SlideShare a Scribd company logo
1 of 12
CLOUD
SECURITYFROM WINDSTREAM
Comprehensive confidentiality, integrity,
and availability for networks of all sizes
CLOUD SECURITY IS DIFFERENT
Copyright 2015. All Rights Reserved.2
Decisions concerning the security of data
in the cloud has shifted from the IT room
to the boardroom, with 61% of companies
indicating that executives are now
involved in such decisions.
Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies
are in the Dark on Shadow IT Usage, January 9, 2015
Copyright 2015. All Rights Reserved.3
“While security of data remains a top barrier to
cloud adoption, organizations are still moving
forward in adopting cloud services, with 74% of
respondents indicating they are either moving full
steam ahead, or with caution…”
Cloud Security Alliance, Cloud Security Alliance New Survey Finds
Companies are in the Dark on Shadow IT Usage, January 9, 2015
SEEKING OUT THE CLOUD, BUT STILL WARY OF IT
WHEN YOU ENTRUST YOUR APPLICATIONS AND YOUR DATA
TO A THIRD PARTY, YOU NEED TO KNOW THEY’RE SECURE—
FROM IT TO THE BOARDROOM.
WINDSTREAM CLOUD SECURITY –
ENTERPRISE-READY
Copyright 2015. All Rights Reserved.4
SMART
Windstream is not just a Fortune
500 company. Windstream is the
provider of choice for four out
of five Fortune 500 companies
for data, voice, network and cloud
solutions.
COMPLIANT
Windstream knows, and
regularly meets, the evolving
security needs of the
enterprise—from retail to
healthcare, to finance, and
everything in between.
PERSONAL
Whether on your premise, or in
our enterprise-class data centers,
Windstream engineers work
with you to provide solutions
that are personalized to your
individual security needs.
SUPPORTING AND PROTECTING AT EVERY POINT
Copyright 2015. All Rights Reserved.5
Preventing unauthorized
access to your resources.
DATA
PRIVACY
Protecting the data center with checkpoints, access
mechanisms, and robust emergency procedures.
PHYSICAL
SECURITY
Maintaining a secure network environment
for data and other traffic.
NETWORK
SECURITY
SECURITY SUPREME AT THE DATA CENTER
Copyright 2015. All Rights Reserved.6
Data resides in a
secure WIN facility
on secure servers
with 24x7
monitoring by NOC
24x7 staffed
physical security
Biometric access
control
Access to cages
and cabinets
require an escort
from security
personnel
Cameras digitally
record and retain all
movement in and
around the data
center
Fully compliant with
SSAE-16, SOC 1
Type II, SOC 2
Type II, SOC 3,
PCI-DSS, HIPAA,
HITECH AT101,
NIST 800-53 and
SAFE HARBOR
Proximity plus
security code
readers on all main
entrance doors to
the general facility
AND AT EVERY OTHER JUNCTURE:
THE CIA TRIAD
Copyright 2015. All Rights Reserved.7
The CIA Triad is a venerable,
well-known model for security
policy development, used
to identify problem areas and
necessary solutions for
information security.
IT IS WINDSTREAM’S
SECURITY FOUNDATION.
Techrepublic, “The CIA Triad” http://www.techrepublic.com/blog/it-security/the-cia-triad/
AVAILABILITY
CONFIDENTIALITY
INTEGRITY
The availability of information resources—that
they’re there when you need them—from
pieces of data to the communications
infrastructure.
The trustworthiness of information sources—that data have not been changed
inappropriately, whether deliberately or by accident. The concept also includes
assurance that the data came from the source you think it came from—the source
on which you’re relying.
Limiting information access and disclosure only to authorized
users, and preventing access to unauthorized ones.
Multi-Factor Authentication
Anti-Virus / Anti-Malware Service
Access Control Lists
CONFIDENTIALITY
Copyright 2015. All Rights Reserved.8
Authentication to identify and limit users,
including user IDs and passwords
Protections against malware, spyware,
spam and phishing attacks
Limiting access to individuals’ personal information,
including policies mapped to help you meet
and exceed regulatory requirements
Windstream security tools
to meet confidentiality
requirements include:
Methods of assuring
confidentiality include:
INTEGRITY
Copyright 2015. All Rights Reserved.9
To help maintain the integrity
of your data—to preserve
without corruption whatever
was transmitted or entered
into the system, right or
wrong, Windstream employs:
• Intrusion Detection Systems (IDS)
• Log Monitoring
• Vulnerability Scanning
• DDoS Protection
• Web Application Firewall
• Managed Firewall
• Data Encryption
AVAILABILITY
Copyright 2015. All Rights Reserved.10
Data availability can be
affected by a
malfunctioning computer
or device, malicious
intrusion, natural
phenomena like wind
or water, or human
causes, accidental or
deliberate.
All Windstream security policies and procedures,
from the network to the managed service
contribute to data availability, protecting you
to the level you require from:
• Physical or virtual server failure
• Physical harm to, or natural disaster
impacting the data center
• Malware, DDoS, or other malicious attack
• Unauthorized access to data
Additional tools enabling data availability include:
• Managed Firewall
• Managed Anti-Virus / Anti-Malware
• Global Load Balancing
A COMPLETE
SECURITY PORTFOLIO
Copyright 2015. All Rights Reserved.11
Backed by policies and
procedures that adhere to the
CIA security policies model,
Windstream custom delivers
security solutions designed to
meet your individual business
needs, including:
Business
Continuity
Managed
Remote Backup
DRaaS
Wireless
3G/4G Backup
IaaS
Redundant
Circuitry
Managed
Storage/Security
 Managed Firewall  Operating System Hardening
 Intrusion Detection  DDoS Mitigation
 Log Management  Web Application Firewall
 Threat Management  Vulnerability Scanning
 Monitoring  VPN Services
 Multi-factor Authentication  Physical Data Center Security
 Anti-virus / Anti-Malware
Services
 Email Security
 Global Load Balancing
Copyright 2015. All Rights Reserved.12
The highest security, customized for your
network, your data, and your business
WINDSTREAM CLOUD SECURITY

More Related Content

What's hot

Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesSplunk
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangColloqueRISQ
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?The TNS Group
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016patmisasi
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Iftikhar Ali Iqbal
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake sheaColloqueRISQ
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - GemaltoHarry Gunns
 
BITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETBITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETEdgar Alejandro Villegas
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityIntronis MSP Solutions by Barracuda
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | SecloreSeclore
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security ServicesSaratechnology
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionSkyport Systems
 

What's hot (20)

Gov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los AngelesGov & Education Day 2015 - Tim Lee, City of Los Angeles
Gov & Education Day 2015 - Tim Lee, City of Los Angeles
 
Gartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhangGartner presentation risq dec 2016 jie zhang
Gartner presentation risq dec 2016 jie zhang
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016Scalar_Managed_Security_Services_2016
Scalar_Managed_Security_Services_2016
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Worry free security breach - Gemalto
Worry free security breach - GemaltoWorry free security breach - Gemalto
Worry free security breach - Gemalto
 
BITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEETBITGLASS - DATA BREACH DISCOVERY DATASHEET
BITGLASS - DATA BREACH DISCOVERY DATASHEET
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud Security
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security Services
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 

Viewers also liked

Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Enterprise
 
Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Enterprise
 
Thu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjayThu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjayAjay Shriwastava
 
Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...MongoDB
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Enterprise
 
2011 Windstream Overview
2011 Windstream Overview2011 Windstream Overview
2011 Windstream OverviewMark Sinofsky
 
The Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and RegulationThe Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and RegulationRoberto Balmer
 
Hadoop data access layer v4.0
Hadoop data access layer v4.0Hadoop data access layer v4.0
Hadoop data access layer v4.0SpringPeople
 
Swisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group liveSwisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group liveThomas Maeder
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANMartin Haas
 

Viewers also liked (12)

Windstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security MythsWindstream Webinar: Debunking Network Security Myths
Windstream Webinar: Debunking Network Security Myths
 
Maximizing it budget
Maximizing it budgetMaximizing it budget
Maximizing it budget
 
Windstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT BudgetWindstream Webinar: Maximizing Your IT Budget
Windstream Webinar: Maximizing Your IT Budget
 
Web security
Web securityWeb security
Web security
 
Thu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjayThu-310pm-Impetus-SachinAndAjay
Thu-310pm-Impetus-SachinAndAjay
 
Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...Building the future of Digital Television and Enterprise Database Management ...
Building the future of Digital Television and Enterprise Database Management ...
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
2011 Windstream Overview
2011 Windstream Overview2011 Windstream Overview
2011 Windstream Overview
 
The Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and RegulationThe Telecommunications Business in Switzerland - Liberalization and Regulation
The Telecommunications Business in Switzerland - Liberalization and Regulation
 
Hadoop data access layer v4.0
Hadoop data access layer v4.0Hadoop data access layer v4.0
Hadoop data access layer v4.0
 
Swisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group liveSwisscom Intranet Transformation Journey - Digital Workplace Group live
Swisscom Intranet Transformation Journey - Digital Workplace Group live
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWAN
 

Similar to Windstream Cloud Security Presentation

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITMarketingArrowECS_CZ
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Seven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationSeven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationVijilan IT Security solutions
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 

Similar to Windstream Cloud Security Presentation (20)

CipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution Overview
 
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho ITJak využít cloudu pro zvýšení bezpečnosti vašeho IT
Jak využít cloudu pro zvýšení bezpečnosti vašeho IT
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Data security
Data securityData security
Data security
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Seven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integrationSeven steps for improving cloud security with business integration
Seven steps for improving cloud security with business integration
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 

More from Ideba

Kaufman Hall Healthcare Infographic
Kaufman Hall Healthcare InfographicKaufman Hall Healthcare Infographic
Kaufman Hall Healthcare InfographicIdeba
 
Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance InfographicIdeba
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education InfographicIdeba
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyIdeba
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic Ideba
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management OnboardingIdeba
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management WebsiteIdeba
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS BoothIdeba
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS WebsiteIdeba
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Ideba
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Ideba
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case StudyIdeba
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyIdeba
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case StudyIdeba
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyIdeba
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicIdeba
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyIdeba
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study InfographicIdeba
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative PortfolioIdeba
 

More from Ideba (20)

Kaufman Hall Healthcare Infographic
Kaufman Hall Healthcare InfographicKaufman Hall Healthcare Infographic
Kaufman Hall Healthcare Infographic
 
Kaufman Hall Finance Infographic
Kaufman Hall Finance InfographicKaufman Hall Finance Infographic
Kaufman Hall Finance Infographic
 
Kaufman Hall Education Infographic
Kaufman Hall Education InfographicKaufman Hall Education Infographic
Kaufman Hall Education Infographic
 
Kaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case StudyKaufman Hall Axiom Software - Emory Case Study
Kaufman Hall Axiom Software - Emory Case Study
 
Microsoft Teams Infographic
Microsoft Teams Infographic Microsoft Teams Infographic
Microsoft Teams Infographic
 
C4 Database Management Onboarding
C4 Database Management OnboardingC4 Database Management Onboarding
C4 Database Management Onboarding
 
C4 Database Management Website
C4 Database Management WebsiteC4 Database Management Website
C4 Database Management Website
 
FINEOS Booth
FINEOS BoothFINEOS Booth
FINEOS Booth
 
FINEOS Website
FINEOS WebsiteFINEOS Website
FINEOS Website
 
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (2/2)
 
Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)Kaufman Hall Axiom Booth (1/2)
Kaufman Hall Axiom Booth (1/2)
 
Greenway Health Amicus Case Study
Greenway Health Amicus Case StudyGreenway Health Amicus Case Study
Greenway Health Amicus Case Study
 
Greenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case StudyGreenway Health Dr. Randolph Lamberson Case Study
Greenway Health Dr. Randolph Lamberson Case Study
 
Cortez Health Case Study
Cortez Health Case StudyCortez Health Case Study
Cortez Health Case Study
 
Greenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case StudyGreenway Health Primary Care Internists Case Study
Greenway Health Primary Care Internists Case Study
 
Greenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction InfographicGreenway Health EHR Satisfaction Infographic
Greenway Health EHR Satisfaction Infographic
 
Greenway Health Cow Creek Case Study
Greenway Health Cow Creek Case StudyGreenway Health Cow Creek Case Study
Greenway Health Cow Creek Case Study
 
Greenway Health Case Study Infographic
Greenway Health Case Study InfographicGreenway Health Case Study Infographic
Greenway Health Case Study Infographic
 
Ideba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo OptionsIdeba Uganda 2020 Logo Options
Ideba Uganda 2020 Logo Options
 
Ideba Creative Portfolio
Ideba Creative PortfolioIdeba Creative Portfolio
Ideba Creative Portfolio
 

Recently uploaded

Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfVWO
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...Hugues Rey
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...Ahrefs
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internetnehapardhi711
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project VideoSineadBidwell
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software SolutionsDevherds Software Solutions
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfadult marketing
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfCIO Business World
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一s SS
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOSzymon Słowik
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024CIO Business World
 

Recently uploaded (20)

Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project Video
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions
 
The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
Exploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdfExploring The World Of Adult Ad Networks.pdf
Exploring The World Of Adult Ad Networks.pdf
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
 
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
定制(ULV毕业证书)拉文大学毕业证成绩单原版一比一
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEO
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
 

Windstream Cloud Security Presentation

  • 1. CLOUD SECURITYFROM WINDSTREAM Comprehensive confidentiality, integrity, and availability for networks of all sizes
  • 2. CLOUD SECURITY IS DIFFERENT Copyright 2015. All Rights Reserved.2 Decisions concerning the security of data in the cloud has shifted from the IT room to the boardroom, with 61% of companies indicating that executives are now involved in such decisions. Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies are in the Dark on Shadow IT Usage, January 9, 2015
  • 3. Copyright 2015. All Rights Reserved.3 “While security of data remains a top barrier to cloud adoption, organizations are still moving forward in adopting cloud services, with 74% of respondents indicating they are either moving full steam ahead, or with caution…” Cloud Security Alliance, Cloud Security Alliance New Survey Finds Companies are in the Dark on Shadow IT Usage, January 9, 2015 SEEKING OUT THE CLOUD, BUT STILL WARY OF IT WHEN YOU ENTRUST YOUR APPLICATIONS AND YOUR DATA TO A THIRD PARTY, YOU NEED TO KNOW THEY’RE SECURE— FROM IT TO THE BOARDROOM.
  • 4. WINDSTREAM CLOUD SECURITY – ENTERPRISE-READY Copyright 2015. All Rights Reserved.4 SMART Windstream is not just a Fortune 500 company. Windstream is the provider of choice for four out of five Fortune 500 companies for data, voice, network and cloud solutions. COMPLIANT Windstream knows, and regularly meets, the evolving security needs of the enterprise—from retail to healthcare, to finance, and everything in between. PERSONAL Whether on your premise, or in our enterprise-class data centers, Windstream engineers work with you to provide solutions that are personalized to your individual security needs.
  • 5. SUPPORTING AND PROTECTING AT EVERY POINT Copyright 2015. All Rights Reserved.5 Preventing unauthorized access to your resources. DATA PRIVACY Protecting the data center with checkpoints, access mechanisms, and robust emergency procedures. PHYSICAL SECURITY Maintaining a secure network environment for data and other traffic. NETWORK SECURITY
  • 6. SECURITY SUPREME AT THE DATA CENTER Copyright 2015. All Rights Reserved.6 Data resides in a secure WIN facility on secure servers with 24x7 monitoring by NOC 24x7 staffed physical security Biometric access control Access to cages and cabinets require an escort from security personnel Cameras digitally record and retain all movement in and around the data center Fully compliant with SSAE-16, SOC 1 Type II, SOC 2 Type II, SOC 3, PCI-DSS, HIPAA, HITECH AT101, NIST 800-53 and SAFE HARBOR Proximity plus security code readers on all main entrance doors to the general facility
  • 7. AND AT EVERY OTHER JUNCTURE: THE CIA TRIAD Copyright 2015. All Rights Reserved.7 The CIA Triad is a venerable, well-known model for security policy development, used to identify problem areas and necessary solutions for information security. IT IS WINDSTREAM’S SECURITY FOUNDATION. Techrepublic, “The CIA Triad” http://www.techrepublic.com/blog/it-security/the-cia-triad/ AVAILABILITY CONFIDENTIALITY INTEGRITY The availability of information resources—that they’re there when you need them—from pieces of data to the communications infrastructure. The trustworthiness of information sources—that data have not been changed inappropriately, whether deliberately or by accident. The concept also includes assurance that the data came from the source you think it came from—the source on which you’re relying. Limiting information access and disclosure only to authorized users, and preventing access to unauthorized ones.
  • 8. Multi-Factor Authentication Anti-Virus / Anti-Malware Service Access Control Lists CONFIDENTIALITY Copyright 2015. All Rights Reserved.8 Authentication to identify and limit users, including user IDs and passwords Protections against malware, spyware, spam and phishing attacks Limiting access to individuals’ personal information, including policies mapped to help you meet and exceed regulatory requirements Windstream security tools to meet confidentiality requirements include: Methods of assuring confidentiality include:
  • 9. INTEGRITY Copyright 2015. All Rights Reserved.9 To help maintain the integrity of your data—to preserve without corruption whatever was transmitted or entered into the system, right or wrong, Windstream employs: • Intrusion Detection Systems (IDS) • Log Monitoring • Vulnerability Scanning • DDoS Protection • Web Application Firewall • Managed Firewall • Data Encryption
  • 10. AVAILABILITY Copyright 2015. All Rights Reserved.10 Data availability can be affected by a malfunctioning computer or device, malicious intrusion, natural phenomena like wind or water, or human causes, accidental or deliberate. All Windstream security policies and procedures, from the network to the managed service contribute to data availability, protecting you to the level you require from: • Physical or virtual server failure • Physical harm to, or natural disaster impacting the data center • Malware, DDoS, or other malicious attack • Unauthorized access to data Additional tools enabling data availability include: • Managed Firewall • Managed Anti-Virus / Anti-Malware • Global Load Balancing
  • 11. A COMPLETE SECURITY PORTFOLIO Copyright 2015. All Rights Reserved.11 Backed by policies and procedures that adhere to the CIA security policies model, Windstream custom delivers security solutions designed to meet your individual business needs, including: Business Continuity Managed Remote Backup DRaaS Wireless 3G/4G Backup IaaS Redundant Circuitry Managed Storage/Security  Managed Firewall  Operating System Hardening  Intrusion Detection  DDoS Mitigation  Log Management  Web Application Firewall  Threat Management  Vulnerability Scanning  Monitoring  VPN Services  Multi-factor Authentication  Physical Data Center Security  Anti-virus / Anti-Malware Services  Email Security  Global Load Balancing
  • 12. Copyright 2015. All Rights Reserved.12 The highest security, customized for your network, your data, and your business WINDSTREAM CLOUD SECURITY