Download presentation
Presentation is loading. Please wait.
Published byDonald Lidstone Modified over 10 years ago
1
SECURING THE CLOUD IN A REGULATED WORLD www.onlinetech.comCopyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Indianapolis Data Connectors Thursday, August 21, 2014
2
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 WHO NEEDS CLOUD SECURITY?
3
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 CLOUD TIPPING POINT SURPASSED http://itknowledgeexchange.techtarget.com/cloud-computing-enterprise/is-a-new-journey-needed-for-business-critical-applications/
4
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 2013 DATA BREACHES 30% INCREASE IN THE NUMBER OF DATA BREACHES VS 2012 Identity Theft Research Center (http://www.idtheftcenter.org/)
5
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 AVERAGE BREACH COST Ponemon Institute: 2013 Cost of Data Breach Study
6
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Continuous Compliance Defense-in-depth Security Enterprise-Class Data Protection SECURE CLOUD STRATEGIES
7
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 CONTINUOUS COMPLIANCE Culture of continuous compliance Auditor partnership Super-Audit Transparency Goal: Easing compliance burden for ourselves and clients in regulated spaces
8
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 POLL: WORST SECURITY THREAT? People Process Technology
9
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 POLL: WORST SECURITY THREAT? People Process Technology ALL OF THE ABOVE
10
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 HOLISTIC APPROACH TO SECURITY peopletechnology process
11
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 HOLISTIC APPROACH TO SECURITY
12
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 SECURITY: PEOPLE Train staff Train business associates
13
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 SECURITY: PROCESS
14
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 SECURITY: TECHNOLOGY
15
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 HOLISTIC SECURITY
16
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 SECURITY SAVINGS PER RECORD Ponemon Institute: 2013 Cost of Data Breach Study
17
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Establish & document your priorities – Isolation – Uptime – Performance – Scalability – Price THE RIGHT CLOUD FOR YOU #1. K NOW THYSELF
18
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Assess your tolerance for loss – What apps & data can you afford to lose? – How much $ does your business lose each hour or day your cloud is down? – Does your backup plan match your risk tolerance? Be honest! – Backing up your cloud onsite vs offsite – how soon can you begin recovery efforts? THE RIGHT CLOUD FOR YOU #2. W HAT ARE YOU WILLING TO LOSE ?
19
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 – What critical business MUST be met? Performance? Encryption? Backup? Do they work together? Test those dependencies! THE RIGHT CLOUD FOR YOU #3. C AN YOUR CLOUD PLAY NICE ?
20
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 SAMPLE CLOUD ARCHITECTURES M ULTI - TENANT C LOUD Use Cases Designed for 99.999% uptime Designed for live maintenance Disaster recovery Light to medium SaaS and E- Commerce Web servers Application servers –Including custom apps Light to medium density Email servers for SMB’s Light to medium density databases
21
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 D EDICATED C LOUD SAMPLE CLOUD ARCHITECTURES Use Cases Mid performance solution optimized for isolation Isolation conscious businesses looking to adopt cloud Designed for 99.99% uptime Designed for near-live maintenance Application Servers Web servers File Servers Light to medium density Email servers for SMB’s Light to medium density databases
22
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 V IRTUAL P RIVATE C LOUD SAMPLE CLOUD ARCHITECTURES Use Cases Ideal for Performance/elastic conscious businesses looking to cloud Designed for 99.999% uptime Designed for live maintenance Medium to high density SaaS and E-Commerce Web servers Application servers –Including custom apps Medium to high density Email servers for SMB’s Medium to high density databases
23
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 V IRTUAL D ATA - CENTER - IN - A - BOX SAMPLE CLOUD ARCHITECTURES Use Cases High performance solution optimized for flexibility Designed for 99.999% uptime Designed for live maintenance Disaster recovery Web servers Application servers –Including custom apps High to extreme SaaS and E- Commerce High to extreme density Email servers for Enterprise High to extreme density databases –Including Oracle
24
www.onlinetech.comCopyright 2014 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 LASTLY
25
www.onlinetech.comCopyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020 Mike Klein mklein@onlinetech.com www.onlinetech.com 734-213-2020 CONTACT INFO:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.