The Indianapolis times. (Indianapolis [Ind.]) 1924-12-20 [p 7]
SECURING THE CLOUD IN A REGULATED WORLD 2012 Online Tech. All rights reserved. CONFIDENTIAL...
-
Upload
donald-lidstone -
Category
Documents
-
view
215 -
download
0
Transcript of SECURING THE CLOUD IN A REGULATED WORLD 2012 Online Tech. All rights reserved. CONFIDENTIAL...
SECURING THE CLOUD IN A REGULATED WORLD
www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
Indianapolis Data ConnectorsThursday, August 21, 2014
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
WHO NEEDS CLOUD SECURITY?
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
CLOUD TIPPING POINT SURPASSED
http://itknowledgeexchange.techtarget.com/cloud-computing-enterprise/is-a-new-journey-needed-for-business-critical-applications/
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
2013 DATA BREACHES30% INCREASE IN THE NUMBER OF DATA BREACHES VS 2012
Identity Theft Research Center (http://www.idtheftcenter.org/)
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
AVERAGE BREACH COST
Ponemon Institute: 2013 Cost of Data Breach Study
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
• Continuous Compliance
• Defense-in-depth Security
• Enterprise-Class Data Protection
SECURE CLOUD STRATEGIES
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
CONTINUOUS COMPLIANCE
• Culture of continuous compliance
• Auditor partnership
• Super-Audit
• Transparency
• Goal: Easing compliance burden for ourselves
and clients in regulated spaces
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
POLL: WORST SECURITY THREAT?
• People
• Process
• Technology
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
POLL: WORST SECURITY THREAT?
• People
• Process
• Technology
• ALL OF THE ABOVE
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
HOLISTIC APPROACH TO SECURITY
people technology
process
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
HOLISTIC APPROACH TO SECURITY
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
SECURITY: PEOPLE
Train staff
Train business associates
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
SECURITY: PROCESS
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
SECURITY: TECHNOLOGY
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
HOLISTIC SECURITY
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
SECURITY SAVINGS PER RECORD
Ponemon Institute: 2013 Cost of Data Breach Study
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
• Establish & document your priorities–Isolation–Uptime–Performance–Scalability–Price
THE RIGHT CLOUD FOR YOU#1. KNOW THYSELF
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
• Assess your tolerance for loss– What apps & data can you afford to lose?– How much $ does your business lose each
hour or day your cloud is down?– Does your backup plan match your risk
tolerance? Be honest!– Backing up your cloud onsite vs offsite – how
soon can you begin recovery efforts?
THE RIGHT CLOUD FOR YOU#2. WHAT ARE YOU WILLING TO LOSE?
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
–What critical business MUST be met? • Performance?• Encryption?• Backup?• Do they work together?• Test those dependencies!
THE RIGHT CLOUD FOR YOU#3. CAN YOUR CLOUD PLAY NICE?
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
SAMPLE CLOUD ARCHITECTURESMULTI-TENANT CLOUD
Use Cases• Designed for 99.999% uptime• Designed for live maintenance• Disaster recovery• Light to medium SaaS and E-
Commerce• Web servers• Application servers
– Including custom apps• Light to medium density Email
servers for SMB’s• Light to medium density
databases
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
DEDICATED CLOUD
SAMPLE CLOUD ARCHITECTURES
Use Cases• Mid performance solution
optimized for isolation• Isolation conscious businesses
looking to adopt cloud• Designed for 99.99% uptime• Designed for near-live
maintenance• Application Servers• Web servers • File Servers• Light to medium density Email
servers for SMB’s• Light to medium density databases
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
VIRTUAL PRIVATE CLOUD
SAMPLE CLOUD ARCHITECTURES
Use Cases• Ideal for Performance/elastic
conscious businesses looking to cloud
• Designed for 99.999% uptime• Designed for live maintenance• Medium to high density SaaS and
E-Commerce• Web servers• Application servers
– Including custom apps• Medium to high density Email
servers for SMB’s• Medium to high density databases
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
VIRTUAL DATA-CENTER-IN-A-BOX
SAMPLE CLOUD ARCHITECTURES
Use Cases• High performance solution optimized
for flexibility• Designed for 99.999% uptime• Designed for live maintenance• Disaster recovery• Web servers• Application servers
– Including custom apps• High to extreme SaaS and E-
Commerce• High to extreme density Email servers
for Enterprise• High to extreme density databases
– Including Oracle
www.onlinetech.com Copyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
LASTLY
www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
Mike [email protected]
www.onlinetech.com 734-213-2020
CONTACT INFO: