SlideShare a Scribd company logo
The cloud crossover
10 REASONS YOU’RE READY FOR A MANAGED CLOUD
KAREN SCARFONE | PRINCIPAL CONSULTANT | SCARFONE CYBERSECURITY
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 2
About Karen Scarfone
Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Va. She was
formerly a senior computer scientist for the National Institute of Standards and Technology
(NIST), where she oversaw the development of system and network security publications
for federal civilian agencies and the public. She has co-authored more than 50 NIST Special
Publications and Inter-agency Reports during the past 10 years, including NIST Special
Publications 800-111, Guide to Storage Encryption Technologies for End User Devices, and
800-123, Guide to General Server Security.
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 3
Executive summary
There are many managed cloud services available, but only
a small subset of those emphasize security and are, therefore,
known as secure managed cloud services. Even among these
services, there is a great deal of differentiation from one
service to another.
The best secure managed cloud services, besides promoting
optimal security, are also active (i.e., proactively identifying
emerging problems and responding to them rapidly) and
customized (i.e., taking each customer or workload’s
security needs, operational characteristics and other specific
requirements into account).
• Alleviate the need to have staff provide 24-hour
monitoring and maintenance for cloud workloads
• Reduce the cost of ownership through lower
infrastructure and labor expenses
• Speed the time to market for new IT deployments
(from months to hours)
• Provide unique capabilities that each
customer does not have the resources
to provide themselves directly
• Reduce risk by optimizing security controls
and offering superior response times when
problems occur
• Respond to emerging threats and attacks,
preventing both impact and success
• Enable more efficient paths to government
or industry compliance, such as HIPAA, SOX
and PCI DSS
The best secure managed cloud
services provide several benefits to
their customers, including the ability to:
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 4
What is a managed cloud?
First, let’s define the differences between the various clouds.
Although managed cloud services are often assumed to be for
public clouds only, they can be leveraged for any type of cloud,
including private and hybrid.
The idea behind managed cloud services is for an organization
to transfer some or most of its cloud-related responsibilities
to a third party. The basic characteristics of typical managed
cloud services can be grouped into three categories: security,
infrastructure and experience.
A managed cloud service involves a third-party service provider managing the delivery
of network-based services, applications and equipment on behalf of cloud customers.
Secure managed cloud Managed cloud
Customer responsibility
Public cloud
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 5
Security
Security management is often rather minimal for a basic
managed cloud service provider. The provider takes care of all
security considerations related to the physical infrastructure
itself, such as data center security and periodically scanning
the infrastructure’s software components for vulnerabilities
and ensuring that those vulnerabilities are effectively mitigated.
The provider is also responsible for enforcing basic physical
security principles (e.g., restricting local access to the cloud
servers and the facilities that house them).
Most or all other security-related duties, including compliance
efforts, are the responsibility of the cloud customer with
a typical public cloud or managed cloud service.
Infrastructure
Infrastructure refers to the architecting and management
of the cloud infrastructure itself. These are largely the types
of services that you would expect any managed cloud
provider to offer.
At the most fundamental level, virtually all infrastructure
services include providing power, climate control, Internet
connectivity, and managing the deployment and migration
of cloud workloads among servers.
A cloud management offering includes performance
oversight, such as monitoring the resource utilization of
all cloud workloads and planning for long-term expansion
Finally, infrastructure management can also involve
a degree of assembly related to various tools and services
that enhance the performance and security of the solution.
It also helps keep cloud infrastructure software up-to-date,
which has not only operational implications but also serious
security ramifications. of the cloud infrastructure to handle
increasing needs.
Experience
In terms of managed cloud services, experience can be
divided into two types. One refers to the experience that
a cloud provider’s staff has with the cloud infrastructure
itself — basically, their knowledge and familiarity with the
cloud infrastructure’s operations and security.
The other type of experience refers to the specialized
knowledge that the cloud customer has with their own data,
applications, controls and services that they have migrated
to the cloud.
In a managed cloud service arrangement, the cloud
customer often has to work closely with the cloud provider
when a problem arises.
In most scenarios, the cloud provider lacks experience
and direct knowledge of the customer’s cloud deployment,
configuration, security needs and compliance requirements.
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 6
Three pillars of the secure
managed cloud infrastructure
• Standard around-the-clock
support
• Protection by highly-trained
cybersecurity professionals
• Self-service tools
• Secure portal dashboard
Experience
• World-class security
operations center (SOC)
• Real-time threat
identification & mitigation
• Proactive vulnerability
scanning
• Dedicated compliance
expertise
• Advanced penetration testing
Security
• Seamless integration
• Continuous patching
& updating
• Demonstrated performance
management
• Diligent onboarding
& implementation
• Proven security architecture
Infrastructure
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 7
“Progressive secure
cloud vendors — those
with dedicated and
experienced security
engineering and
operations teams —
have a wide variety of
additional services that
other providers do not.”
Many clouds, many differences
Managed cloud services should not be thought of as
a simple commodity to be purchased from any provider;
indeed, there are major differentiators that separate one
such service from another.
These relate primarily to the division of responsibilities
between the managed cloud service provider and the
customer, as well as the managed cloud service
provider’s general philosophy.
These differences are mapped to the following collection
of differentiators and benefits.
You need built-in security
The biggest differentiator between providers is security. Some
providers put such emphasis on security that they are actually
known as secure managed cloud service providers.
These providers take on much of the security responsibility
that would otherwise be shouldered by customers. But not
all secure clouds offer the same levels or types of security.
