Microsoft vs. United States
• Dropbox Transparency Report h"p://dlapiperdataprotec/on.com/
6. 6
2015: The Top Security Challenges
Source: 451 Group – Wave 8 Report 2015 (preliminary note)
7. 7Data Protection and Governance at the Edge
But there’s the flip-side of the coin
• Almost all major breaches in 2014 were
against on-premise systems
• Breaching the firewall can mean all
systems become vulnerable (Sony)
• Breach attributions
o Malicious outsider: 50%
o Accidental loss / misplace: 25%
o Malicious Insider: 15%
8. 8Data Protection and Governance at the Edge
What
type
of
data
is
the
most
sensi/ve
to
your
business?
Other People’s Data the Top Concern
1%
18%
19%
22%
33%
37%
41%
46%
52%
0%
10%
20%
30%
40%
50%
60%
We
do
not
have
sensi/ve
business
data
Planning
and
strategy
documents
Payroll
Unregulated
customer
data
(emails,
order
history,
etc.)
Accoun/ng
and
financial
Intellectual
property
Personal
employee
informa/on
(SSNs,
phone
numbers,
etc.)
Password
or
authen/ca/on
creden/als
Regulated
customer
data
(credit
cards,
health
records,
etc.)
9. 9Data Protection and Governance at the Edge
In
your
opinion,
which
environment
has
be"er
data
security
/
privacy
controls?
Cloud Security + Privacy Opinion is Changing
On
premises
65%
Cloud
35%
10. 10Data Protection and Governance at the Edge
h"p://techcrunch.com/2015/04/04/the-‐cloud-‐could-‐be-‐your-‐best-‐security-‐bet/?ncid=txtlnkusaolp00000629#.z48jaw:4RNJ
• The difference between 1 security
team and 1000’s of security teams
• Data durability / resiliency and
replication
• Expanding regional coverage
• However, you do need to scrutinize
your cloud provider stack
11. 11Data Protection and Governance at the Edge
Common Cloud Security/Privacy Concerns
• Infrastructure Security: Where is the infrastructure? How is
it controlled and to what extent certified?
• Data Security: How is the data encrypted in transit and
stored at-rest? What is the durability of the data?
• Data Residency: What are the regional, cross-geography
data controls?
• Data Privacy: What controls are in place to provide ethical
walls? What data can my SaaS provider access?
• SaaS Security: What certifications and security controls
does the SaaS provider have in place?
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services
12. 12Data Protection and Governance at the Edge
As a Cloud Provider, Security = Survival
• SOC 1, SOC 2 & SOC 3
ISO 27001
• PCI Level 1
• FedRAMP
• AWS GovCloud (US)
• MPAA best practices alignment
Customer are running SOX, HIPAA, FISMA,
DIACAP MAC III sensitive ATO, ITAR, …
Facilities
Physical security
Physical infrastructure
Network infrastructure
Virtualization infrastructure
IaaS
PaaS
13. 13Data Protection and Governance at the Edge
Distributed
Denial
Of
Service
(DDoS)
A>ack
Man
In
the
Middle
(MITM)
A>ack
Port
Scanning
Packet
sniffing
by
other
tenant
IP
Spoofing
Firewall
security
groups
Vulnerability
tesLng
Continuous Network Monitoring and Response
• Protects customer data from
network attacks:
o Intercepting in-transit data
o System breaches
o Blocking/disrupting services
14. 14Data Protection and Governance at the Edge
AWS Global Footprint
• >1 million active customers across
190 countries
• 900+ government agencies
• 3,400+ educational institutions
• 11 regions, including ITAR-compliant
GovCloud and the new region in
Germany
• 28 availability zones
• 53 edge locations
15. 15Data Protection and Governance at the Edge
SaaS Provider Needs Build the Proper Controls
• ✔ Infrastructure Security: Where is the infrastructure?
How is it controlled and to what extent certified?
• Data Security: How is the data encrypted in transit and
stored at-rest
• Data Residency: What are the regional, cross-geography
data controls?
• Data Privacy: What controls are in place to provide ethical
walls? What data can my SaaS provider access?
• SaaS Security: What certifications and security controls
does the SaaS provider have in place?
