SlideShare a Scribd company logo
hybrid CLOUD computing
Security Aspects and Challenges
Ing. Roman Nedzelský, MVP
University of economics in Prague
redtoo s.r.o.
Agenda
• Why cloud is attractive
• Why cloud is a problem for enterprises and public sector
• Service models
• Deployment models
• Security challenges
• Hybrid cloud scenario
Why cloud is attractive?
Storage cost and
infrastructure
sprawl
Rapid data growth - 40% YoY*
Simplify data
protection and
disaster recovery
Everything
providing as a
service with SLA
Big DATA
Machine Learning
Business Intelligence
Why cloud is problem for enterprises and public sector
25% of governments around the world are interested, few of them are already in…
PROS
• ½ < realize cloud as cost saving way
• Using of new services & features
• Free licenses and service hours
CONS
• security, confident data, legislation
• migration of huge amount of data is for long time
• In which country is datacenter / are datacenters
Service models
SaaS IaaS PaaS DaaS SECaaS
Deployment models
Public
cloud
Private
cloud
Community
cloud
Hybrid
cloud
Deployment models – Hybrid cloud
On-site cloud
Outsourced cloud
Public cloud
on-site
private
cloud
on-site
community
cloud
outsourced
private
cloud
outsourced
community
cloud
In this case, every single type is connected with rest of
them (or should be)
Security Challenges and Issues
DaaSMulti-tenancy (Providers side)
DaaSSecurity and Security Perimeters (Providers side)
DaaSDomain Controllers in cloud
DaaSIntegration
DaaSHuman Factor
SECaaS (Security as a Service)
Where
are the
data?
What
about the
ISOs?
What
about the
ROI?
Hybrid scenario {SaaS}
PRIVATE IN-HOUSE CLOUD
Confidential Data
SaaS Public cloud for
least Confidential Data
Private In-house Infrastructure
SaaS Public cloud for
least Confidential Data
- Separated accounts
- Federated authentication
- Multifactor authentication
Hybrid scenario {IaaS}
PRIVATE IN-HOUSE CLOUD
Confidential Data
OUTSOURCES PRIVATE CLOUD
IaaS Public cloud
Private In-house Infrastructure Providers Infrastructure
second option
? ?
Hybrid scenario {SaaS + IaaS}
PRIVATE IN-HOUSE CLOUD
Confidential Data
OUTSOURCES PRIVATE CLOUD
Less Confidential Data
Private In-house Infrastructure Providers Infrastructure
SaaS Public cloud for
least Confidential Data
QUESTIONS?
Thank you...
http://romannedzelsky.eu
roman.nedzelsky@outlook.com

More Related Content

What's hot

Microsoft presentation
Microsoft presentation Microsoft presentation
Microsoft presentation
Pinar Ozduble
 
Claire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid CloudClaire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid Cloud
Juergen Domnik
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nishant Patel
 
Cloud computing benefits
Cloud computing benefitsCloud computing benefits
Cloud computing benefits
Ryan Shams
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud success
ClearSky Data
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
Dell World
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsVikas Sahni
 
Cloud computing concept & design
Cloud computing concept & designCloud computing concept & design
Cloud computing concept & design
Sandipan Samaddar
 
Cloud
CloudCloud
The opportunities and challenges of hosting on the cloud
The opportunities and challenges of hosting on the cloudThe opportunities and challenges of hosting on the cloud
The opportunities and challenges of hosting on the cloud
dbslibrary
 
Cio webinar - 04 12 10
Cio webinar - 04 12 10Cio webinar - 04 12 10
Cio webinar - 04 12 10Barton George
 
Cloud
CloudCloud
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloudRed Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
Eric D. Schabell
 
Cloud Application Development – The Future is now
Cloud Application Development – The Future is nowCloud Application Development – The Future is now
Cloud Application Development – The Future is now
SPEC INDIA
 
Deploying SaaS Application on the Cloud - Case Study
Deploying SaaS Application on the Cloud - Case StudyDeploying SaaS Application on the Cloud - Case Study
Deploying SaaS Application on the Cloud - Case Study
Nati Shalom
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Kevin Murtha
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
Asim Kumar Pathak
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
CeleraNetworks
 

What's hot (20)

Microsoft presentation
Microsoft presentation Microsoft presentation
Microsoft presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Claire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid CloudClaire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud computing benefits
Cloud computing benefitsCloud computing benefits
Cloud computing benefits
 
Why edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud successWhy edge computing is critical to hybrid IT and cloud success
Why edge computing is critical to hybrid IT and cloud success
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Cloud computing concept & design
Cloud computing concept & designCloud computing concept & design
Cloud computing concept & design
 
Cloud
CloudCloud
Cloud
 
The opportunities and challenges of hosting on the cloud
The opportunities and challenges of hosting on the cloudThe opportunities and challenges of hosting on the cloud
The opportunities and challenges of hosting on the cloud
 
Cio webinar - 04 12 10
Cio webinar - 04 12 10Cio webinar - 04 12 10
Cio webinar - 04 12 10
 
Cloud
CloudCloud
Cloud
 
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloudRed Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
Red Hat Summit 2018 - 3 pitfalls everyone should avoid with hybrid multicloud
 
Cloud Application Development – The Future is now
Cloud Application Development – The Future is nowCloud Application Development – The Future is now
Cloud Application Development – The Future is now
 
Deploying SaaS Application on the Cloud - Case Study
Deploying SaaS Application on the Cloud - Case StudyDeploying SaaS Application on the Cloud - Case Study
Deploying SaaS Application on the Cloud - Case Study
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
Impact of cloud computing in education, e governance
Impact of cloud computing in education, e governanceImpact of cloud computing in education, e governance
Impact of cloud computing in education, e governance
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 

Viewers also liked

Startups Security
Startups SecurityStartups Security
Startups Security
Akash Mahajan
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
Akash Mahajan
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
Dibyadip Das
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
Rugby7277
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
n|u - The Open Security Community
 
AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
Ken Johnson
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
Fadi Abdulwahab
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Ninh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
Vladimir Jirasek
 
Time based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webserviceTime based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webservice
Frans Rosén
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
Frans Rosén
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (18)

Startups Security
Startups SecurityStartups Security
Startups Security
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
What is cloud ?
What is cloud ?What is cloud ?
What is cloud ?
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Cloud Security Issues 1.04.10
Cloud Security  Issues 1.04.10Cloud Security  Issues 1.04.10
Cloud Security Issues 1.04.10
 
Hack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhydHack like a pro with burp suite - nullhyd
Hack like a pro with burp suite - nullhyd
 
AWS Survival Guide
AWS Survival GuideAWS Survival Guide
AWS Survival Guide
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Burp Suite Starter
Burp Suite StarterBurp Suite Starter
Burp Suite Starter
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps ToolchainsDevOOPS: Attacks and Defenses for DevOps Toolchains
DevOOPS: Attacks and Defenses for DevOps Toolchains
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Time based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webserviceTime based CAPTCHA protected SQL injection through SOAP-webservice
Time based CAPTCHA protected SQL injection through SOAP-webservice
 
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
The Secret Life of a Bug Bounty Hunter – Frans Rosén @ Security Fest 2016
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Hybrid Cloud Computing - Seccurity Aspects and Challanges

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Tannya seth
 
Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011
L S Subramanian
 
Cloud computing v3 mar 2016
Cloud computing v3 mar 2016Cloud computing v3 mar 2016
Cloud computing v3 mar 2016
Roshan Goolaup
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
MuhammadArslan799356
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
SourodeepChakraborty3
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
Advanced Technology Consulting (ATC)
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
Md Nazrul Islam Roxy
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
SHAIMA A R
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
How to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationHow to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital Transformation
Enterprise Management Associates
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
ananyaakk
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computingDeepak Shukla
 
The Future of Cloud is Here. Can You See It?
The Future of Cloud is Here. Can You See It?The Future of Cloud is Here. Can You See It?
The Future of Cloud is Here. Can You See It?
scoopnewsgroup
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Naveed Farooq
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
Asmaa Ibrahim
 

Similar to Hybrid Cloud Computing - Seccurity Aspects and Challanges (20)

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011Lss cloud computing a boon for smb-interop-2011
Lss cloud computing a boon for smb-interop-2011
 
Cloud computing v3 mar 2016
Cloud computing v3 mar 2016Cloud computing v3 mar 2016
Cloud computing v3 mar 2016
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
Cloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptxCloud Computing (Lecture 1 & 2).pptx
Cloud Computing (Lecture 1 & 2).pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
Hybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and SecurityHybrid Work Models, Anywhere Operations and Security
Hybrid Work Models, Anywhere Operations and Security
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Bienvenida
BienvenidaBienvenida
Bienvenida
 
How to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital TransformationHow to Transform Corporate IT into the Driver for Digital Transformation
How to Transform Corporate IT into the Driver for Digital Transformation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Group 39 presentation cloud computing
Group 39 presentation cloud computingGroup 39 presentation cloud computing
Group 39 presentation cloud computing
 
The Future of Cloud is Here. Can You See It?
The Future of Cloud is Here. Can You See It?The Future of Cloud is Here. Can You See It?
The Future of Cloud is Here. Can You See It?
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Hybrid Cloud Computing - Seccurity Aspects and Challanges

  • 1. hybrid CLOUD computing Security Aspects and Challenges Ing. Roman Nedzelský, MVP University of economics in Prague redtoo s.r.o.
  • 2. Agenda • Why cloud is attractive • Why cloud is a problem for enterprises and public sector • Service models • Deployment models • Security challenges • Hybrid cloud scenario
  • 3. Why cloud is attractive? Storage cost and infrastructure sprawl Rapid data growth - 40% YoY* Simplify data protection and disaster recovery Everything providing as a service with SLA Big DATA Machine Learning Business Intelligence
  • 4. Why cloud is problem for enterprises and public sector 25% of governments around the world are interested, few of them are already in… PROS • ½ < realize cloud as cost saving way • Using of new services & features • Free licenses and service hours CONS • security, confident data, legislation • migration of huge amount of data is for long time • In which country is datacenter / are datacenters
  • 5. Service models SaaS IaaS PaaS DaaS SECaaS Deployment models Public cloud Private cloud Community cloud Hybrid cloud
  • 6. Deployment models – Hybrid cloud On-site cloud Outsourced cloud Public cloud on-site private cloud on-site community cloud outsourced private cloud outsourced community cloud In this case, every single type is connected with rest of them (or should be)
  • 7. Security Challenges and Issues DaaSMulti-tenancy (Providers side) DaaSSecurity and Security Perimeters (Providers side) DaaSDomain Controllers in cloud DaaSIntegration DaaSHuman Factor SECaaS (Security as a Service) Where are the data? What about the ISOs? What about the ROI?
  • 8. Hybrid scenario {SaaS} PRIVATE IN-HOUSE CLOUD Confidential Data SaaS Public cloud for least Confidential Data Private In-house Infrastructure SaaS Public cloud for least Confidential Data - Separated accounts - Federated authentication - Multifactor authentication
  • 9. Hybrid scenario {IaaS} PRIVATE IN-HOUSE CLOUD Confidential Data OUTSOURCES PRIVATE CLOUD IaaS Public cloud Private In-house Infrastructure Providers Infrastructure second option ? ?
  • 10. Hybrid scenario {SaaS + IaaS} PRIVATE IN-HOUSE CLOUD Confidential Data OUTSOURCES PRIVATE CLOUD Less Confidential Data Private In-house Infrastructure Providers Infrastructure SaaS Public cloud for least Confidential Data

Editor's Notes

  1. Today we are going to talk about StorSimple and hybrid cloud storage – and in particular – about the newest developments with this technology called Microsoft Azure StorSimple, which takes the integration of cloud services and on-premises storage to new levels.
  2. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.
  3. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.
  4. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.
  5. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.
  6. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.
  7. Here’s our agenda. We’ll review the pain points nearly all enterprise customers face with storage – and then we’ll review what our solutions are all about and how customer benefit from them. Then we are going to turn our attention to the latest technology from StorSimple, the 8000 series hybrid storage arrays and what makes them so unique. Well discuss the workloads that customers are finding most useful and which ones we think will be key enablers for them using the 8000 series. Then we’ll take a little deeper dive into the feature set and benefits of the new technology and show you a demo of some of the new cloud management capabilities. Then we’ll talk about customers, what they have to say before we wrap things up.