1 / 5

Cloud Security & Compliance

Cloud Security & Compliance. Kenneth Le ISM 158 Spring 2010 Pankaj Mehra. Scenario. LOGiQ 3 ‘s Needs:. BlueLock Solution:. No upfront costs or lengthy contract agreements Vmware -based cloud hosting solution Security solution SAS 70 type II certified 99.99% uptime guarantee

carney
Download Presentation

Cloud Security & Compliance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Security & Compliance Kenneth Le ISM 158 Spring 2010 PankajMehra

  2. Scenario LOGiQ3‘s Needs: BlueLock Solution: No upfront costs or lengthy contract agreements Vmware-based cloud hosting solution Security solution SAS 70 type II certified 99.99% uptime guarantee Geo-graphically diverse data centers for failover and disaster recovery • IT infrastructure (IaaS) • Implementation within 4 months • Scalable solution for unpredictable workloads • Special concerns: • Tight security and compliance to handle sensitive data

  3. Security Concerns Security Solutions • Data location • Data protection • Application security • Availability • Identity management • Geo-graphically diverse data centers • Application firewall • 99.99% uptime guarantee • Security event manager • Monitor event logs • Traffic manager

  4. Regulations Compliance • PCI DSS • SAS 70 Type II • ISO 27001

  5. References • Horwitt, Elisabeth. "Cloud Security: Try These Techniques Now - Computerworld." Computerworld - IT News, Features, Blogs, Tech Reviews, Career Advice. Web. 13 May 2010. <http://www.computerworld.com/s/article/9149921/Cloud_security_Try_these_techniques_now?taxonomyId=158&pageNumber=1>. • Wood, Lamont. "Cloud Computing and Compliance: Be Careful up There - Computerworld." Computerworld - IT News, Features, Blogs, Tech Reviews, Career Advice. Web. 13 May 2010. <http://www.computerworld.com/s/article/9126934/Cloud_computing_and_compliance_Be_careful_up_there_?taxonomyId=154&pageNumber=1>. • Brodkin, Jon. "Gartner: Seven Cloud-computing Security Risks | Security Central - InfoWorld." Business Technology, IT News, Product Reviews and Enterprise IT Strategies - InfoWorld. Web. 13 May 2010. <http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,0>. • Silva, Peter. "Securing the Cloud." Securing the Cloud. 2010. Web. 12 May 2010. <http://www.computerworld.com/pdfs/F5_Securing_Cloud.pdf>.

More Related