SlideShare une entreprise Scribd logo
1  sur  29
cloud security webinar Jean-François Audenard – Cloud Security Advisor November 10, 2011
our agenda ,[object Object],[object Object],[object Object],[object Object]
context
our customers are targets CISCO – Global Threat Report – 2Q2011 © Paty Wingrove - Fotolia.com
Cloud concentrate everything ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© boulevard - Fotolia.com
threats follows the data enterprise Internal network/IT Cloud Services Providers (CSP) threats / attackers threats
expectations
Cloud security is a must have
an expectation AND a business accelerator ,[object Object],highly secure cloud services : A business booster
compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© Scott Maxwell - Fotolia.com
question : what really changes with cloud ? ,[object Object],[object Object],[object Object],[object Object],[object Object],… the cloud’s economies of scale and flexibility are both a friend and a foe from a security point of  view. The massive concentrations of resources and data present a  more attractive target to attackers, but cloud-based defenses can be more robust, scalable  and cost-effective… Source: Enisa   answer : Cloud require security excellence & associated transparency
building & maintaining trust © Ben Chams - Fotolia.com
trust must be both external & internal internal stakeholders enterprise Cloud Executives Business Units Risk Managers, CISO Corporate IT Employees Cloud providers regulation/standards bodies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],government specifics regulations standards
ensures data protection data classification & rights assignation private networks, encryption & strong authentication access control, rights management, encryption encryption, asset management crypto-shredding, secure deletion, content discovery create transfer store use archive destroy application security, logical controls, activity monitoring
appropriate level of engagement Cloud service provider management customer’s management responsibilities between parties datacenter servers & network Hypervisor (VMM) VM operating systems middleware applications IaaS PaaS SaaS increased criticality high-level of shared resources    increased responsibilities for the Cloud Service Provider
Cloud models & security public Cloud for enterprises community cloud private cloud hybrid cloud shared infrastructure dedicated infrastructure/staff/processes security is under customer’s control security controlled by the provider Internal risk & compliance still apply here !
implementation rules ,[object Object],[object Object],[object Object],[object Object],© lilufoto - Fotolia.com
Orange cloud services
our cloud security development lifecycle ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],S ecurity  R isk  A ssessment S ecurity  I mplementation  A ssistance S ecurity  R eviews S ecurity  P enetration  T ests T0 T3 T2 T-1 R isks  M itigation  P lan H igh- L evel  R isks  A ssessment Continuous improvement (PDCA) L egal  O bligations  A ssessment
portfolio Infrastructure as a Service Software as a Service IT infrastructure as a Service Security  as a Service Collaboration as a Service Real-Time applications as a Service Back-up and Storage  as a Service Flexible  Computing Premium Messaging Protection Suite Web Protection Suite Unified Collaboration (B2GaaS) Fleet Management Network IVR Business Store Flexible Computing Private 2011 H2 2010 now VPN Galerie IT Plan Contact Center  as a Service Cloud-ready Networking Business VPN Business  Acceleration Flexible Computing Business Telephony Hosted Exchange Orange API Private Applications Store Business Together with Microsoft – Online Services  Flexible SSL Smartphone management Application & Content  Delivery Networking
Web Protection Suite ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],powered by
flexible SSL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cloud & security are best friends © laurent hamels - Fotolia.com
Thank you !
Cloud vulnerabilities are an opportunity ? ? ? ? ? ? ? © Yuri Arcurs - Fotolia.com
Cloud specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities
Direct vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Yes : Thanks to cloud-specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities Indirect vulnerabilities Inability to monitor traffic Limited network zoning Single point of failure Forbidden network vulns scans
Indirect vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© brodtcast - Fotolia.com

Contenu connexe

Tendances

Vodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone UK
 
the new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any devicethe new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any deviceOrange Business Services
 
Orange Group Overview
Orange Group OverviewOrange Group Overview
Orange Group OverviewOsama Shawky
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09scharter
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentationcummins1
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...Thierry Coupaye
 