First, consider how and where a cloud vendors security
controls are integrated. Some providers focus on perimeter
security, such as IP reputation filtering, Web application
firewalls (WAF) and antivirus solutions.
Other secure managed cloud provides go a step further with
advanced infrastructure protection. How these are architected
and integrated vary from vendor to vendor, but it’s important
to consider the following technology: intrusion detection, log
management, vulnerability monitoring, malware protection,
patch management and file integrity monitoring.
1
Likewise, progressive secure cloud vendors — those with
dedicated and experienced security engineering and operations
teams — have a wide variety of additional services that other
providers do not.
Such an offering may include compliance expertise or
consultation to help features to help customers achieve,
document and maintain compliance with various laws and
regulations, including HIPAA and PCI.
Another example of the increased focus on security is
the secure cloud provider’s responsibilities for identifying
vulnerabilities within customer cloud implementations, at the
individual virtual machine (VM) level, and mitigating threats
against those vulnerabilities.
When conducting a comparative evaluation of true secure
managed cloud vendors, execute an in-depth analysis to any
security claims. How, where and what type of security technology
used is critical; the manner in which a cloud vendor manages
and oversees the technology matters even more.
Vendors that are able to provide — and demonstrate — all
the aforementioned security capabilities should go to the top
of the list.
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 8
You value customized service
Also consider the customization options for different
managed cloud services. Some service providers are not
equipped to understand each customer’s unique deployment
and business realities.
If a customer of one of these providers needs technical support
in the case of operational problems, security incidents or other
issues, the customer would contact the provider and be assigned
a random technical support agent to provide assistance.
This agent would likely have little to no information about
the specifics of the customer’s cloud implementation and
usage, security environment or other aspects particular
to that customer.
Contrast that with a provider that emphasizes customized
services. Such providers offer a dedicated person or team
that knows the customer’s policies and needs, infrastructure
usage, environment configuration and business objectives.
This level of service typically includes “run books,” with
extremely detailed logs of all changes, and provides the ability
to respond much more rapidly and effectively to emerging
problems than other providers.
You want a proactive partner
A final differentiator is how proactive the provider
is in terms of managing the cloud service.
A provider that is more proactive will identify emerging
problems with performance, security and other aspects
of the cloud more rapidly and act decisively to correct those
problems before they become disruptive.
For example, a reactive provider might scan the cloud
infrastructure software occasionally (e.g., monthly) for
vulnerabilities, whereas a proactive provider might implement
a continuous monitoring program that frequently scans
for vulnerabilities.
A proactive provider will mitigate most threats and vulnerabilities
before its customers are ever affected. In contrast, a reactive
provider will take action only after a problem has occurred and
notify the customer accordingly — after the damage is done.
2 3
• Need to augment size and/or capabilities
of current IT team
• Want the ability to focus on core business activities
• Desire a partner to help you mitigate risk
• Prefer not to architect a solution in-house
Are you a candidate for a managed
secure cloud?
“How, where and
what type of security
technology used is
critical; the manner in
which a cloud vendor
manages and oversees
the technology matters
even more.”
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 9
The choice is yours
Choosing a secure managed cloud service over a typical cloud
service can provide significant benefits to a customer. Some
secure managed cloud service providers are also active in their
cloud service management and offer customized services for
their customers. This combination — secure, proactive and
customized — is highly desirable for many reasons.
You demand around-the-clock protection
It’s obvious to state that using a secure managed cloud
service should provide a reasonably secure solution.
What makes security so challenging is the need to constantly
monitor and maintain those security controls to take into
account new vulnerabilities, threats, attack vectors and other
aspects of the constantly changing security environment.
It’s also critically important to take into account the individual
needs of each customer, and often even different needs for
different workloads from a single customer.
All of these challenges can be met by taking an active and
customized approach to security, ensuring that continuous
monitoring and prompt maintenance is occurring.
Elite cloud vendors can customize security controls, as needed
for particular workloads, and ensure their staffs have all the
necessary information about the characteristics of each
customer workload.
This allows quick responses to emerging threats and attacks,
helping to prevent many attacks from succeeding and strictly
limiting the impact of those attacks that might succeed.
4
• DoS/DDoS mitigation
• IP reputation filtering
• Web application firewalls
Perimeter security
• Intrusion detection
• Log management
• Patch management
• Vulnerability monitoring
• Malware protection
• Integrity monitoring
• Antivirus solution
Infrastructure security
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 10
You want to smartly allocate resources
Using a secure managed cloud service gives an organization
much greater flexibility in terms of allocating staff time.
For example, instead of having to dedicate staff for
around-the-clock monitoring and maintaining the security
and operations of the cloud workloads, the organization
can outsource these responsibilities to a secure managed
cloud service provider.
This is often much more cost-effective for the organization,
as well as a popular decision for the organization’s employees.
Employees may then be assigned to other, potentially more
valuable, tasks or business objectives.
Resource allocation is a particularly important consideration for
smaller organizations and, more generally, any organization that
may lack the necessary cloud security and operational expertise.
Instead of attempting to train all the staff necessary to achieve
around-the-clock cloud management, an organization may
outsource infrastructure efforts to more qualified and
experienced professionals.
5
Your dedicated staff
Allocation
of resources
Expert managed
cloud vendor
Monitoring & maintaining
security, operations
& cloud workloads
24 | 7
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 11
You want to reduce total cost of operation
In general, migrating from traditional data center infrastructure
to cloud architectures can produce cost savings. This is
