Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
-
Upload
hp-enterprise -
Category
Technology
-
view
763 -
download
0
description
Transcript of Jan De Clercq - BB2473 - Make the right move at the intersection of cloud and security
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Moderators – Rebecca Lawson
June 2012
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Making the right move at the intersection of cloud and securityModerators – Rebecca LawsonJune 2012
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Agenda
1. Opening remarks2. Panel introductions3. Q&A
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
See moreSee soonerAct sooner
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
Panelists
Jan de ClercqHP Technology Services
Sanjay RajaHP Software
Christian VerstraeteHP Cloud Solutions
Rebecca LawsonHP Solution Marketing
HP Security Experts
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
A few questions
What cloud use cases do you see being implemented most successful and/or predictably?
What best practices can be applied to public cloud services that are already being used?
What security and risk measures are most overlooked for private cloud infrastructure?
What security and risk measures are most overlooked when consuming public cloud infrastructure? Public cloud business services?
Describe a successful (and secure) deployement of public or private cloud services
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Cloud components
7
NetworkCloud platform
SaaS PaaS IaaS
IT management framework
Demand
Delivery
Supply
Identity & access management
Management services
Security & compliance management
Access devices
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
Security requirementsAccess device
Private cloud
Hosted private cloud
Public cloud
IaaS PaaS SaaS
Human resources (security teams) Shared
Application security
User
Identity & access management
Software licencing
Audit & log management
Data encryption
Host intrusion detection
System monitoring Shared
OS hardening
Asset management Provider
Network intrusion detection
Network security
Security policy
Physical/environmental security
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
Enterprise Security Framework for end-to-end security
Data centersecurity
Networksecurity
Application security
End pointsecurity
Cloudsecurity
Governance, risk and compliance
Identity and access management
Security operations
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Security intelligence and risk management platform
HP EnterpriseView
Compliance and policy
Vulnerability management
Assetprofiling
Risk management
Security
intelligence
Network
security
Application
security
Threat
research
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
Get the Mobile App
Download content from this
session with the free mobile
app.
Text the word “Discover” to
474747
or
m.hp.com/events
Download now
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
After the eventVisit these demos
Find out more
Attend these sessions• BB2472 Operations
panel, Thurs June 7; 11:15-12:00
• BB2055 Social engineering: The dark magic Thurs June 7; 10:00-10:45
• BB2922 Applications security Thurs June 7; 1:30-2:15
Security and Risk Management Zone
• Information security
• Network security
• Data security
• Secure boardroom
• Contact your sales rep
• Visit the website www.hp.com/go/enterprisesecurity
Your feedback is important to us. Please take a few minutes to complete the session survey.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you