Orange Business Services: Cloud A Multinational B2B Perspective
Orange Business Services:  Cloud A Multinational B2B PerspectiveOrange Business Services:  Cloud A Multinational B2B Perspective
Orange Business Services: Cloud A Multinational B2B Perspectiveitnewsafrica
 
the age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacificthe age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia PacificOrange Business Services
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventMatteo Masi
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessOrange Business Services
 
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperDWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperIDATE DigiWorld
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of itDaniel Chiossi
 
Industry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesIndustry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesHuawei Enterprise
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09meyersb1
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full ReportAssespro Nacional
 

Tendances (20)

Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Vodafone - Agile Connectivity
Vodafone - Agile ConnectivityVodafone - Agile Connectivity
Vodafone - Agile Connectivity
 
Vodafone cx
Vodafone cxVodafone cx
Vodafone cx
 
the new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any devicethe new workspace: freedom to work whenever, wherever, on any device
the new workspace: freedom to work whenever, wherever, on any device
 
Orange Group Overview
Orange Group OverviewOrange Group Overview
Orange Group Overview
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
Towards the extinction of mega data centres? To which extent should the Clou...
 Towards the extinction of mega data centres? To which extent should the Clou... Towards the extinction of mega data centres? To which extent should the Clou...
Towards the extinction of mega data centres? To which extent should the Clou...
 
Orange Business Services: Cloud A Multinational B2B Perspective
Orange Business Services:  Cloud A Multinational B2B PerspectiveOrange Business Services:  Cloud A Multinational B2B Perspective
Orange Business Services: Cloud A Multinational B2B Perspective
 
the age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacificthe age of cloud: private cloud, SaaS and the future in Asia Pacific
the age of cloud: private cloud, SaaS and the future in Asia Pacific
 
Cisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC eventCisco Mobility - IBM & IDC event
Cisco Mobility - IBM & IDC event
 
Werkplek Van De Toekomst
Werkplek Van De ToekomstWerkplek Van De Toekomst
Werkplek Van De Toekomst
 
SDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your businessSDN/NFV: Create a network that’s ahead of your business
SDN/NFV: Create a network that’s ahead of your business
 
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - JasperDWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
DWS15 Connected Things Forum - Guest Keynote - Paul-Edouard LAUNAY - Jasper
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of it
 
Industry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for EnterprisesIndustry's first ICT Converged Agile gateway for Enterprises
Industry's first ICT Converged Agile gateway for Enterprises
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
[CompTIA] 4th Annual Trends in Cloud Computing - Full Report
 

En vedette

[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café previewOrange Business Services
 
communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange businessOrange Business Services
 
[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair previewOrange Business Services
 
Solutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceSolutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceOrange Business Services
 
[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flowOrange Business Services
 
[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunityOrange Business Services
 
improving outcomes with connected healthcare
improving outcomes with connected healthcareimproving outcomes with connected healthcare
improving outcomes with connected healthcareOrange Business Services
 

En vedette (11)

le nouvel espace de travail
le nouvel espace de travaille nouvel espace de travail
le nouvel espace de travail
 
M2M is smart
M2M is smartM2M is smart
M2M is smart
 
[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview[FR] BYOD et sécurité des mobiles le temps d’un café preview
[FR] BYOD et sécurité des mobiles le temps d’un café preview
 
communications unifiées - orange business
communications unifiées - orange businesscommunications unifiées - orange business
communications unifiées - orange business
 
[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview[FR] la normalisation du cloud en un éclair preview
[FR] la normalisation du cloud en un éclair preview
 
Solutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a ServiceSolutions de collaboration à la demande: Business Together as a Service
Solutions de collaboration à la demande: Business Together as a Service
 
[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow[infographic] multichannel CRM: going with the flow
[infographic] multichannel CRM: going with the flow
 
