Download presentation
Presentation is loading. Please wait.
Published byChristopher Peters Modified over 9 years ago
1
Phil Van Etten CEO, GOING TO THE CLOUD
2
INTRODUCTION Former CEO, President of Sygate and Azaleos currently CEO of Netmail - Netmail cloud Cloud Adaption Huge 65% Of American Companies Have Multiple Clouds 88% Will Increase Cloud Usage 66% Still cite security concerns as a blocker to cloud adoption (IDG) The Rapid Adoption By Amazon Cloud Services From Book Seller To $10 Billion Cloud Service Company
3
Session Goals and Objectives 1.Assess the risk of adoption cloud service; 2.Compare different cloud provider offerings; 3.Obtain assurance from selected cloud providers; 4.Reduce the assurance burden on cloud providers;
4
Is the cloud right for you? Analyzed the cost savings Is your application ready for the cloud Security Data sovereignty The right vendor(s) Scalability/Lock-in Contract execution
5
Considerations for cloud deployment Selection of cloud provider. Requirements, reputation, cost. Determination for managed service provider. Nature and sensitivity of data (data sovereignty). SLA, Responsibility Matrix, Response Time, Specific Application Matrix Security Time of deployment
6
THE TECHNOLOGY WORLD IS DIVIDED INTO TWO WORLDS ON – Premise Applications OFF – Premise Applications Future: How To Connect The Two Worlds
11
Public Cloud Versus Private Cloud Cost/Cloud Economics Versus Data Risk A TALE OF TWO CLOUDS
12
Plan User Data Security Considerations for planning a move to the cloud
13
About managing the people. Show that you are going to a better place!!… Show that management is behind it. Make it a movement. Set expectations. USERS
14
Plan Your Cloud Adoption What Applications Big Bang Approach | Migration of Data Calendar The Event Economics Back-up Plan Data Protection
15
Single Migration Less Disruption to users / Lower Migration Costs Cost Reduction
16
Evaluate your Infrastructure AD Am I structured properly? If its built or configured wrong it will surely fail
17
Plan your Device Strategy Security And Bandwidth
18
Plan for Operations Afterwards The Responsibilities Shift From Managing An It Environment To Managing a Vendor
19
Clean-up Before You Go Old users, inactive users, resources, object naming, proxy access/delegates. Potential Security Exposure
20
Data Movement Strategies DATA Its all About The Data
21
SECURITY Gateway security/Authentication and access Cloud security/Malicious insider How vulnerable Are You? Loss of governance Data protection/Incomplete data deletion 3 rd Party Assessments Work
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.