Download presentation
Presentation is loading. Please wait.
1
Identity and access management of cloud security
Katho Yadou
2
User Centric Authentication
Two – Factor Authentication Something you know Something you have. (Token, card, Finger, Phone, etc..) Multiple – Factor Authentication Your connection ( Unique Session Identification) Your location (Geographically) The role / rights you have (Group member i.e. consultant employee) A valid Gateway / Point of entry. Time of the day (doors are open only between i.e. 8am and 10pm) etc.
3
Evolution In Security Tech Evolution Mainframe Client / Server Cloud
Security Evolution Malware Vandalism
4
Security control are out of sync with the landscape and threats
Content and transactions Migration to cloud Legacy Process Gaps Threat Landscape Ecrime State Sponsored Technology Landscape Byod Always on network
5
Cloud: The Re – Centralization of Computing
Today’s De – Centralized Model Cloud – Based Re – Centralized Model
6
Three Types of Security Transformation
Security Practitioner Cloud Provider Security Vendor
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.