SlideShare une entreprise Scribd logo
1  sur  25
Cloud Security
Presented By
Devyani Vaidya
What is Cloud Security?
Cloud
• Agility
• Self-service
• Scale
• Automation
Security
• Gate-keeper
• Standards
• Control
• Centralized
Cloud Security is security principles applied to protect data,
applications and infrastructure associated within the Cloud
Computing technology.
Market Analysis
What market size are we talking about
Market Size:
2012 : US $425.4 Million
2013 : US $629.6 Million
2014 : US $963.4 Million
Global Cloud Security Market Growth
Analysis 2012-2014 (US$ million)
425.4
629.6
963.4
0
200
400
600
800
1000
1200
2012 2013 2014
Global Geographies
• The Americas
• Europe, the Middle East and Africa; European
Medicines Evaluation Agency. (EMEA)
• Asia Pacific (APAC)
Global Cloud Security Market in
Percentage
2012
Global
Cloud
Security
Market
Global
Security
Market
4
96
2014
Global
Cloud
Security
Market
Global
Security
Market
End-Users/Customers
• Large Enterprises
• Government Agencies
• Cloud Service Providers (CSPs)
• Medium-sized Enterprises
Global Cloud Security Market by End-
User Segmentation
38
31
17
9
5 Large Enterprises
Government Agencies
Cloud Service Providers
Medium Enterprises
Other/Third Party Vendors
Trends associated with Cloud Security
• Increasing Partnerships between CSPs and Security
Solution Providers Expected
• Increasing Emergence of Cloud Service-specific Security
Solution Providers
• Identity Management and Encryption to Remain the
Top Cloud Security Solutions Offered
• Increasing Availability of Cloud Security Solutions for
Small and Medium-sized Businesses (SMBs)
• Emergence of Strong Cloud Security Standard and
Guidelines
Why is Cloud Security Important
• Increasing Usage of Cloud Services in Non-
traditional Sectors
• Growing Adoption of Cloud Services in Government
Departments
• Rise in Cloud Service-specific Attacks
• Growing Usage of Cloud Services for Critical Data
Storage
• Rise in Employee Mobility
What are the challenges?
• CSPs believe that Security is End-users’ Issue
• Lack of Awareness about Cloud Security
• Inconsistent Network Connection Issues
• Lack of Proper Cloud Security Standards
What End-users/customers expect
from Cloud Security
• Strong Overall Security Offered
• Suite of Security Solutions Offered
• Encryption Key Management Features Offered
• Availability of Fine Granular Control
McAfee Inc.
• McAfee Inc., founded in 1987, is a leading provider
of network security solutions. The company is
listed on the New York Stock Exchange and is based
in California, US. The company provides security
services across the globe. The company’s security
products are for sectors such as Data Protection,
Email and Web Security, Endpoint Protection,
Mobile Security, Network Security, Risk and
Compliance, Security Software as a Service
(Security SaaS), and Security Management.
McAfee acquired by Intel
• On August 19, 2010 Intel acquired McAfee for
$7.68 billion in a cash deal. In FY2010, the
company reported total revenue of US$2.1
billion. However, in FY2010, the revenue from
the Cloud Security segment was low, at only
around US$25 million.
McAfee Cloud Security Program
McAfee Security-as-a-Service delivers complete
endpoint, email, web, and network protection through
the cloud, saving your IT department time, effort, and
costs. As part of our Security Connected framework
that delivers comprehensive security and integrated
management, McAfee Security SaaS leverages the
power of the cloud to help organizations realize faster
time-to-protection to secure their business.
McAfee SaaS Includes
• McAfee SaaS Email Protection
• McAfee SaaS Integrated Suites
• McAfee SaaS Endpoint Protection
• McAfee SaaS Vulnerability Management
• McAfee SaaS Web Protection
SWOT Analysis
Strengths
• The company’s cloud access control
