SlideShare a Scribd company logo
Security As A Service In Cloud(SECaaS)

               Presented By
               Vivek Mehta
            Bismillah Rawthar
Various Cloud Services
 1. Software As A Service(SaaS)
    •   provider licenses an application to customers either as a
        service on demand, through a subscription, in a “pay-as-
        you-go” model, or (increasingly) at no charge.
    •   Characteristic Of SaaS
          Web access to commercial software.
          Software is managed from a central location
          Software delivered in a “one to many” model.
          Users not required to handle software upgrades and
           patches.
Various Cloud Services
 2. Platform As A Service(PaaS)
    • a computing platform that allows the creation of web
      applications quickly and easily and without the complexity
      of buying and maintaining the software and infrastructure
      underneath it.
    • Characteristic Of PaaS
        Multi-Tenant Architecture.
        Services to develop, test, deploy, host and maintain
          applications in the same integrated development
          environment.
        All the varying services needed to fulfill the application
          development process.
Various Cloud Services
 3. Infrastructure As A Service(IaaS)
    • is a way of delivering Cloud Computing infrastructure –
      servers, storage, network and operating systems – as an on
      demand service.
    • Rather than purchasing servers, software, datacenter space
      or network equipment, clients instead buy those resources
      as a fully outsourced service on demand.
    • Characteristics Of IaaS
         Resources are distributed as a service.
         Generally includes multiple users on a single piece of
          hardware.
Various Cloud Services
 4. Storage As A Service(STaaS)
    •   is a business model in which a large service provider rents space in their
        storage infrastructure on a subscription basis.
 5. Security As A Service(SECaaS)
    •   is a business model in which a large service provider integrates their
        security services into a corporate infrastructure on a subscription basis.
    •   security services include authentication, anti-virus, anti-
        malware/spyware, intrusion detection, and security event management,
        among others.
    •   Cloud providers provide various services for protection i.e. to protect an
        individual computer or an organization’s network.
    •   The various application/product that they offer falls under the category
        of SECaaS.
Various Cloud Services
Top 10 Companies That Provide Cloud Services
  1. Amazon Web Services
  2. Rackspace
  3. CenturyLink/Savvis
  4. Salesforce.com
  5. Verizon/Terremark
  6. Joyent
  7. Citrix
  8. Bluelock
  9. Microsoft
  10. VMware
Why Cloud-Based Security Is Required?
 • the increase in use of cloud-based services, such as
   salesforce.com or Google Apps, means that many mobile IT
   users will be accessing business data and services without
   traversing the corporate network. This will increase the need for
   enterprises to place security controls between mobile users and
   cloud-based services.
 • the use of peer-to-peer in-the-cloud computing will also make
   enterprises more vulnerable to some security risks by reducing
   the cost of brute force attacks. Inexpensive cloud-based
   processing will make it easier and cheaper to break encryption
   keys or find vulnerabilities in software, and financially motivated
   criminals will certainly seek to take advantage of that.
Why Cloud-Based Security Is Required?
 • Most threats never hit the on-premises network.
 • Reduced total cost of ownership.
 • Easier support for mobile and remote users.
 • Rapid deployment of services.
 • Extending the life of on-premises solutions.
SECaaS Are Provided For The Following Area
 1.   Identity and Access Management.
 2.   Data Loss Prevention.
 3.   Web Security.
 4.   Security Assessment.
 5.   Intrusion management.
 6.   Encryption.
 7.   Network Security.
 8.   Business Continuity And Disaster Recovery.
 9.   Security information And Event Management.
Various Services/Products
 1. Altor VF By Altor Networks
    •   Altor Virtual Firewall is a software security appliance that runs in a
        virtualized environment and enforces security policy on a per virtual
        machine basis. Data center administrators can now pinpoint a broad
        range of virtual network security compromises and easily create
        roles-based security policies. Security policies can be continuously
        enforced on individual virtual machines, even as they move
        throughout the virtualized data center.
 2. AppGate Security Server - By Cryptzone Group AB
    •   The AppGate is a secure access system that protects servers (virtual,
        physical or virtualized) with an inbuilt application layer firewall. It
        includes encryption of all communication between workstations,
        mobile phones and the AppGate Server. The granular and role based
        access makes it possible for system administrators to give specific
        access.
Various Services/Products
 3. BIObeans - By TouchTier Technology Pte Ltd
    • BIObeans is a scalable Biometric-Secured Identification &
      Authentication Solution, built upon service-oriented architecture (SOA)
      using onboard biometric finger print sensors and commercially available
      off-the-shelf hardware. BIObeans provides an advantage when it goes
      for hundreds of thousands of users deployment with control to one
      identity per person.
 4. CipherCloud - By CipherCoud, Inc
    • CipherCloud provides a solution to address data privacy, sovereignty,
      security and regulatory challenges with cloud adoption. It leverages
      strong encryption to protect sensitive data in real-time before it's sent
      to the cloud. It does not require any change to cloud applications, and
      doesn’t impact functionality, performance, or user experience.
Various Services/Products
 5. DefensePro - By Radware, Ltd
    • Radware's DefensePro is a real-time Intrusion Prevention System (IPS)
      that maintains your business continuity by protecting your IP
      infrastructure against existing and emerging network-based threats that
      can't be detected by traditional IPS' such as application misuse threats,
      SSL attacks and VoIP service misuse.
 6. McAfee Total Protection - By McAfee, Inc
    • McAfee Total Protection service provides total desktop protection
      including anti-virus, anti-spyware, firewall and basic email virus
      protection in one, integrated package with automatic security updates
      and a single reporting and configuration console via the McAfee Web-
      based Security Center.
Thank You
 And Finally

More Related Content

What's hot

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud computing
Cloud computingCloud computing
Cloud computing
DebrajKarmakar
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
tmather
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
Animesh Chaturvedi
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
Amazon Web Services
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
Ravindra Dastikop
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introductionopenstackindia
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
Ripal Ranpara
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Shiva Prasad
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
MonishaNehkal
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode
 
Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingAdrian Cockcroft
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
Rinaldo John
 

What's hot (20)

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
OpenStack Introduction
OpenStack IntroductionOpenStack Introduction
OpenStack Introduction
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Overview of computing paradigm
Overview of computing paradigmOverview of computing paradigm
Overview of computing paradigm
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud Computing
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 

Viewers also liked

Security Service Management
Security Service ManagementSecurity Service Management
Security Service Management
Sakti Sumarna
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
Amazon Web Services
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
US-Ignite
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service Brief
Nishongo Gangchil
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Vitor Domingos
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
mounika k
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
George Fares
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
Michael Davis
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
Cisco Canada
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
Javier Losa
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
Solar Security
 

Viewers also liked (14)

Security Service Management
Security Service ManagementSecurity Service Management
Security Service Management
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Cyber Security as a Service
Cyber Security as a ServiceCyber Security as a Service
Cyber Security as a Service
 
Elite Force Security Service Brief
Elite Force Security Service BriefElite Force Security Service Brief
Elite Force Security Service Brief
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
How to avoid your website from keep getting hacked
How to avoid your website from keep getting hackedHow to avoid your website from keep getting hacked
How to avoid your website from keep getting hacked
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service in a Financial Institution: Reality or Chimera?
 
Security as a Service = JSOC
Security as a Service = JSOCSecurity as a Service = JSOC
Security as a Service = JSOC
 

Similar to Security As A Service In Cloud(SECaaS)

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
contrastcbt
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud Computing
Stuart Braud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
Orchestrate Mortgage and Title Solutions, LLC
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
HTS Hosting
 
[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department
Agusto Sipahutar
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
RapidScale
 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
Sysfore Technologies
 
CIT-382 Cloud Technology
CIT-382 Cloud TechnologyCIT-382 Cloud Technology
CIT-382 Cloud Technology
LuisDeLeon74
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
preetajain
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
Mekhi Da ‘Quay Daniels
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Harish Chander
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
Nazneen Sheikh
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
Regumsoft Technologies
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
Cisco Mobility
 

Similar to Security As A Service In Cloud(SECaaS) (20)

Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2Contrast cbt cloud computing - v.2
Contrast cbt cloud computing - v.2
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud Computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Third Party Cloud Management
Third Party Cloud ManagementThird Party Cloud Management
Third Party Cloud Management
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
 
[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department[Slides] how to integrated managed service dengan it department
[Slides] how to integrated managed service dengan it department
 
Understanding the Cloud Stack
Understanding the Cloud StackUnderstanding the Cloud Stack
Understanding the Cloud Stack
 
Private Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | SysforePrivate Cloud Computing - Get the best for your business | Sysfore
Private Cloud Computing - Get the best for your business | Sysfore
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CIT-382 Cloud Technology
CIT-382 Cloud TechnologyCIT-382 Cloud Technology
CIT-382 Cloud Technology
 
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdfQ.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
Q.1) The Hardware Layer-The hardware layer is sometimes referred t.pdf
 
Cloud computing & IAAS The Dual Edged Sword of New Technology
Cloud computing & IAAS  The Dual Edged Sword of New Technology Cloud computing & IAAS  The Dual Edged Sword of New Technology
Cloud computing & IAAS The Dual Edged Sword of New Technology
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Cloud Architect Company in India
Cloud Architect Company in IndiaCloud Architect Company in India
Cloud Architect Company in India
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 

More from أحلام انصارى

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
أحلام انصارى
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
أحلام انصارى
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
أحلام انصارى
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
أحلام انصارى
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
أحلام انصارى
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
أحلام انصارى
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website أحلام انصارى
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 

More from أحلام انصارى (20)

An Enhanced Independent Component-Based Human Facial Expression Recognition ...
An Enhanced Independent Component-Based Human Facial Expression Recognition  ...An Enhanced Independent Component-Based Human Facial Expression Recognition  ...
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
 
Intention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in hapticIntention recognition for dynamic role exchange in haptic
Intention recognition for dynamic role exchange in haptic
 
Noise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech RecognitionNoise Adaptive Training for Robust Automatic Speech Recognition
Noise Adaptive Training for Robust Automatic Speech Recognition
 
Human behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptorHuman behaviour analysis based on New motion descriptor
Human behaviour analysis based on New motion descriptor
 
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...Recognizing Human-Object Interactions inStill Images by Modeling the Mutual ...
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
 
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer InteractionMultimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 

Security As A Service In Cloud(SECaaS)

  • 1. Security As A Service In Cloud(SECaaS) Presented By Vivek Mehta Bismillah Rawthar
  • 2. Various Cloud Services 1. Software As A Service(SaaS) • provider licenses an application to customers either as a service on demand, through a subscription, in a “pay-as- you-go” model, or (increasingly) at no charge. • Characteristic Of SaaS Web access to commercial software. Software is managed from a central location Software delivered in a “one to many” model. Users not required to handle software upgrades and patches.
  • 3. Various Cloud Services 2. Platform As A Service(PaaS) • a computing platform that allows the creation of web applications quickly and easily and without the complexity of buying and maintaining the software and infrastructure underneath it. • Characteristic Of PaaS Multi-Tenant Architecture. Services to develop, test, deploy, host and maintain applications in the same integrated development environment. All the varying services needed to fulfill the application development process.
  • 4. Various Cloud Services 3. Infrastructure As A Service(IaaS) • is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on demand service. • Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand. • Characteristics Of IaaS Resources are distributed as a service. Generally includes multiple users on a single piece of hardware.
  • 5. Various Cloud Services 4. Storage As A Service(STaaS) • is a business model in which a large service provider rents space in their storage infrastructure on a subscription basis. 5. Security As A Service(SECaaS) • is a business model in which a large service provider integrates their security services into a corporate infrastructure on a subscription basis. • security services include authentication, anti-virus, anti- malware/spyware, intrusion detection, and security event management, among others. • Cloud providers provide various services for protection i.e. to protect an individual computer or an organization’s network. • The various application/product that they offer falls under the category of SECaaS.
  • 7. Top 10 Companies That Provide Cloud Services 1. Amazon Web Services 2. Rackspace 3. CenturyLink/Savvis 4. Salesforce.com 5. Verizon/Terremark 6. Joyent 7. Citrix 8. Bluelock 9. Microsoft 10. VMware
  • 8. Why Cloud-Based Security Is Required? • the increase in use of cloud-based services, such as salesforce.com or Google Apps, means that many mobile IT users will be accessing business data and services without traversing the corporate network. This will increase the need for enterprises to place security controls between mobile users and cloud-based services. • the use of peer-to-peer in-the-cloud computing will also make enterprises more vulnerable to some security risks by reducing the cost of brute force attacks. Inexpensive cloud-based processing will make it easier and cheaper to break encryption keys or find vulnerabilities in software, and financially motivated criminals will certainly seek to take advantage of that.
  • 9. Why Cloud-Based Security Is Required? • Most threats never hit the on-premises network. • Reduced total cost of ownership. • Easier support for mobile and remote users. • Rapid deployment of services. • Extending the life of on-premises solutions.
  • 10. SECaaS Are Provided For The Following Area 1. Identity and Access Management. 2. Data Loss Prevention. 3. Web Security. 4. Security Assessment. 5. Intrusion management. 6. Encryption. 7. Network Security. 8. Business Continuity And Disaster Recovery. 9. Security information And Event Management.
  • 11. Various Services/Products 1. Altor VF By Altor Networks • Altor Virtual Firewall is a software security appliance that runs in a virtualized environment and enforces security policy on a per virtual machine basis. Data center administrators can now pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. 2. AppGate Security Server - By Cryptzone Group AB • The AppGate is a secure access system that protects servers (virtual, physical or virtualized) with an inbuilt application layer firewall. It includes encryption of all communication between workstations, mobile phones and the AppGate Server. The granular and role based access makes it possible for system administrators to give specific access.
  • 12. Various Services/Products 3. BIObeans - By TouchTier Technology Pte Ltd • BIObeans is a scalable Biometric-Secured Identification & Authentication Solution, built upon service-oriented architecture (SOA) using onboard biometric finger print sensors and commercially available off-the-shelf hardware. BIObeans provides an advantage when it goes for hundreds of thousands of users deployment with control to one identity per person. 4. CipherCloud - By CipherCoud, Inc • CipherCloud provides a solution to address data privacy, sovereignty, security and regulatory challenges with cloud adoption. It leverages strong encryption to protect sensitive data in real-time before it's sent to the cloud. It does not require any change to cloud applications, and doesn’t impact functionality, performance, or user experience.
  • 13. Various Services/Products 5. DefensePro - By Radware, Ltd • Radware's DefensePro is a real-time Intrusion Prevention System (IPS) that maintains your business continuity by protecting your IP infrastructure against existing and emerging network-based threats that can't be detected by traditional IPS' such as application misuse threats, SSL attacks and VoIP service misuse. 6. McAfee Total Protection - By McAfee, Inc • McAfee Total Protection service provides total desktop protection including anti-virus, anti-spyware, firewall and basic email virus protection in one, integrated package with automatic security updates and a single reporting and configuration console via the McAfee Web- based Security Center.
  • 14. Thank You And Finally