[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity[infographic] high-growth markets: diversity in opportunity
[infographic] high-growth markets: diversity in opportunity
 
women and mobile - enriching lives
women and mobile - enriching liveswomen and mobile - enriching lives
women and mobile - enriching lives
 
improving outcomes with connected healthcare
improving outcomes with connected healthcareimproving outcomes with connected healthcare
improving outcomes with connected healthcare
 
Get well, stay well with m-health
Get well, stay well with m-healthGet well, stay well with m-health
Get well, stay well with m-health
 

Similaire à Cloud Computing Security

Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgeAlert Logic
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunalKashyap Kunal
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxBabatundeAbioye2
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelinesSrishti Ahuja
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)Glenn Ambler
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 

Similaire à Cloud Computing Security (20)

Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud Age
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
ShareResponsibilityModel.pptx
ShareResponsibilityModel.pptxShareResponsibilityModel.pptx
ShareResponsibilityModel.pptx
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
Cloud Security using NIST guidelines
Cloud Security using NIST guidelinesCloud Security using NIST guidelines
Cloud Security using NIST guidelines
 
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
glenn_amblercloud_security_ncc_event_22-may-2012_v1 (9)
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 

Plus de Orange Business Services

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOrange Business Services
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Orange Business Services
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificOrange Business Services
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? Orange Business Services
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificOrange Business Services
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific Orange Business Services
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryOrange Business Services
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016Orange Business Services
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...Orange Business Services
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Orange Business Services
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSEOrange Business Services
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Orange Business Services
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logisticsOrange Business Services
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaOrange Business Services
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of miningOrange Business Services
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingOrange Business Services
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?Orange Business Services
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybrideOrange Business Services
 

Plus de Orange Business Services (20)

OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risksOT-IT convergence and IoT: innovate at scale and mitigate cyber risks
OT-IT convergence and IoT: innovate at scale and mitigate cyber risks
 
Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange Asia-Pacific: smart mobility for the public sector with Orange
Asia-Pacific: smart mobility for the public sector with Orange
 
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-PacificDriving Forward Digital Technology and the Automotive Industry in Asia-Pacific
Driving Forward Digital Technology and the Automotive Industry in Asia-Pacific
 
How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy? How to deliver faster AI insights while safeguarding data security and privacy?
How to deliver faster AI insights while safeguarding data security and privacy?
 
Building the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-PacificBuilding the connected Supply Chain – how digital is transforming Asia-Pacific
Building the connected Supply Chain – how digital is transforming Asia-Pacific
 
How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific How digital is transforming financial services in Asia Pacific
How digital is transforming financial services in Asia Pacific
 
Digitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industryDigitally transforming the Asia Pacific building construction industry
Digitally transforming the Asia Pacific building construction industry
 
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016World café   restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
World café restitution atelier le manager digital 3.0 villageby-ca_12_07_2016
 
World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...World café people and digital supports ppt interventions plénières villageby_...
World café people and digital supports ppt interventions plénières villageby_...
 
Orange Data Centre and Cloud
Orange Data Centre and CloudOrange Data Centre and Cloud
Orange Data Centre and Cloud
 
Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?Skype Entreprise, tremplin de la transformation digitale ?
Skype Entreprise, tremplin de la transformation digitale ?
 
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
[FR] Cercle Premier RSE : COP 21, comment le digital peut aider ? #CercleRSE
 
Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...Internet des Objets et Big data pour les assurances : la révolution est en ma...
Internet des Objets et Big data pour les assurances : la révolution est en ma...
 
Digitally transforming transport and logistics
Digitally transforming transport and logisticsDigitally transforming transport and logistics
Digitally transforming transport and logistics
 
Smart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital IndiaSmart cities - leading the way towards Digital India
Smart cities - leading the way towards Digital India
 
Digging deep - the digital transformation of mining
Digging deep - the digital transformation of miningDigging deep - the digital transformation of mining
Digging deep - the digital transformation of mining
 
Retail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shoppingRetail therapy - the digital transformation of shopping
Retail therapy - the digital transformation of shopping
 
[White Paper] Are containers the future ?
[White Paper] Are containers the future ?[White Paper] Are containers the future ?
[White Paper] Are containers the future ?
 