solution allows control over the
entire lifecycle of cloud access
security, providing solutions such
as SSO, provisioning, strong
authentication and audit.
• Its solution helps in auto-
synchronization of identity data
between enterprise and cloud
applications for change
management scenarios
• Centralized management and
reporting are provided through
integration with the McAfee ePolicy
Orchestrator platform
Weakness
• Despite being an established
traditional security solution provider
with a wide geographic presence, the
company is slow to gain share in the
cloud security space
• Some pure-play companies such as
Symplified are witnessing much
higher growth in the Cloud Identity
Management market
• Some of its competitors, such as
Trend Micro, provides better key
management options/features
SWOT Analysis
Opportunities
• The company has a very long
list of partners from various
geographic locations, which
it can leverage to expand
• It recently launched its cloud
security platform, which
secures all content and data
traffic including email, web
and identity traffic; thus,
providing a unified solution
Threats
• Threat from pure-play vendors
such as Zscaler, Vshield from
VMware and Symplified that
have high growth rates
• Threat to its market share from
other traditional security
solution providers that are
expected to aggressively push
for expansion in this market
Some Key Competitors
• Trend Micro SecureCloud, and Trend Micro Deep
Security
• CA Access Control, and CA Identity Manager
• Symplified Mobile Edition, Symplified Access
Manager, and Symplified Identity Manager
• CloudPassage cloud server exposure
management
• Okta Cloud Services Platform
• GuardTime Keyless Signature Server
• CipherCloud Data Protection for Salesforce
Major Customers
• AT&T Global Network Services Client
• Citrix
• Microsoft VPN
• Juniper Networks
• Verizon
Other Information
Knowledge base Website
https://kc.mcafee.com/corporate/index?page=home
Security as a service by Mcafee
http://www.mcafee.com/us/products/security-as-a-
service/index.aspx
Netflix
Netflix is a commercial entertainment web based
company, by online subscriptions they provide website
TV shows and movies to subscribers with the online
streaming technology and also send DVD’s using US
mail service.
In 2010, Netflix started migrating its infrastructure to
Amazon EC2. At present Netflix has over 1 Petabyte of
data stored on Amazon, and the data are sent to
content delivery networks such as Akamai, Limelight
etc., that feed the content to local ISPs.
What Netflix is now?
• 24+ million members globally
• Streaming in 47 countries
• Watch on more than 700 Devices
• 33% of US peak evening Internet traffic
Why Did Netflix moved to Cloud
• Netflix is growing and adding subscribers at an
unprecedented rate. The company is expanding into
global markets, and an ever-growing array of Netflix-
ready devices is spurring streaming service to even
faster growth. At the heart of Netflix technology is the
Cloud Computing platform, which serves as the
distributed systems foundation for Netflix application
development, and powers the movie viewing
experience for millions of customers every day.
Netflix Cloud Security Strategy
• New deployments and upgrades
• Capacity planning & procurement
• Key management
• Detecting instance changes
• Application ownership, management
• Patching, updating
• Availability, in a failure-prone environment
• Embedding security controls
• Least privilege enforcement
• Testing/auditing for conformance
• Consistency, conformity in build and launch
• Continuous, aggressive monitoring, testing
Questions??
If you are interested in this presentation, I am
uploading this on slideshare.com. You can find
it by searching my name Venkatesh Chary.
Below is link for reference:

