SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Elastic Detector
http://elastic-detector.secludit.com




   Elastic Security for Cloud
        Infrastructures

           Matthias Jung
           CTO SecludIT
          j@secludit.com
Problem

  Cloud Infrastructures are highly dynamic and in
  permanent change




       How to get visibility, control, and protection?
Problem


   Today's Problems

    •  Lack of visibility

    •  Increasing size of overall vulnerability window

    •  Security degradation over time

    •  Manual management errors

   Note: Security is still the most important obstacle
   to the adoption of cloud computing
Our Solution


    Elastic Detector for Amazon EC2: Innovative
    Technology and Key Concepts

    •  Auto-Detection of new machines

    •  Auto-Deployment of Monitoring via "Auto-
       Checks"

    •  No Agents, No Up-Front Configuration
Our Solution


   Elastic Detector: Key Features

    •  Detection of inconsistencies and anomalies

    •  Real-time alerts

    •  Status visualization and graphs

    •  Daily reports

    •  Problem drill-down
Elastic Detector
Elastic Detector
Elastic Detector
Benefits


    Elastic Detector Key Benefits


    •  Increased Security

    •  Comprehensive Visibility and Control

    •  Reduction in administration time, cost, and
       worries

    •  "Safe Bet" Technology
Product


   Where Are We?

    •  Private Beta started in December 2010

    •  Product Release March, 1st, 2011

    •  Metered Pricing ($0.025 per Server Hour)

    •  25 Customers (SaaS, Application Hosters, Dev/
       Test)

    •  Planned: Elastic Protector (September 2011)
Questions ?


 Want to Try Out?
elastic-detector.secludit.com




Company: secludit.com
Blog:    elastic-security.com
Twitter: @elasticsecurity

Contenu connexe

Tendances

Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowDevOps.com
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir JirasekVladimir Jirasek
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
David Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpDavid Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpWeAreEsynergy
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaStefan Streichsbier
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Appsrazvanroman
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24
 
Moving Security to the Left
Moving Security to the LeftMoving Security to the Left
Moving Security to the LeftJavier Godinez
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Qualys
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresSBWebinars
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationNetizen Corporation
 
Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Amazon Web Services
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data CenterVMware
 

Tendances (20)

Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOpsOutpost24 webinar - Why security perfection is the enemy of DevSecOps
Outpost24 webinar - Why security perfection is the enemy of DevSecOps
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
David Slater G-Cloud Meet Up
David Slater G-Cloud Meet UpDavid Slater G-Cloud Meet Up
David Slater G-Cloud Meet Up
 
Security and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week JakartaSecurity and Mobility Co Create Week Jakarta
Security and Mobility Co Create Week Jakarta
 
Securitate In Google Apps
Securitate In Google AppsSecuritate In Google Apps
Securitate In Google Apps
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24 webinar : how to secure your data in the cloud - 06-2018
 
Moving Security to the Left
Moving Security to the LeftMoving Security to the Left
Moving Security to the Left
 
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
The Netizen Approach to Security and Innovation
The Netizen Approach to Security and InnovationThe Netizen Approach to Security and Innovation
The Netizen Approach to Security and Innovation
 
Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials Extend Amazon GuardDuty with Cloud Insight Essentials
Extend Amazon GuardDuty with Cloud Insight Essentials
 
Modern Security for the Modern Data Center
Modern Security for the Modern Data CenterModern Security for the Modern Data Center
Modern Security for the Modern Data Center
 

En vedette

Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionCloudOps Summit
 
EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012staffordlibrary
 
Blogi i fora historyczne
Blogi i fora historyczneBlogi i fora historyczne
Blogi i fora historycznebarmaj7
 
Ast simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyAst simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyBatgerel Batjargal
 
Target audience
Target audienceTarget audience
Target audiencesarahlambe
 
Lane tech & lincoln park
Lane tech & lincoln parkLane tech & lincoln park
Lane tech & lincoln parkElizabeth_20
 
MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012staffordlibrary
 
Prezentācija1 ltv
Prezentācija1 ltvPrezentācija1 ltv
Prezentācija1 ltvJose Duarte
 
Presentation1
Presentation1Presentation1
Presentation1nooch33
 
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelConsumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelEnprecis
 
Convergence – Social Enterprise
Convergence – Social EnterpriseConvergence – Social Enterprise
Convergence – Social EnterpriseCloudOps Summit
 
Szinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunSzinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunJose Duarte
 
19098962 note-sejarah
19098962 note-sejarah19098962 note-sejarah
19098962 note-sejarahClover Tay
 
Media research methods
Media research methodsMedia research methods
Media research methodssarahlambe
 
LRSP 433 Chavez Summer 2012
LRSP 433  Chavez Summer 2012LRSP 433  Chavez Summer 2012
LRSP 433 Chavez Summer 2012staffordlibrary
 
MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012staffordlibrary
 

En vedette (20)

Tp fernandagonzalez lamejor
Tp fernandagonzalez lamejorTp fernandagonzalez lamejor
Tp fernandagonzalez lamejor
 
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, InterxionTruth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
Truth and Lies about Latency in the Cloud, Jelle Frank v.d. Zwet, Interxion
 
EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012EDCI.500.Coffman.Summer.2012
EDCI.500.Coffman.Summer.2012
 
Blogi i fora historyczne
Blogi i fora historyczneBlogi i fora historyczne
Blogi i fora historyczne
 
Wh3
Wh3Wh3
Wh3
 
Ast simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copyAst simple-ppt-1230292562412121-1 - copy
Ast simple-ppt-1230292562412121-1 - copy
 
Target audience
Target audienceTarget audience
Target audience
 
Lane tech & lincoln park
Lane tech & lincoln parkLane tech & lincoln park
Lane tech & lincoln park
 
MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012MBUS.525.Chavez.Spring.2012
MBUS.525.Chavez.Spring.2012
 
Prezentācija1 ltv
Prezentācija1 ltvPrezentācija1 ltv
Prezentācija1 ltv
 
Presentation1
Presentation1Presentation1
Presentation1
 
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility PanelConsumer Opinion on Green Vehicles: Enprecis Mobility Panel
Consumer Opinion on Green Vehicles: Enprecis Mobility Panel
 
Convergence – Social Enterprise
Convergence – Social EnterpriseConvergence – Social Enterprise
Convergence – Social Enterprise
 
Linked In Presentation
Linked In PresentationLinked In Presentation
Linked In Presentation
 
Szinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hunSzinyei mp secondary school(zöld) hun
Szinyei mp secondary school(zöld) hun
 
19098962 note-sejarah
19098962 note-sejarah19098962 note-sejarah
19098962 note-sejarah
 
Media research methods
Media research methodsMedia research methods
Media research methods
 
LRSP 433 Chavez Summer 2012
LRSP 433  Chavez Summer 2012LRSP 433  Chavez Summer 2012
LRSP 433 Chavez Summer 2012
 
MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012MBUS 502 Chavez Summer 2012
MBUS 502 Chavez Summer 2012
 
Singin’ the rain
Singin’ the rainSingin’ the rain
Singin’ the rain
 

Similaire à Startups: Jung - SECLUDIT

How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...Amazon Web Services
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-securitySecludIT
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-securitySergio Loureiro
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101eG Innovations
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?eG Innovations
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesSutedjo Tjahjadi
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overviewbmiller144
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXDevOps.com
 
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealitySingle Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealityJohn Williams
 
Keynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityKeynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityElasticsearch
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...eG Innovations
 
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...eG Innovations
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security PractitionerAdrian Sanabria
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Jason Mashak
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 

Similaire à Startups: Jung - SECLUDIT (20)

The Road to SaaS
The Road to SaaSThe Road to SaaS
The Road to SaaS
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-security
 
Microservices docker-security
Microservices docker-securityMicroservices docker-security
Microservices docker-security
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101
 
Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?Does Using Citrix Cloud Make Performance Monitoring Easier?
Does Using Citrix Cloud Make Performance Monitoring Easier?
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
 
Alert Logic - Corporate Overview
Alert Logic - Corporate OverviewAlert Logic - Corporate Overview
Alert Logic - Corporate Overview
 
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOXContinuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
Continuous Compliance and DevSecOps in Times of GDPR, HIPAA and SOX
 
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a RealitySingle Pane of Glass Monitoring Tool - Is it a Myth or a Reality
Single Pane of Glass Monitoring Tool - Is it a Myth or a Reality
 
Keynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic ObservabilityKeynote : évolution et vision d'Elastic Observability
Keynote : évolution et vision d'Elastic Observability
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
 
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
Choosing a citrix monitoring strategy key capabilities needed and pitfalls to...
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
Optimize & Secure Your Hybrid Cloud with Runecast (September 2021)
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 

Plus de CloudOps Summit

Enable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowEnable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowCloudOps Summit
 
Augmenting People – Steuern wir noch oder werden wir gesteuert?
Augmenting People –  Steuern wir noch oder werden wir gesteuert?Augmenting People –  Steuern wir noch oder werden wir gesteuert?
Augmenting People – Steuern wir noch oder werden wir gesteuert?CloudOps Summit
 
Enterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyEnterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyCloudOps Summit
 
Time is the currency of IT
Time is the currency of ITTime is the currency of IT
Time is the currency of ITCloudOps Summit
 