a result of the flexible and scalable nature of cloud architectures;
cloud customers pay for the resources that they use or have
reserved in case they are needed. Migrating to the cloud can
be quite favorable in financial terms, such as the organization
incurring operating costs instead of capital costs.
Cloud migration is ideal for organizations that have rapidly
changing needs or only need cloud resources for a short
period of time, removing the need to build in-house computing
infrastructure sized to handle maximum expected usage.
Cost of ownership is also improved because of the reduced
overhead in having a cloud provider maintain the security of
all its cloud servers instead of having each customer maintain
security for its own servers.
Ultimately, the total cost for using a secure managed cloud
service provider can be less than comparable solutions that
provide equivalent security and compliance levels.
6 “Migrating to the cloud
can be quite favorable in
financial terms, such as
the organization incurring
operating costs instead of
capital costs.”
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 12
You want to go to market faster
For many IT deployments, speed is increasingly critical. It can
take several weeks or months to execute an IT deployment in
traditional environments.
In this scenario, the time required to research, architect,
procure, assemble, integrate, test, train, deploy, optimize and
run the solutions, not to mention securing all included data,
applications and environments, is considerably long.
Secure managed cloud services, however, typically offer
superior onboarding services allowing any organization
to acquire and start using secure cloud services in a matter
of hours.
You need unique capabilities
A secure managed cloud service provider may provide unique
capabilities that an organization simply cannot provide for itself.
These capabilities may include intellectual property, tools,
skills and collective intelligence. It may be difficult or even
impossible for an individual organization to replicate these
capabilities at a reasonable level of effort or cost.
For example, a secure managed cloud service provider may
be able to afford subscriptions to threat intelligence services
that its customers individually could not otherwise justify.
Secure managed cloud service providers also offer dedicated
security operations and information security engineering
teams with deep expertise.
Through collaborative learning, secure managed cloud service
provider also can uniquely see a threat against one of its
customers and leverage this information to protect its other
customers from the same threat.
You want to reduce risk
The best secure managed cloud service providers are experts
in risk reduction. They understand which security controls
are needed to maintain compliance with requirements and
to effectively reduce business, technical and/or operational
risk to acceptable levels for their customers.
More importantly, they implement, monitor and maintain
these controls on behalf of their customers, helping them
achieve compliance as a natural outcome of having such
a secure infrastructure.
Along with this, the best secure managed cloud service
providers can offer superior response times when problems
occur. While many providers only guarantee how quickly
a response to a problem will begin, the best providers talk
in terms of how quickly a problem will be resolved.
7
8
“The best secure managed
cloud service providers are
experts in risk reduction.”
9
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 13
You have compliance requirements
Complementary of the risk-reduction demands, most
organizations are also subject to one or more compliance
initiatives regarding the security of their sensitive data. Examples
of these initiatives include HIPAA, PCI DSS and SOX.
Secure managed cloud service providers are quite experienced
with achieving compliance through their offerings, so this can
greatly reduce the amount of effort that customers expend
to achieve compliance.
Organizations should be cautioned, however, to carefully
evaluate how prospective service providers actually comply
with requirements. Many providers claim they meet compliance
requirements, but these requirements can be achieved on
different levels. And many providers are actually compliant only
at the physical level, not at logical levels above that.
In such a case, each customer must still put forth extensive
effort to achieve compliance at logical levels above the compliant
physical level. Elite secure managed cloud service providers
offer rigorous compliance at all levels to minimize their
customers’ burdens.
Another benefit of using services from a secure managed cloud
service provider is that these providers have relationships with
compliance auditors. An example is Qualified Security Assessors
(QSAs) for PCI DSS compliance.
These auditors have already reviewed the provider’s PCI DSS
compliance efforts and certified that the provider meets the PCI
DSS requirements. This means that a customer of the provider
only needs to display compliance with those requirements that
may only be met by the customer directly. This speeds the audit
process and reduces costs for the customer.
10 “Secure managed cloud
service providers can greatly
reduce the amount of effort
that customers expend
to achieve compliance.”
CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD
@ARMOR | ARMOR.COM | PAGE 14
More power, more value
Secure managed cloud service providers offer a high-quality
solution at an excellent value to any organization that is
considering a migration to the cloud or is concerned about
the security of their existing cloud deployments.
The best secure managed cloud service providers endeavor
to deliver a highly secure environment for their customers
through a variety of security capabilities via a cloud
management style that is both proactive and customized.
Reasons for adopting such a secure managed cloud service
include resource allocation, cost of ownership, speed to market,
unique capabilities, risk reduction and optimal security.
When compared to public clouds and typical managed
clouds, secure managed clouds offer major benefits in
terms of customer responsibility and monthly cost.
Generally speaking, public clouds involve the most customer
responsibility, followed by managed clouds; secure managed
clouds involve the least customer responsibility, taking
a burden off organization management and staff.
Likewise, public clouds often involve the highest total cost
as compared to managed clouds and secure managed clouds,
which are the most cost-effective.
This may be surprising. However, it can be quite expensive
for an organization to design and deploy a secure in-house
solution with the equivalent security controls, compliance
tools and staffing offered by a secure managed cloud.
“The best secure managed
cloud service providers
endeavor to deliver a
highly secure environment
for their customers … ”
Discover which Armor
solution best matches your
data workloads with our
30-second online tool.
START NOW
US 2360 Campbell Creek Boulevard, Suite 525, Richardson, Texas 75082 | Phone: +1 877 262 3473
UK 268 Bath Road, Slough, Berkshire SL1 4AX | Phone: +44 800 500 3167
© ARMOR 2016. All rights reserved.