Contenu connexe

Tendances

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Tendances (20)

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
What is Zero Trust
What is Zero TrustWhat is Zero Trust
What is Zero Trust
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Cloud security
Cloud securityCloud security
Cloud security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 

En vedette

En vedette (19)

Q1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and BeyondQ1 2016 Open Source Security Report: Glibc and Beyond
Q1 2016 Open Source Security Report: Glibc and Beyond
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4Venture Scanner Artificial Intelligence 2016 Q4
Venture Scanner Artificial Intelligence 2016 Q4
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 
Venture Scanner Security Tech Report Q1 2017
Venture Scanner Security Tech Report Q1 2017Venture Scanner Security Tech Report Q1 2017
Venture Scanner Security Tech Report Q1 2017
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 

Similaire à cloud security ppt

Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
Adewole Shitta-bey
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
svanelderen
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
arun nalam
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
AlgoSec
 

Similaire à cloud security ppt (20)

EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Sing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald TangSing Tel - Designing security into datacenter - Gerald Tang
Sing Tel - Designing security into datacenter - Gerald Tang
 
Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...Security concerns of cloud migration and its implications on cloud-enabled bu...
Security concerns of cloud migration and its implications on cloud-enabled bu...
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04SoftLayer Value Proposition v1.04
SoftLayer Value Proposition v1.04
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 
Microsoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification StrategyMicrosoft Global Corporate Diversification Strategy
Microsoft Global Corporate Diversification Strategy
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Encloud en ppt 1
Encloud en ppt 1Encloud en ppt 1
Encloud en ppt 1
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 

Plus de Devyani Vaidya

Plus de Devyani Vaidya (18)

Bigtable a distributed storage system
Bigtable a distributed storage systemBigtable a distributed storage system
Bigtable a distributed storage system
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Underwater wirelesscommunication
Underwater wirelesscommunicationUnderwater wirelesscommunication
Underwater wirelesscommunication
 
Resource management
Resource managementResource management
Resource management
 
telephone directory
 telephone directory telephone directory
telephone directory
 
Data as a service
Data as a service Data as a service
Data as a service
 
Barcode technology
Barcode technologyBarcode technology
Barcode technology
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
Digital locker
Digital lockerDigital locker
Digital locker
 
Fuels saver system
Fuels saver systemFuels saver system
Fuels saver system
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Data warehousing
Data warehousingData warehousing
Data warehousing
 
Bluetooth secuirty issues
Bluetooth secuirty issuesBluetooth secuirty issues
Bluetooth secuirty issues
 
3D Password
3D Password3D Password
3D Password
 
3D Password ppt
3D Password ppt 3D Password ppt
3D Password ppt
 
Open and Close Door ppt
 Open and Close Door ppt Open and Close Door ppt
Open and Close Door ppt
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
History of Laptops ppt
History of Laptops pptHistory of Laptops ppt
History of Laptops ppt
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

