Security As A Service In Cloud(SECaaS)

               Presented By
               Vivek Mehta
            Bismillah Rawthar
Various Cloud Services
 1. Software As A Service(SaaS)
    •   provider licenses an application to customers either as a
        service on demand, through a subscription, in a “pay-as-
        you-go” model, or (increasingly) at no charge.
    •   Characteristic Of SaaS
          Web access to commercial software.
          Software is managed from a central location
          Software delivered in a “one to many” model.
          Users not required to handle software upgrades and
           patches.
Various Cloud Services
 2. Platform As A Service(PaaS)
    • a computing platform that allows the creation of web
      applications quickly and easily and without the complexity
      of buying and maintaining the software and infrastructure
      underneath it.
    • Characteristic Of PaaS
        Multi-Tenant Architecture.
        Services to develop, test, deploy, host and maintain
          applications in the same integrated development
          environment.
        All the varying services needed to fulfill the application
          development process.
Various Cloud Services
 3. Infrastructure As A Service(IaaS)
    • is a way of delivering Cloud Computing infrastructure –
      servers, storage, network and operating systems – as an on
      demand service.
    • Rather than purchasing servers, software, datacenter space
      or network equipment, clients instead buy those resources
      as a fully outsourced service on demand.
    • Characteristics Of IaaS
         Resources are distributed as a service.
         Generally includes multiple users on a single piece of
          hardware.
Various Cloud Services
 4. Storage As A Service(STaaS)
    •   is a business model in which a large service provider rents space in their
        storage infrastructure on a subscription basis.
 5. Security As A Service(SECaaS)
    •   is a business model in which a large service provider integrates their
        security services into a corporate infrastructure on a subscription basis.
    •   security services include authentication, anti-virus, anti-
        malware/spyware, intrusion detection, and security event management,
        among others.
    •   Cloud providers provide various services for protection i.e. to protect an
        individual computer or an organization’s network.
    •   The various application/product that they offer falls under the category
        of SECaaS.
Various Cloud Services
Top 10 Companies That Provide Cloud Services
  1. Amazon Web Services
  2. Rackspace
  3. CenturyLink/Savvis
  4. Salesforce.com
  5. Verizon/Terremark
  6. Joyent
  7. Citrix
  8. Bluelock
  9. Microsoft
  10. VMware
Why Cloud-Based Security Is Required?
 • the increase in use of cloud-based services, such as
   salesforce.com or Google Apps, means that many mobile IT
   users will be accessing business data and services without
   traversing the corporate network. This will increase the need for
   enterprises to place security controls between mobile users and
   cloud-based services.
 • the use of peer-to-peer in-the-cloud computing will also make
   enterprises more vulnerable to some security risks by reducing
   the cost of brute force attacks. Inexpensive cloud-based
   processing will make it easier and cheaper to break encryption
   keys or find vulnerabilities in software, and financially motivated
   criminals will certainly seek to take advantage of that.
Why Cloud-Based Security Is Required?
 • Most threats never hit the on-premises network.
 • Reduced total cost of ownership.
 • Easier support for mobile and remote users.
 • Rapid deployment of services.
 • Extending the life of on-premises solutions.
SECaaS Are Provided For The Following Area
 1.   Identity and Access Management.
 2.   Data Loss Prevention.
 3.   Web Security.
 4.   Security Assessment.
 5.   Intrusion management.
 6.   Encryption.
 7.   Network Security.
 8.   Business Continuity And Disaster Recovery.
 9.   Security information And Event Management.
Various Services/Products
 1. Altor VF By Altor Networks
    •   Altor Virtual Firewall is a software security appliance that runs in a
        virtualized environment and enforces security policy on a per virtual
        machine basis. Data center administrators can now pinpoint a broad
        range of virtual network security compromises and easily create
        roles-based security policies. Security policies can be continuously
        enforced on individual virtual machines, even as they move
        throughout the virtualized data center.
 2. AppGate Security Server - By Cryptzone Group AB
    •   The AppGate is a secure access system that protects servers (virtual,
        physical or virtualized) with an inbuilt application layer firewall. It
        includes encryption of all communication between workstations,
        mobile phones and the AppGate Server. The granular and role based
        access makes it possible for system administrators to give specific
        access.
Various Services/Products
 3. BIObeans - By TouchTier Technology Pte Ltd
    • BIObeans is a scalable Biometric-Secured Identification &
      Authentication Solution, built upon service-oriented architecture (SOA)
      using onboard biometric finger print sensors and commercially available
      off-the-shelf hardware. BIObeans provides an advantage when it goes
      for hundreds of thousands of users deployment with control to one
      identity per person.
 4. CipherCloud - By CipherCoud, Inc
    • CipherCloud provides a solution to address data privacy, sovereignty,
      security and regulatory challenges with cloud adoption. It leverages
      strong encryption to protect sensitive data in real-time before it's sent
      to the cloud. It does not require any change to cloud applications, and
      doesn’t impact functionality, performance, or user experience.
Various Services/Products
 5. DefensePro - By Radware, Ltd
    • Radware's DefensePro is a real-time Intrusion Prevention System (IPS)
      that maintains your business continuity by protecting your IP
      infrastructure against existing and emerging network-based threats that
      can't be detected by traditional IPS' such as application misuse threats,
      SSL attacks and VoIP service misuse.
 6. McAfee Total Protection - By McAfee, Inc
    • McAfee Total Protection service provides total desktop protection
      including anti-virus, anti-spyware, firewall and basic email virus
      protection in one, integrated package with automatic security updates
      and a single reporting and configuration console via the McAfee Web-
      based Security Center.
Thank You
 And Finally

Security As A Service In Cloud(SECaaS)

  • 1.
    Security As AService In Cloud(SECaaS) Presented By Vivek Mehta Bismillah Rawthar
  • 2.
    Various Cloud Services 1. Software As A Service(SaaS) • provider licenses an application to customers either as a service on demand, through a subscription, in a “pay-as- you-go” model, or (increasingly) at no charge. • Characteristic Of SaaS Web access to commercial software. Software is managed from a central location Software delivered in a “one to many” model. Users not required to handle software upgrades and patches.
  • 3.
    Various Cloud Services 2. Platform As A Service(PaaS) • a computing platform that allows the creation of web applications quickly and easily and without the complexity of buying and maintaining the software and infrastructure underneath it. • Characteristic Of PaaS Multi-Tenant Architecture. Services to develop, test, deploy, host and maintain applications in the same integrated development environment. All the varying services needed to fulfill the application development process.
  • 4.
    Various Cloud Services 3. Infrastructure As A Service(IaaS) • is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on demand service. • Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand. • Characteristics Of IaaS Resources are distributed as a service. Generally includes multiple users on a single piece of hardware.
  • 5.
    Various Cloud Services 4. Storage As A Service(STaaS) • is a business model in which a large service provider rents space in their storage infrastructure on a subscription basis. 5. Security As A Service(SECaaS) • is a business model in which a large service provider integrates their security services into a corporate infrastructure on a subscription basis. • security services include authentication, anti-virus, anti- malware/spyware, intrusion detection, and security event management, among others. • Cloud providers provide various services for protection i.e. to protect an individual computer or an organization’s network. • The various application/product that they offer falls under the category of SECaaS.
  • 6.
  • 7.
    Top 10 CompaniesThat Provide Cloud Services 1. Amazon Web Services 2. Rackspace 3. CenturyLink/Savvis 4. Salesforce.com 5. Verizon/Terremark 6. Joyent 7. Citrix 8. Bluelock 9. Microsoft 10. VMware
  • 8.
    Why Cloud-Based SecurityIs Required? • the increase in use of cloud-based services, such as salesforce.com or Google Apps, means that many mobile IT users will be accessing business data and services without traversing the corporate network. This will increase the need for enterprises to place security controls between mobile users and cloud-based services. • the use of peer-to-peer in-the-cloud computing will also make enterprises more vulnerable to some security risks by reducing the cost of brute force attacks. Inexpensive cloud-based processing will make it easier and cheaper to break encryption keys or find vulnerabilities in software, and financially motivated criminals will certainly seek to take advantage of that.
  • 9.
    Why Cloud-Based SecurityIs Required? • Most threats never hit the on-premises network. • Reduced total cost of ownership. • Easier support for mobile and remote users. • Rapid deployment of services. • Extending the life of on-premises solutions.
  • 10.
    SECaaS Are ProvidedFor The Following Area 1. Identity and Access Management. 2. Data Loss Prevention. 3. Web Security. 4. Security Assessment. 5. Intrusion management. 6. Encryption. 7. Network Security. 8. Business Continuity And Disaster Recovery. 9. Security information And Event Management.
  • 11.
    Various Services/Products 1.Altor VF By Altor Networks • Altor Virtual Firewall is a software security appliance that runs in a virtualized environment and enforces security policy on a per virtual machine basis. Data center administrators can now pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. 2. AppGate Security Server - By Cryptzone Group AB • The AppGate is a secure access system that protects servers (virtual, physical or virtualized) with an inbuilt application layer firewall. It includes encryption of all communication between workstations, mobile phones and the AppGate Server. The granular and role based access makes it possible for system administrators to give specific access.
  • 12.
    Various Services/Products 3.BIObeans - By TouchTier Technology Pte Ltd • BIObeans is a scalable Biometric-Secured Identification & Authentication Solution, built upon service-oriented architecture (SOA) using onboard biometric finger print sensors and commercially available off-the-shelf hardware. BIObeans provides an advantage when it goes for hundreds of thousands of users deployment with control to one identity per person. 4. CipherCloud - By CipherCoud, Inc • CipherCloud provides a solution to address data privacy, sovereignty, security and regulatory challenges with cloud adoption. It leverages strong encryption to protect sensitive data in real-time before it's sent to the cloud. It does not require any change to cloud applications, and doesn’t impact functionality, performance, or user experience.
  • 13.
    Various Services/Products 5.DefensePro - By Radware, Ltd • Radware's DefensePro is a real-time Intrusion Prevention System (IPS) that maintains your business continuity by protecting your IP infrastructure against existing and emerging network-based threats that can't be detected by traditional IPS' such as application misuse threats, SSL attacks and VoIP service misuse. 6. McAfee Total Protection - By McAfee, Inc • McAfee Total Protection service provides total desktop protection including anti-virus, anti-spyware, firewall and basic email virus protection in one, integrated package with automatic security updates and a single reporting and configuration console via the McAfee Web- based Security Center.
  • 14.