Agile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdAgile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdCloudOps Summit
 
Devops in the real world
Devops in the real worldDevops in the real world
Devops in the real worldCloudOps Summit
 
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenLokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenCloudOps Summit
 
True Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageTrue Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageCloudOps Summit
 
Cloud Computing is not simple
Cloud Computing is not simpleCloud Computing is not simple
Cloud Computing is not simpleCloudOps Summit
 
How to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsHow to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsCloudOps Summit
 
You should not own a data center
You should not own a data centerYou should not own a data center
You should not own a data centerCloudOps Summit
 
Cloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloudOps Summit
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
 
Liquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioLiquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioCloudOps Summit
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 

Plus de CloudOps Summit (20)

Enable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud EscrowEnable2Cloud: Risk Management by Cloud Escrow
Enable2Cloud: Risk Management by Cloud Escrow
 
Augmenting People – Steuern wir noch oder werden wir gesteuert?
Augmenting People –  Steuern wir noch oder werden wir gesteuert?Augmenting People –  Steuern wir noch oder werden wir gesteuert?
Augmenting People – Steuern wir noch oder werden wir gesteuert?
 
Programming humans
Programming humansProgramming humans
Programming humans
 
Enterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexyEnterprise IT - between ugly and sexy
Enterprise IT - between ugly and sexy
 
Time is the currency of IT
Time is the currency of ITTime is the currency of IT
Time is the currency of IT
 
Komplex – Perplex?
Komplex – Perplex?Komplex – Perplex?
Komplex – Perplex?
 
Agile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wirdAgile Stabilität - Wenn Operations agil wird
Agile Stabilität - Wenn Operations agil wird
 
Agile Virtualisierung
Agile VirtualisierungAgile Virtualisierung
Agile Virtualisierung
 
Devops in the real world
Devops in the real worldDevops in the real world
Devops in the real world
 
Banking Reloaded
Banking ReloadedBanking Reloaded
Banking Reloaded
 
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der UnternehmensdatenLokale Clouds für mehr Kontrolle der Unternehmensdaten
Lokale Clouds für mehr Kontrolle der Unternehmensdaten
 
True Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined StorageTrue Storage Virtualization with Software-Defined Storage
True Storage Virtualization with Software-Defined Storage
 
Cloud Computing is not simple
Cloud Computing is not simpleCloud Computing is not simple
Cloud Computing is not simple
 
How to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & AcquisitionsHow to Create Value Through Mergers & Acquisitions
How to Create Value Through Mergers & Acquisitions
 
You should not own a data center
You should not own a data centerYou should not own a data center
You should not own a data center
 
Cloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS KonkurrenzCloud-Dienste aus DE & EU als AWS Konkurrenz
Cloud-Dienste aus DE & EU als AWS Konkurrenz
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
Liquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.ioLiquid Work, Luca Hammer, work.io
Liquid Work, Luca Hammer, work.io
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 

Dernier

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxran17april2001
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 

Dernier (20)

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
BAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptxBAILMENT & PLEDGE business law notes.pptx
BAILMENT & PLEDGE business law notes.pptx
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 

Startups: Jung - SECLUDIT

  • 1. Elastic Detector http://elastic-detector.secludit.com Elastic Security for Cloud Infrastructures Matthias Jung CTO SecludIT j@secludit.com
  • 2. Problem Cloud Infrastructures are highly dynamic and in permanent change How to get visibility, control, and protection?
  • 3. Problem Today's Problems •  Lack of visibility •  Increasing size of overall vulnerability window •  Security degradation over time •  Manual management errors Note: Security is still the most important obstacle to the adoption of cloud computing
  • 4. Our Solution Elastic Detector for Amazon EC2: Innovative Technology and Key Concepts •  Auto-Detection of new machines •  Auto-Deployment of Monitoring via "Auto- Checks" •  No Agents, No Up-Front Configuration
  • 5. Our Solution Elastic Detector: Key Features •  Detection of inconsistencies and anomalies •  Real-time alerts •  Status visualization and graphs •  Daily reports •  Problem drill-down
  • 9. Benefits Elastic Detector Key Benefits •  Increased Security •  Comprehensive Visibility and Control •  Reduction in administration time, cost, and worries •  "Safe Bet" Technology
  • 10. Product Where Are We? •  Private Beta started in December 2010 •  Product Release March, 1st, 2011 •  Metered Pricing ($0.025 per Server Hour) •  25 Customers (SaaS, Application Hosters, Dev/ Test) •  Planned: Elastic Protector (September 2011)
  • 11. Questions ? Want to Try Out? elastic-detector.secludit.com Company: secludit.com Blog: elastic-security.com Twitter: @elasticsecurity