cloud security ppt

  • 2. What is Cloud Security? Cloud • Agility • Self-service • Scale • Automation Security • Gate-keeper • Standards • Control • Centralized Cloud Security is security principles applied to protect data, applications and infrastructure associated within the Cloud Computing technology.
  • 3. Market Analysis What market size are we talking about Market Size: 2012 : US $425.4 Million 2013 : US $629.6 Million 2014 : US $963.4 Million
  • 4. Global Cloud Security Market Growth Analysis 2012-2014 (US$ million) 425.4 629.6 963.4 0 200 400 600 800 1000 1200 2012 2013 2014
  • 5. Global Geographies • The Americas • Europe, the Middle East and Africa; European Medicines Evaluation Agency. (EMEA) • Asia Pacific (APAC)
  • 6. Global Cloud Security Market in Percentage 2012 Global Cloud Security Market Global Security Market 4 96 2014 Global Cloud Security Market Global Security Market
  • 7. End-Users/Customers • Large Enterprises • Government Agencies • Cloud Service Providers (CSPs) • Medium-sized Enterprises
  • 8. Global Cloud Security Market by End- User Segmentation 38 31 17 9 5 Large Enterprises Government Agencies Cloud Service Providers Medium Enterprises Other/Third Party Vendors
  • 9. Trends associated with Cloud Security • Increasing Partnerships between CSPs and Security Solution Providers Expected • Increasing Emergence of Cloud Service-specific Security Solution Providers • Identity Management and Encryption to Remain the Top Cloud Security Solutions Offered • Increasing Availability of Cloud Security Solutions for Small and Medium-sized Businesses (SMBs) • Emergence of Strong Cloud Security Standard and Guidelines
  • 10. Why is Cloud Security Important • Increasing Usage of Cloud Services in Non- traditional Sectors • Growing Adoption of Cloud Services in Government Departments • Rise in Cloud Service-specific Attacks • Growing Usage of Cloud Services for Critical Data Storage • Rise in Employee Mobility
  • 11. What are the challenges? • CSPs believe that Security is End-users’ Issue • Lack of Awareness about Cloud Security • Inconsistent Network Connection Issues • Lack of Proper Cloud Security Standards
  • 12. What End-users/customers expect from Cloud Security • Strong Overall Security Offered • Suite of Security Solutions Offered • Encryption Key Management Features Offered • Availability of Fine Granular Control
  • 13. McAfee Inc. • McAfee Inc., founded in 1987, is a leading provider of network security solutions. The company is listed on the New York Stock Exchange and is based in California, US. The company provides security services across the globe. The company’s security products are for sectors such as Data Protection, Email and Web Security, Endpoint Protection, Mobile Security, Network Security, Risk and Compliance, Security Software as a Service (Security SaaS), and Security Management.
  • 14. McAfee acquired by Intel • On August 19, 2010 Intel acquired McAfee for $7.68 billion in a cash deal. In FY2010, the company reported total revenue of US$2.1 billion. However, in FY2010, the revenue from the Cloud Security segment was low, at only around US$25 million.
  • 15. McAfee Cloud Security Program McAfee Security-as-a-Service delivers complete endpoint, email, web, and network protection through the cloud, saving your IT department time, effort, and costs. As part of our Security Connected framework that delivers comprehensive security and integrated management, McAfee Security SaaS leverages the power of the cloud to help organizations realize faster time-to-protection to secure their business.
  • 16. McAfee SaaS Includes • McAfee SaaS Email Protection • McAfee SaaS Integrated Suites • McAfee SaaS Endpoint Protection • McAfee SaaS Vulnerability Management • McAfee SaaS Web Protection
  • 17. SWOT Analysis Strengths • The company’s cloud access control solution allows control over the entire lifecycle of cloud access security, providing solutions such as SSO, provisioning, strong authentication and audit. • Its solution helps in auto- synchronization of identity data between enterprise and cloud applications for change management scenarios • Centralized management and reporting are provided through integration with the McAfee ePolicy Orchestrator platform Weakness • Despite being an established traditional security solution provider with a wide geographic presence, the company is slow to gain share in the cloud security space • Some pure-play companies such as Symplified are witnessing much higher growth in the Cloud Identity Management market • Some of its competitors, such as Trend Micro, provides better key management options/features
  • 18. SWOT Analysis Opportunities • The company has a very long list of partners from various geographic locations, which it can leverage to expand • It recently launched its cloud security platform, which secures all content and data traffic including email, web and identity traffic; thus, providing a unified solution Threats • Threat from pure-play vendors such as Zscaler, Vshield from VMware and Symplified that have high growth rates • Threat to its market share from other traditional security solution providers that are expected to aggressively push for expansion in this market
  • 19. Some Key Competitors • Trend Micro SecureCloud, and Trend Micro Deep Security • CA Access Control, and CA Identity Manager • Symplified Mobile Edition, Symplified Access Manager, and Symplified Identity Manager • CloudPassage cloud server exposure management • Okta Cloud Services Platform • GuardTime Keyless Signature Server • CipherCloud Data Protection for Salesforce
  • 20. Major Customers • AT&T Global Network Services Client • Citrix • Microsoft VPN • Juniper Networks • Verizon Other Information Knowledge base Website https://kc.mcafee.com/corporate/index?page=home Security as a service by Mcafee http://www.mcafee.com/us/products/security-as-a- service/index.aspx
  • 21. Netflix Netflix is a commercial entertainment web based company, by online subscriptions they provide website TV shows and movies to subscribers with the online streaming technology and also send DVD’s using US mail service. In 2010, Netflix started migrating its infrastructure to Amazon EC2. At present Netflix has over 1 Petabyte of data stored on Amazon, and the data are sent to content delivery networks such as Akamai, Limelight etc., that feed the content to local ISPs.
  • 22. What Netflix is now? • 24+ million members globally • Streaming in 47 countries • Watch on more than 700 Devices • 33% of US peak evening Internet traffic
  • 23. Why Did Netflix moved to Cloud • Netflix is growing and adding subscribers at an unprecedented rate. The company is expanding into global markets, and an ever-growing array of Netflix- ready devices is spurring streaming service to even faster growth. At the heart of Netflix technology is the Cloud Computing platform, which serves as the distributed systems foundation for Netflix application development, and powers the movie viewing experience for millions of customers every day.
  • 24. Netflix Cloud Security Strategy • New deployments and upgrades • Capacity planning & procurement • Key management • Detecting instance changes • Application ownership, management • Patching, updating • Availability, in a failure-prone environment • Embedding security controls • Least privilege enforcement • Testing/auditing for conformance • Consistency, conformity in build and launch • Continuous, aggressive monitoring, testing
  • 25. Questions?? If you are interested in this presentation, I am uploading this on slideshare.com. You can find it by searching my name Venkatesh Chary. Below is link for reference: