1 / 15

Secure public cloud with end-user controlled key management

Nimbus Ninjas. Secure public cloud with end-user controlled key management. Talked to 3 cloud service providers & 12 individual cloud users. Business Model V3. IaaS Providers Ex. Enki , Varinsic , Savvis. Rent storage+mgmt but own your data. Rent storage+mgmt

gyan
Download Presentation

Secure public cloud with end-user controlled key management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Nimbus Ninjas Secure public cloud with end-user controlled key management Talked to 3 cloud service providers & 12 individual cloud users

  2. Business Model V3 IaaS Providers Ex. Enki, Varinsic, Savvis Rent storage+mgmt but own your data Rent storage+mgmt but own your data Prototype product Outreach to security conscious customers Product evaluation High degree of trust & confidence St.aaS Providers Ex. Varinsic, Box IaaS, PaaS Securely shred data. Avoid provider lock-in. St.aaS Users – SMB+Ent Ex. Box users Provide secure storage mgmt service to customers IaaS Users – SMB+Ent Ex. HealthcareStartups, LeagalFirms, Open source community Indemnify against content liability St.aaS, IaaS Providers St.aaS User Consumers Ex. Dropbox, AMZN clouddrive users IP Personnel Content Mgmt ??? Audit Trails ??? Direct R&D costs Support costs Marketing costs S/W license Nimbus Ninjas

  3. Business Model V4 St.aaS Providers Ex. Varinsic, Box Prototype product Outreach to security conscious customers Product evaluation Rent storage+mgmt but own your data High degree of trust & confidence St.aaS Users – SMB+Ent Ex. Box users IaaS, PaaS Securely shred data. Avoid provider lock-in. IaaS Providers Ex. Enki, Varinsic, Savvis IaaS Users (SMB+ Ent.) Ex. HealthcareStartups, LeagalFirms, Open source community Direct Provide secure storage mgmt service to customers IP Personnel St.aaS User Consumers Ex. Dropbox, AMZN clouddrive users IaaS Providers Indemnify against content liability Content Mgmt ??? Cloud Service Integrators (Dell) R&D costs Support costs Marketing costs Service Agreement Price Per server encrypted Price Per server encrypted Service Agreement

  4. Customer Interview Takeaways • Informatica Revisited (SaaS, Cloud Data Integration) • Customer feedback: security is still a concern for enterprises who want to set up their own cloud service • Pass/Fail test result – PASS • Varinsic (IaaS) • Seeing demand for secure alternative to Box • Can build secure storage service using this + SDN (Nicira, Vyatta) • Legal firms, Govt. would like this • Pass/Fail test result - PASS • Major enterprise software vendor (IaaS, SaaS) • “Ensuring secure data transportation is essential” • “Ensuring complete multi-tenancy isolation” is a basic requirement • Top features in mind: easy way to transport data in & out; support for mobile devices; smooth collaboration among services • Pass/Fail test result – PASS Nimbus Ninjas

  5. Customer Interview Takeaways • 12 individual Dropbox users (Storage as a Service users) • 1 user would DEFINITELY pay for the added security layer • 1 user considers it very useful and may pay depending on the price • 2 paid user likes “the idea of having an option to encrypt my Dropbox files on a need basis” • 3 consider themselves “normal people” who “hackers are not interested in” • 5 have “not found a situation” when encryption is necessary because they would “never put files with privacy or personal information” online • Pass/Fail test result – NEED MORE DATA • Consumer Market Competitors Exist • SecureSync (Dropbox) • CompletelyPrivateFiles (Box, Gmail) • BoxCryptor (Dropbox) • TrueCrypt • There exists a demand for Second-Level Security Nimbus Ninjas

  6. IaaS Segment - Market Size Analysis 6.8 million server machines IDC - Dec 2010 - Server Virtualization Market Forecast and Analysis App Dynamics - Application Virtualization Outlook Survey 1.3 million servers hosting Virtual Machines (VM) IDC - Dec 2010 - Worldwide Virtualization Tracker 9.0 million VMs Gartner – 2010 report Nimbus Ninjas prospects 1.25 million Security Sensitive VMs (24% CAGR) Nimbus Ninjas

  7. Pricing: $500 per VM per year • Market: $625M market with a growth rate of 24% Nimbus Ninjas

  8. Goals for the week… • Last Weeks Goals • Reach out to cloud providers [at the right level ! ] • 7 so far, Ongoing • How do you ensure against becoming a feature (that existing vendors can “pick off”) • Explored additional customer segments • Improved value proposition for multiple segments (focus on IaaS) • Bottom-up method for establishing market size. • Done • This Weeks Goals • Reach out to more Enterprise Users ! Nimbus Ninjas

  9. Backup

  10. Design Flow – IaaS IaaS Provider Enterprise H/W VirtalizationInfrstructureVMWare, Citrix etc. Physical H/W + Hypervisor Nimbus Ninjas

  11. Design Flow – IaaS Install NimbusNinjas Client on VServers Setup Onsite Key Server KeyServer Appliance (Key Management, Audit Trails) IaaS Provider Enterprise H/W VirtalizationInfrstructureVMWare, Citrix etc. Physical H/W + Hypervisor Nimbus Ninjas

  12. Design Flow – St.aaS Corporate Users (Seats) St.aaS provider Corporate Active Directory Server Confidential documents, Proprietary Code, Personal Stuff, etc… User 1 Confidential documents, Proprietary Code, Personal Stuff, etc… User 2 Nimbus Ninjas

  13. Design Flow – St.aaS Setup Onsite Key Server Corporate Users (Seats) St.aaS provider KeyServer Appliance (Key Management, Audit Trails…) Corporate Active Directory Server !@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^ Confidential documents, Proprietary Code, Personal Stuff, etc… User 1 !@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^ Confidential documents, Proprietary Code, Personal Stuff, etc… User 2 Install NimbusNinjas client on endpoint Encrypt, Decrypt on endpoint Nimbus Ninjas

  14. Design Flow – Individual Users Key Escrow Service (Authentication, key management) Individual Cloud Users !@#2%$#@4!43%&$#%^(^&^&^@$@#^% !@#2%$#@4!43%&$#%^(^&^&^@$@#^% !@#2%$#@4!43%&$#%^(^&^&^@$@#^% !@#2%$#@4!43%&$#%^(^&^&^@$@#^% !@#2%$#@4!43%&$#%^(^&^&^@$@#^% !@#2%$#@4!43%&$#%^(^&^&^@$@#^% Nimbus Ninjas

  15. Business Model V2 Nimbus Ninjas

More Related