More Related Content

What's hot

Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
VivianMarcello3
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
Shah Sheikh
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
IBM Security
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
Dave Reeves
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Andris Soroka
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
IBM Security
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Positive Hack Days
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
IBM Security
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
Allessandra Negri
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
SlideTeam
 

What's hot (20)

Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
DTS Solution - Company Presentation
DTS Solution - Company PresentationDTS Solution - Company Presentation
DTS Solution - Company Presentation
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat7 Ways to Stay 7 Years Ahead of the Threat
7 Ways to Stay 7 Years Ahead of the Threat
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 

Similar to The Cloud Crossover

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
HTS Hosting
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
GopalThapa9
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Alert Logic
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
BabatundeAbioye2
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
Cisco Service Provider
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
infosec train
 

Similar to The Cloud Crossover (20)

Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Cloud Computing_presentation.pptx
Cloud Computing_presentation.pptxCloud Computing_presentation.pptx
Cloud Computing_presentation.pptx
 
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 

More from Armor

Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
Armor
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0
Armor
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
Armor
 
Ransomware
Ransomware Ransomware
Ransomware
Armor
 
Keys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudKeys To Better Data Security In the Cloud
Keys To Better Data Security In the Cloud
Armor
 
With FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & SecurityWith FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & Security
Armor
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository Deconstructed
Armor
 
FireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the CloudFireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the Cloud
Armor
 
Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and Compliance
Armor
 
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers ApplicationsFirehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Armor
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data Envirnment
Armor
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Armor
 
Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0
Armor
 
Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant
Armor
 
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational ImpactFirehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Armor
 
Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1
Armor
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
Armor
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent Security
Armor
 
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster PreventionFireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
Armor
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best PracticesArmor
 

More from Armor (20)

Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?Cybersecurity - Whose responsibility is it?
Cybersecurity - Whose responsibility is it?
 
Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0Getting Ready for PCI DSS 3.0
Getting Ready for PCI DSS 3.0
 
Security Operations in the Cloud
Security Operations in the CloudSecurity Operations in the Cloud
Security Operations in the Cloud
 
Ransomware
Ransomware Ransomware
Ransomware
 
Keys To Better Data Security In the Cloud
Keys To Better Data Security In the CloudKeys To Better Data Security In the Cloud
Keys To Better Data Security In the Cloud
 
With FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & SecurityWith FireHost You Can Have it All: Performance & Security
With FireHost You Can Have it All: Performance & Security
 
FireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository DeconstructedFireHost Webinar: HealthData Repository Deconstructed
FireHost Webinar: HealthData Repository Deconstructed
 
FireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the CloudFireHost Webinar: The Service You Should Expect in the Cloud
FireHost Webinar: The Service You Should Expect in the Cloud
 
Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and Compliance
 
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers ApplicationsFirehost Webinar: How a Secure High Performance Cloud Powers Applications
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
 
Firehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data EnvirnmentFirehost Webinar: Validating your Cardholder Data Envirnment
Firehost Webinar: Validating your Cardholder Data Envirnment
 
Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is? Firehost Webinar: Do you know where your Cardholder Data Environment is?
Firehost Webinar: Do you know where your Cardholder Data Environment is?
 
Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0Firehost Webinar: Getting Ready for PCI 3.0
Firehost Webinar: Getting Ready for PCI 3.0
 
Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant Firehost Webinar: Getting Hipaa Compliant
Firehost Webinar: Getting Hipaa Compliant
 
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational ImpactFirehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
Firehost Webinar: Hipaa Compliance 101 Part 2- Your Organizational Impact
 
Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1Firehost Webinar: Hipaa Compliance 101 Part 1
Firehost Webinar: Hipaa Compliance 101 Part 1
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
 
FireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent SecurityFireHost Webinar: Protect Your Application With Intelligent Security
FireHost Webinar: Protect Your Application With Intelligent Security
 
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster PreventionFireHost Webinar: 6 Must Have Tools For Disaster Prevention
FireHost Webinar: 6 Must Have Tools For Disaster Prevention
 
Cloud Computing Best Practices
Cloud Computing Best PracticesCloud Computing Best Practices
Cloud Computing Best Practices
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

The Cloud Crossover

  • 1. The cloud crossover 10 REASONS YOU’RE READY FOR A MANAGED CLOUD KAREN SCARFONE | PRINCIPAL CONSULTANT | SCARFONE CYBERSECURITY
  • 2. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 2 About Karen Scarfone Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Va. She was formerly a senior computer scientist for the National Institute of Standards and Technology (NIST), where she oversaw the development of system and network security publications for federal civilian agencies and the public. She has co-authored more than 50 NIST Special Publications and Inter-agency Reports during the past 10 years, including NIST Special Publications 800-111, Guide to Storage Encryption Technologies for End User Devices, and 800-123, Guide to General Server Security.
  • 3. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 3 Executive summary There are many managed cloud services available, but only a small subset of those emphasize security and are, therefore, known as secure managed cloud services. Even among these services, there is a great deal of differentiation from one service to another. The best secure managed cloud services, besides promoting optimal security, are also active (i.e., proactively identifying emerging problems and responding to them rapidly) and customized (i.e., taking each customer or workload’s security needs, operational characteristics and other specific requirements into account). • Alleviate the need to have staff provide 24-hour monitoring and maintenance for cloud workloads • Reduce the cost of ownership through lower infrastructure and labor expenses • Speed the time to market for new IT deployments (from months to hours) • Provide unique capabilities that each customer does not have the resources to provide themselves directly • Reduce risk by optimizing security controls and offering superior response times when problems occur • Respond to emerging threats and attacks, preventing both impact and success • Enable more efficient paths to government or industry compliance, such as HIPAA, SOX and PCI DSS The best secure managed cloud services provide several benefits to their customers, including the ability to:
  • 4. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 4 What is a managed cloud? First, let’s define the differences between the various clouds. Although managed cloud services are often assumed to be for public clouds only, they can be leveraged for any type of cloud, including private and hybrid. The idea behind managed cloud services is for an organization to transfer some or most of its cloud-related responsibilities to a third party. The basic characteristics of typical managed cloud services can be grouped into three categories: security, infrastructure and experience. A managed cloud service involves a third-party service provider managing the delivery of network-based services, applications and equipment on behalf of cloud customers. Secure managed cloud Managed cloud Customer responsibility Public cloud
  • 5. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 5 Security Security management is often rather minimal for a basic managed cloud service provider. The provider takes care of all security considerations related to the physical infrastructure itself, such as data center security and periodically scanning the infrastructure’s software components for vulnerabilities and ensuring that those vulnerabilities are effectively mitigated. The provider is also responsible for enforcing basic physical security principles (e.g., restricting local access to the cloud servers and the facilities that house them). Most or all other security-related duties, including compliance efforts, are the responsibility of the cloud customer with a typical public cloud or managed cloud service. Infrastructure Infrastructure refers to the architecting and management of the cloud infrastructure itself. These are largely the types of services that you would expect any managed cloud provider to offer. At the most fundamental level, virtually all infrastructure services include providing power, climate control, Internet connectivity, and managing the deployment and migration of cloud workloads among servers. A cloud management offering includes performance oversight, such as monitoring the resource utilization of all cloud workloads and planning for long-term expansion Finally, infrastructure management can also involve a degree of assembly related to various tools and services that enhance the performance and security of the solution. It also helps keep cloud infrastructure software up-to-date, which has not only operational implications but also serious security ramifications. of the cloud infrastructure to handle increasing needs. Experience In terms of managed cloud services, experience can be divided into two types. One refers to the experience that a cloud provider’s staff has with the cloud infrastructure itself — basically, their knowledge and familiarity with the cloud infrastructure’s operations and security. The other type of experience refers to the specialized knowledge that the cloud customer has with their own data, applications, controls and services that they have migrated to the cloud. In a managed cloud service arrangement, the cloud customer often has to work closely with the cloud provider when a problem arises. In most scenarios, the cloud provider lacks experience and direct knowledge of the customer’s cloud deployment, configuration, security needs and compliance requirements.
  • 6. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 6 Three pillars of the secure managed cloud infrastructure • Standard around-the-clock support • Protection by highly-trained cybersecurity professionals • Self-service tools • Secure portal dashboard Experience • World-class security operations center (SOC) • Real-time threat identification & mitigation • Proactive vulnerability scanning • Dedicated compliance expertise • Advanced penetration testing Security • Seamless integration • Continuous patching & updating • Demonstrated performance management • Diligent onboarding & implementation • Proven security architecture Infrastructure
  • 7. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 7 “Progressive secure cloud vendors — those with dedicated and experienced security engineering and operations teams — have a wide variety of additional services that other providers do not.” Many clouds, many differences Managed cloud services should not be thought of as a simple commodity to be purchased from any provider; indeed, there are major differentiators that separate one such service from another. These relate primarily to the division of responsibilities between the managed cloud service provider and the customer, as well as the managed cloud service provider’s general philosophy. These differences are mapped to the following collection of differentiators and benefits. You need built-in security The biggest differentiator between providers is security. Some providers put such emphasis on security that they are actually known as secure managed cloud service providers. These providers take on much of the security responsibility that would otherwise be shouldered by customers. But not all secure clouds offer the same levels or types of security. First, consider how and where a cloud vendors security controls are integrated. Some providers focus on perimeter security, such as IP reputation filtering, Web application firewalls (WAF) and antivirus solutions. Other secure managed cloud provides go a step further with advanced infrastructure protection. How these are architected and integrated vary from vendor to vendor, but it’s important to consider the following technology: intrusion detection, log management, vulnerability monitoring, malware protection, patch management and file integrity monitoring. 1 Likewise, progressive secure cloud vendors — those with dedicated and experienced security engineering and operations teams — have a wide variety of additional services that other providers do not. Such an offering may include compliance expertise or consultation to help features to help customers achieve, document and maintain compliance with various laws and regulations, including HIPAA and PCI. Another example of the increased focus on security is the secure cloud provider’s responsibilities for identifying vulnerabilities within customer cloud implementations, at the individual virtual machine (VM) level, and mitigating threats against those vulnerabilities. When conducting a comparative evaluation of true secure managed cloud vendors, execute an in-depth analysis to any security claims. How, where and what type of security technology used is critical; the manner in which a cloud vendor manages and oversees the technology matters even more. Vendors that are able to provide — and demonstrate — all the aforementioned security capabilities should go to the top of the list.
  • 8. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 8 You value customized service Also consider the customization options for different managed cloud services. Some service providers are not equipped to understand each customer’s unique deployment and business realities. If a customer of one of these providers needs technical support in the case of operational problems, security incidents or other issues, the customer would contact the provider and be assigned a random technical support agent to provide assistance. This agent would likely have little to no information about the specifics of the customer’s cloud implementation and usage, security environment or other aspects particular to that customer. Contrast that with a provider that emphasizes customized services. Such providers offer a dedicated person or team that knows the customer’s policies and needs, infrastructure usage, environment configuration and business objectives. This level of service typically includes “run books,” with extremely detailed logs of all changes, and provides the ability to respond much more rapidly and effectively to emerging problems than other providers. You want a proactive partner A final differentiator is how proactive the provider is in terms of managing the cloud service. A provider that is more proactive will identify emerging problems with performance, security and other aspects of the cloud more rapidly and act decisively to correct those problems before they become disruptive. For example, a reactive provider might scan the cloud infrastructure software occasionally (e.g., monthly) for vulnerabilities, whereas a proactive provider might implement a continuous monitoring program that frequently scans for vulnerabilities. A proactive provider will mitigate most threats and vulnerabilities before its customers are ever affected. In contrast, a reactive provider will take action only after a problem has occurred and notify the customer accordingly — after the damage is done. 2 3 • Need to augment size and/or capabilities of current IT team • Want the ability to focus on core business activities • Desire a partner to help you mitigate risk • Prefer not to architect a solution in-house Are you a candidate for a managed secure cloud? “How, where and what type of security technology used is critical; the manner in which a cloud vendor manages and oversees the technology matters even more.”
  • 9. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 9 The choice is yours Choosing a secure managed cloud service over a typical cloud service can provide significant benefits to a customer. Some secure managed cloud service providers are also active in their cloud service management and offer customized services for their customers. This combination — secure, proactive and customized — is highly desirable for many reasons. You demand around-the-clock protection It’s obvious to state that using a secure managed cloud service should provide a reasonably secure solution. What makes security so challenging is the need to constantly monitor and maintain those security controls to take into account new vulnerabilities, threats, attack vectors and other aspects of the constantly changing security environment. It’s also critically important to take into account the individual needs of each customer, and often even different needs for different workloads from a single customer. All of these challenges can be met by taking an active and customized approach to security, ensuring that continuous monitoring and prompt maintenance is occurring. Elite cloud vendors can customize security controls, as needed for particular workloads, and ensure their staffs have all the necessary information about the characteristics of each customer workload. This allows quick responses to emerging threats and attacks, helping to prevent many attacks from succeeding and strictly limiting the impact of those attacks that might succeed. 4 • DoS/DDoS mitigation • IP reputation filtering • Web application firewalls Perimeter security • Intrusion detection • Log management • Patch management • Vulnerability monitoring • Malware protection • Integrity monitoring • Antivirus solution Infrastructure security
  • 10. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 10 You want to smartly allocate resources Using a secure managed cloud service gives an organization much greater flexibility in terms of allocating staff time. For example, instead of having to dedicate staff for around-the-clock monitoring and maintaining the security and operations of the cloud workloads, the organization can outsource these responsibilities to a secure managed cloud service provider. This is often much more cost-effective for the organization, as well as a popular decision for the organization’s employees. Employees may then be assigned to other, potentially more valuable, tasks or business objectives. Resource allocation is a particularly important consideration for smaller organizations and, more generally, any organization that may lack the necessary cloud security and operational expertise. Instead of attempting to train all the staff necessary to achieve around-the-clock cloud management, an organization may outsource infrastructure efforts to more qualified and experienced professionals. 5 Your dedicated staff Allocation of resources Expert managed cloud vendor Monitoring & maintaining security, operations & cloud workloads 24 | 7
  • 11. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 11 You want to reduce total cost of operation In general, migrating from traditional data center infrastructure to cloud architectures can produce cost savings. This is a result of the flexible and scalable nature of cloud architectures; cloud customers pay for the resources that they use or have reserved in case they are needed. Migrating to the cloud can be quite favorable in financial terms, such as the organization incurring operating costs instead of capital costs. Cloud migration is ideal for organizations that have rapidly changing needs or only need cloud resources for a short period of time, removing the need to build in-house computing infrastructure sized to handle maximum expected usage. Cost of ownership is also improved because of the reduced overhead in having a cloud provider maintain the security of all its cloud servers instead of having each customer maintain security for its own servers. Ultimately, the total cost for using a secure managed cloud service provider can be less than comparable solutions that provide equivalent security and compliance levels. 6 “Migrating to the cloud can be quite favorable in financial terms, such as the organization incurring operating costs instead of capital costs.”
  • 12. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 12 You want to go to market faster For many IT deployments, speed is increasingly critical. It can take several weeks or months to execute an IT deployment in traditional environments. In this scenario, the time required to research, architect, procure, assemble, integrate, test, train, deploy, optimize and run the solutions, not to mention securing all included data, applications and environments, is considerably long. Secure managed cloud services, however, typically offer superior onboarding services allowing any organization to acquire and start using secure cloud services in a matter of hours. You need unique capabilities A secure managed cloud service provider may provide unique capabilities that an organization simply cannot provide for itself. These capabilities may include intellectual property, tools, skills and collective intelligence. It may be difficult or even impossible for an individual organization to replicate these capabilities at a reasonable level of effort or cost. For example, a secure managed cloud service provider may be able to afford subscriptions to threat intelligence services that its customers individually could not otherwise justify. Secure managed cloud service providers also offer dedicated security operations and information security engineering teams with deep expertise. Through collaborative learning, secure managed cloud service provider also can uniquely see a threat against one of its customers and leverage this information to protect its other customers from the same threat. You want to reduce risk The best secure managed cloud service providers are experts in risk reduction. They understand which security controls are needed to maintain compliance with requirements and to effectively reduce business, technical and/or operational risk to acceptable levels for their customers. More importantly, they implement, monitor and maintain these controls on behalf of their customers, helping them achieve compliance as a natural outcome of having such a secure infrastructure. Along with this, the best secure managed cloud service providers can offer superior response times when problems occur. While many providers only guarantee how quickly a response to a problem will begin, the best providers talk in terms of how quickly a problem will be resolved. 7 8 “The best secure managed cloud service providers are experts in risk reduction.” 9
  • 13. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 13 You have compliance requirements Complementary of the risk-reduction demands, most organizations are also subject to one or more compliance initiatives regarding the security of their sensitive data. Examples of these initiatives include HIPAA, PCI DSS and SOX. Secure managed cloud service providers are quite experienced with achieving compliance through their offerings, so this can greatly reduce the amount of effort that customers expend to achieve compliance. Organizations should be cautioned, however, to carefully evaluate how prospective service providers actually comply with requirements. Many providers claim they meet compliance requirements, but these requirements can be achieved on different levels. And many providers are actually compliant only at the physical level, not at logical levels above that. In such a case, each customer must still put forth extensive effort to achieve compliance at logical levels above the compliant physical level. Elite secure managed cloud service providers offer rigorous compliance at all levels to minimize their customers’ burdens. Another benefit of using services from a secure managed cloud service provider is that these providers have relationships with compliance auditors. An example is Qualified Security Assessors (QSAs) for PCI DSS compliance. These auditors have already reviewed the provider’s PCI DSS compliance efforts and certified that the provider meets the PCI DSS requirements. This means that a customer of the provider only needs to display compliance with those requirements that may only be met by the customer directly. This speeds the audit process and reduces costs for the customer. 10 “Secure managed cloud service providers can greatly reduce the amount of effort that customers expend to achieve compliance.”
  • 14. CLOUD CROSSOVER: 10 REASONS YOU’RE READY FOR A MANAGED CLOUD @ARMOR | ARMOR.COM | PAGE 14 More power, more value Secure managed cloud service providers offer a high-quality solution at an excellent value to any organization that is considering a migration to the cloud or is concerned about the security of their existing cloud deployments. The best secure managed cloud service providers endeavor to deliver a highly secure environment for their customers through a variety of security capabilities via a cloud management style that is both proactive and customized. Reasons for adopting such a secure managed cloud service include resource allocation, cost of ownership, speed to market, unique capabilities, risk reduction and optimal security. When compared to public clouds and typical managed clouds, secure managed clouds offer major benefits in terms of customer responsibility and monthly cost. Generally speaking, public clouds involve the most customer responsibility, followed by managed clouds; secure managed clouds involve the least customer responsibility, taking a burden off organization management and staff. Likewise, public clouds often involve the highest total cost as compared to managed clouds and secure managed clouds, which are the most cost-effective. This may be surprising. However, it can be quite expensive for an organization to design and deploy a secure in-house solution with the equivalent security controls, compliance tools and staffing offered by a secure managed cloud. “The best secure managed cloud service providers endeavor to deliver a highly secure environment for their customers … ” Discover which Armor solution best matches your data workloads with our 30-second online tool. START NOW
  • 15. US 2360 Campbell Creek Boulevard, Suite 525, Richardson, Texas 75082 | Phone: +1 877 262 3473 UK 268 Bath Road, Slough, Berkshire SL1 4AX | Phone: +44 800 500 3167 © ARMOR 2016. All rights reserved.