21. Cloud Computing: Models Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee User … … … The Internet
22. Identity in the Cloud: Enterprise Case Enterprise Data Storage Service Office Apps On Demand CPUs Printing Service Cloud Provider #1 Cloud Provider #2 Internal Cloud CRM Service … Service 3 Backup Service ILM Service Service Service Service Business Apps/Service Employee … … … The Internet Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Identity & Credentials Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit Authentication Authorization Audit User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning User Account Provisioning/ De-provisioning PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information PII Data & Confidential Information IAM Capabilities and Services Can be Outsourced in The Cloud …
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
Notes de l'éditeur
A Break in the Clouds: Towards a Cloud Definition L.M. Vaquero, L. Rodero-Merino, J. Cáceres, M. Lindner. ACM Computer Communication Reviews. 2009 http://reservoir.cs.ucl.ac.uk/twiki/pub/Reservoir/PublicationsPage/CloudDefinitionPaper.pdf
Security Solutions - Require industry-leading technology, products, partnerships and services. We reduce complexity, risk, and cost by combining expert knowledge, proven methodologies and global resources to achieve better business outcomes Security Innovation- Leader in financial interchange and critical infrastructure security, policy management, encryption, Key Management, and risk mitigation Global Scale & Reach - Ability to provide low-cost/high-quality solution delivery offerings across the world Flexible Technology - The industry’s broadest portfolio of products, services and solutions Collaborative Expertise - Talented people with deep security knowledge and decades of technical experience HP Security solutions include HP products, selected partner products and HP services. These product offerings extend the value of your enterprise and enable business outcomes for your business. Examples include continuity of your manufacturing, your insurance and banking business operations, and being able pass your SOX or GLBA or PCI audits for compliance. Protect resources: - HP has multiple OS platforms with the highest level of certification providing maximum pro-active protection - HP Software’s Configuration and patch management provide continuous protection in changing environment - Enterprise Log Management collects and monitors the IT infrastructure for security issues and provides forensic evidence in the case of problems Protect data - Encryption of critical data at rest, in use or in motion increases protection - Examples of data protection include encryption in HP-UX, HP StorageWorks LT-O4 Tape, and use of our HP Compliance Log Warehouse product for proactive security management (to alert on data issues), and our linkage to selected partners This capability extends from servers to desktops and printers, with focused Key Management Provide validation - Validation at necessary audit points enables audit trails for compliance to industry regulations - Example : HP Compliance Log Warehouse provides compliance reports for a wide range of regulatory requirements, SOX, GLBA, HIPAA, PCI - Future integration of encryption and Key Management across an organization will provide end-to-end protection These technologies and the HP Services Information Security Service Management methodology based on industry standards are used to deliver a solution that includes HP Products, Partner products and incorporates a customer’s people and process needs into a complete solution. Protecting the security of your gear and your data should be as simple as using an ATM card. Basic principles HP learned a long time ago in protecting PINS and information about money moving through networks, now protect your health data, your systems and your future. Choose the right solution from HP’s broad portfolio—from desktop to data center With HP’s proven innovation: Protect your resources Protect all your data Provide validation and stay compliant
HP is uniquely positioned to deliver Cloud Assure due to our experience and success delivering SaaS. We have learned quite a few lessons as a SaaS provider over 9 years to more than 700 customers around the correct practices to ensure our customer’s experience, that are reflected in our architecture, application, and processes. Our Cloud Assure offering leverages HP’s industry-leading portfolio covering security, performance, and availability while delivering on the industry’s leading SLAs for SaaS. HP SaaS has also developed a unique expertise as well in providing guidance to our customers to ensure their end-user’s experience, with a special expertise around web applications built over more then a decade.