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services
16. 16Data Protection and Governance at the Edge
Most IaaS/PaaS Certifications Don’t Pass to the SaaS Level
IaaS
Infrastructure: Compute + Storage
PaaS
Distributed Database Services
SaaS
Application Services
• Druva Certifications & Audits
o ISAE-3000
o TRUSTe certified privacy
o EU Safe Harbor
o HIPAA Audited
• Regular VAPT Testing (White Hat)
• SkyHigh CloudTrust program partner
• Audits renewed annually
ISAE 3000
TRUSTe EU Safe Harbor
HIPAA BAA
Skyhigh
Enterprise-Ready
17. 17Data Protection and Governance at the Edge
Addressing Enterprise Data Protection RequirementsUnderstand How Your Data is Stored
S3 Buckets, Data Scrambling via Envelope Encryption
Blocks-Only into Object Storage
IaaS / Storage Layer
(EC2, S3, Glacier)
SSL
Global Deduplication (unique blocks) &
Metadata Separation (data is dereferenced)
PaaS Layer
(DynamoDB)
256
AES
Data
Metadata
18. 18Data Protection and Governance at the Edge
Encryption Key Models Vary Extensively
Management
Method
Strength
Weakness
Keys
Stored
with
Data
• Simple
• Provider
access
• System
wide
breach
poten/al
• Consumer
designed
Keys
Stored
in
Escrow
• No
provider
direct
access
• S/ll
accessible
w/
subpoena,
warrant,
court
order
• Key
rota/on,
management
may
be
needed
Key
Server
Keys
Stored
On-‐premise
• Secure,
no
provider
access
• On-‐premise
hardware,
must
be
managed
• Introduces
system-‐wide
failure
point
Envelope
Key
encrypted
in
cloud
• Secure,
inaccessible
by
vendor
• No
key
management
• Session
based
key
• No
access
=
provider
can’t
reset
client
key
19. 19Data Protection and Governance at the Edge
Envelope Key Management & Encryption
• Works like a bank safety-deposit box
o Unique encryption key generated per customer
o Key itself is encrypted with customer credentials and
stored as a token
• They key itself is inaccessible by anyone
o Only exists during the client session
o Never leaves the system
o Removes the need for key management
• Druva cannot access/decrypt customer data
with stored token
20. 20Data Protection and Governance at the Edge
Authentication Controls (AD, SSO)
Configurable Group Policies (Data Access, Sharing, Visibility)
Full Admin and End-User Audit Trails
SaaS Layer
Application
Addressing Enterprise Data Protection RequirementsSaaS Provider Security Approach
Global Deduplication (unique blocks) &
Metadata Separation (data is dereferenced)
PaaS Layer
(DynamoDB)
S3 Buckets, Data Scrambling via Envelope Encryption
Block-Only Object Storage
IaaS / Storage Layer
(EC2, S3, Glacier)
21. 21
Lastly, Be Sure Data Privacy is Being Addressed
Regional
Employee
Corporate
Scenario
22. 22Data Protection and Governance at the Edge
Addressing Regional Data Regulations
• 11 admin-selectable data storage regions, data
stays within the region
• Administrator segregation and delegation with
pre-defined granular access rights
• No ability for vendor to access key or stored data
Corporate Privacy
Regional Management
• Data residency
• Local administration
• Data Storage Privacy
23. 23Data Protection and Governance at the Edge
Walls for Corporate Data Privacy
• Policy group settings for classes via AD
(Officers, Legal, …) restrict data visibility
• Full data auditing for compliance response for
PHI & PII
• Proactive monitoring based on data
classifications
Corporate Privacy
Material Data
• Officer data shielding
• Compliance auditing
• Tracking + monitoring
24. 24Data Protection and Governance at the Edge
Protecting Employee Privacy
• End-user privacy controls either by policy or
opt-out feature (no admin data visibility)
• Containerization on mobile devices, extendable
via MDM (MobileIron)
• Exclusionary settings for backup and collection
process
• Admin visibility to audit trails restricted via policy
Employee Privacy
• Privacy controls
• Data segregation
• Corporate visibility
25. 25Data Protection and Governance at the Edge
Scenario-based Privacy
• Delegated roles for compliance and legal
counsel
• Full data and audit trail access for compliance,
investigation and litigation requirements
Scenario / Exceptions
• Compliance audits
• Investigations
• eDiscovery collection
26. 26Data Protection and Governance at the Edge
Key Takeaways
• Be sure to check the certifications and how they apply to the overall stack, just because the
IaaS/PaaS is certified it doesn’t mean the SaaS layer is.
• For data residency ensure your cloud data isn’t moving around to non-compliant locations,
have the vendor sign an agreement and show documented ability to comply
• Encryption models continue to evolve, make sure your provider can’t divulge your data
without you knowing
• Data privacy laws are still emerging and tend to be ambiguous, best place to get the
answers to stay compliant is working with your legal team, don’t guess