Why Critical Data is More Secure FOR LIFE SCIENCES in the Cloud

Slides:



Advertisements
Similar presentations
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Advertisements

Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
The Ultimate Backup Solution.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Doc Document Management Systems For Manufacturing Industry Infocrew Solutions Pvt.Ltd.
INTRODUCTION TO CLOUD COMPUTING Cs 595 Lecture 5 2/11/2015.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
INFORMATION SYSTEM AND ELECTRONIC COMMERCE GST-5083 Case Title : Should Businesses Move to the Cloud NoNameStudent IDProgram 1SAYNUL ISLAMP13D092PMBA 2DATO.
Built on the Powerful Microsoft Azure Platform, Nimble Schedule Streamlines and Automates Scheduling with Cloud-Based Mobile Services MICROSOFT AZURE ISV.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Secured Hosting Services Frank Adams / Tom Carter.
November 2009 Network Disaster Recovery October 2014.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
 Cloud Computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.  Your software applications.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
IT Infrastructure Chap 1: Definition
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Best Practices for a Successful SaaS Implementation Joseph H. Aston, Oracle Project Lead Velocity Technology Solutions September 18, 2015.
Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright 2013 FairPoint Communications Network safety and security – Protecting your communications resources Karen Romano, Vice President, Government.
MarketsandMarkets Presents Public/Private Cloud Storage Market worth $46.8 Billion by 2018
Avtec Inc Virtualization - Securely Moving to the Cloud.
Onsite CRM Security
Clouding with Microsoft Azure
Payment Card Industry (PCI) Rules and Standards
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
Work on the Fly Hosted Solutions for Timeslips Customers
A Path to the Community Cloud Making Above Campuses Services a Reality
Digital Stewardship Curriculum
Centralized Management for Barracuda Networks products
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Utilize Internal Data via Mobile Business Apps
Cloud Increases Publishing Software Availability and Makes Access Efficient Around the World MINI-CASE STUDY “The flexibility and efficiency within Azure.
IOT Critical Impact on DC Design
Company Bart & Associates, Inc. Headquarters McLean, Virginia Industry
What is Cloud Computing - How cloud computing help your Business?
DIRECTOR OF CLOUD SERVICES
Global Financial Close InfoMoksha PowerClose
PanAust: Launching New Mining Projects Quickly and Efficiently with SAP® Business Suite powered by SAP HANA® Company PanAust Limited Headquarters Brisbane,
Couchbase Server is a NoSQL Database with a SQL-Based Query Language
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
Why should You Opt for Private Cloud service?
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Zadara™ Virtual Private Storage Arrays™: High Performance, High Availability NAS & SAN by the Hour, with Private, Dedicated Resources MICROSOFT AZURE.
Data Security for Microsoft Azure
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Selling IIoT Solutions to Systems Integrators
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Nero Blanco Service Offering – Disaster Recovery as a Service
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Amazon Web Services.
For the MVHS Cyber Defense CLub
Capitalize on Your Business’s Technology
SQL Server on Amazon Web Services
SQL Server on Amazon Web Services
Cloud Computing for Wireless Networks
Presentation transcript:

Why Critical Data is More Secure FOR LIFE SCIENCES in the Cloud Jeff Miller Chief Technologist, Avid Solutions Inc. 3:00pm – 3:45pm March 14, 2017

Find out more at www.avidsolutionsinc.com. A fast-growing system integrator specializing in industrial automation and information solutions. Identifies and selects best-in-class platforms, designs and implements systems, and provides verification and validation documentation and services. Turnkey capabilities include UL panel fabrication and installation and system commissioning.  Exceptional depth in PLC, HMI, DCS, and information applications in the following process industries: chemical, food & beverage, life sciences, power generation and pulp & paper. Find out more at www.avidsolutionsinc.com.

Background Information Jeff Miller Background Information Kunia Operations Center in Hawaii Worked as cryptologist at Kunia Regional SIGINT Operations Center in Hawaii May 2013 - NSA employee Edward Snowden incident Breach revealed system failure and lack of security Information is not safe in private data centers Public secure data centers are shifting the paradigm

Physical Security Public Data Centers Access is tightly controlled Secured by: Biometric Scanners Intrusion Detection Systems Two-factor Security Badge Readers Video Surveillance Mantraps All hard drives are destroyed after decommissioning via magnets and shredding Restricted Access Mantrap

Non-Dedicated Resources In traditional data centers – staff has many roles Problems can get overlooked Level of distraction/Lack of attention In public data centers – staff is on hand 24/7 Identifying failed hardware Leveraging technology that predicts failures Regularly executing proper system maintenance System Maintenance

Data Integrity Traditional Data Centers Rely on manual backups and local RAID Ask integrators for programs from projects completed years earlier Public Data Centers Data is stored across servers, rooms and containers Data is replicated across different geographic locations Data can move; reducing network latency

Data Availability Traditional Data Centers Power outages cause problems with servers, storage arrays and routing systems Generators are used for long term outages, but are not designed to keep data centers running Public Data Centers Always on – powered by multiple sources Cooling systems only work on necessary components – saving energy Generator Cooling System

Data Security Public Data Centers Data is encrypted in transit and at rest So secure it is approved by the NSA to encrypt Top Secret information Data separated by: Customer Database Separate Networking Resources Network traffic directed to specific hosts

Summary and Conclusions But, as Amazon senior vice president of web services Andy Jassy told Fortune Magazine recently, news of Amazon's selection by the CIA gave other security-conscious companies cover to follow suit. "They would say 'well, if the security and performance is good [enough] for the CIA, then it's probably good enough for us’," Jassy said. The future is the cloud - embrace it like a soft fluffy pillow.

Jeff Miller Chief Technologist Avid Solutions Inc. jmiller@avidsolutionsinc.com Direct Line 919.228.6637