[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?[infographie] Comment optimiser la gestion des déchets ?
[infographie] Comment optimiser la gestion des déchets ?
 
[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride[infographie] une connectivité flexible grâce au réseau hybride
[infographie] une connectivité flexible grâce au réseau hybride
 

Dernier

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Dernier (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Cloud Computing Security

  • 1. cloud security webinar Jean-François Audenard – Cloud Security Advisor November 10, 2011
  • 2.
  • 4. our customers are targets CISCO – Global Threat Report – 2Q2011 © Paty Wingrove - Fotolia.com
  • 5.
  • 6. threats follows the data enterprise Internal network/IT Cloud Services Providers (CSP) threats / attackers threats
  • 8. Cloud security is a must have
  • 9.
  • 10.
  • 11.
  • 12. building & maintaining trust © Ben Chams - Fotolia.com
  • 13.
  • 14. ensures data protection data classification & rights assignation private networks, encryption & strong authentication access control, rights management, encryption encryption, asset management crypto-shredding, secure deletion, content discovery create transfer store use archive destroy application security, logical controls, activity monitoring
  • 15. appropriate level of engagement Cloud service provider management customer’s management responsibilities between parties datacenter servers & network Hypervisor (VMM) VM operating systems middleware applications IaaS PaaS SaaS increased criticality high-level of shared resources  increased responsibilities for the Cloud Service Provider
  • 16. Cloud models & security public Cloud for enterprises community cloud private cloud hybrid cloud shared infrastructure dedicated infrastructure/staff/processes security is under customer’s control security controlled by the provider Internal risk & compliance still apply here !
  • 17.
  • 19.
  • 20. portfolio Infrastructure as a Service Software as a Service IT infrastructure as a Service Security as a Service Collaboration as a Service Real-Time applications as a Service Back-up and Storage as a Service Flexible Computing Premium Messaging Protection Suite Web Protection Suite Unified Collaboration (B2GaaS) Fleet Management Network IVR Business Store Flexible Computing Private 2011 H2 2010 now VPN Galerie IT Plan Contact Center as a Service Cloud-ready Networking Business VPN Business Acceleration Flexible Computing Business Telephony Hosted Exchange Orange API Private Applications Store Business Together with Microsoft – Online Services Flexible SSL Smartphone management Application & Content Delivery Networking
  • 21.
  • 22.
  • 23. Cloud & security are best friends © laurent hamels - Fotolia.com
  • 25. Cloud vulnerabilities are an opportunity ? ? ? ? ? ? ? © Yuri Arcurs - Fotolia.com
  • 26. Cloud specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities
  • 27.
  • 28. Yes : Thanks to cloud-specific vulnerabilities On-demand self-service Ubiquitous network access Resource polling Rapid elasticity Measured service NIST Virtualization Hyper-jacking VM-Escape VM sprawl VM Theft Direct vulnerabilities Indirect vulnerabilities Inability to monitor traffic Limited network zoning Single point of failure Forbidden network vulns scans
  • 29.

Notes de l'éditeur

  1. CISCO – Global Threat Report – 2Q2011 http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_global_threat_report_2q2011.pdf DUQU http://www.schneier.com/blog/archives/2011/10/new_malware_duq.html http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet_research.pdf NITRO http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf
  2. La menace suit à la trace les données, quelque soit leur localisation, dans le cloud ou sur les périphériques mobiles….
  3. TODO : Titre à retravailler/préciser….
  4. presentation title
  5. Exemple : SecuityInTTM pour les prohets de conception de service Exemple : Un qui n’a pas de SecuerityInttM TODO: Enlever slides « Recommamdations » et le
  6. presentation title