Welcome Security & Cloud -...

69
Welcome Security & Cloud #BMIT

Transcript of Welcome Security & Cloud -...

Welcome Security & Cloud

#BMIT

Nice to meet you. I’m William

Smart Business Strategies

Smart Business Strategies

Smart Business Strategies

• The only Belgian IT magazine that takes the business manager in perspective

• Business decision maker

• Target audience: managing director, IT manager, HR manager, marketing manager,...

• Understandable and strategy focused

• Cases & user centric

• Business IT magazine that matters

Business Meets IT - Agenda

• 9.30: Market Research: William Visterin (Smart Business Strategies)

• 10.00: Security in the cloud – Securing the cloud: Erwin Geirnaert (Zion Security)

• 10.30: Break

• 11.00: Case: moving from a shared infrastructrure to a hybrid cloud: security considerations Jan Colpaert en Timour Ezizov (Fedict)

• 11.30: Case: Peter Hellemans, Atos

• 12.00: Case: Steve Meyns, Selor

• 12.30: Walking Dinner •

Security &

Cloud Computing

1.

The Cloud

What kind of cloud are you thinking of?

Cloud computing refers…

…to the provision of computational resources, such as

applications, databases, file services, email, etc

on demand… via a computer network

Source: Wikipedia

5-3-2 rule

5 Cloud characteristics

Self-Service / On-demand

A. User in driver„s seat

Ubiquitous network access

Location transparant resource pooling

A. Virtual (shared) resources (in & between datacenters)

Rapid elasticity (scalability)

A. Rapid availability & unlimited resources

Measured service with pay-per-use

A. Use ≠ user

5-3-2 …

2.

The Cloud

Market

Cloud Computing in Belgium Survey

Time to get started with cloud services?

0%

10%

20%

30%

40%

50%

60%

70%

80%

AlreadySwitched

This Year ComingYears

No plans

15%

6% 8%

71%

Source: ZDNet, Smart Business Strategies, 2011

Why Cloud Computing?

0%

5%

10%

15%

20%

25%

30%

35%

40%

LessMaintenance

Better Security Always On Scalability

18%

26%

18%

38%

Source: ZDNet, Smart Business Strategies, March 2011

3.

Security

Rule of Three

Antivirus

Firewall

Antispam

Trends in

Security

Trends in Security

• From antivirus to antimalware

Trends in Security

• From antivirus to antimalware

• From firewall to Next-generation firewall

New kids on the block

Trends in Security

• From antivirus to antimalware

• From firewall to Next-generation firewall

• Endpoint security

• Mobile Device Management

Integrated approach

is needed

4.

Security Market

Plans for

investments in

security

“With a little help from my

friends”

External advice in security

And finally…

“Denial is not a river in Egypt”

May the

cloud be

with you

Kind regards,

William Visterin E-mail: [email protected] Twitter: @wvisterin

Business Meets IT - Agenda

• 9.30: Market Research: William Visterin (Smart Business Strategies)

• 10.00: Security in the cloud – Securing the cloud: Erwin Geirnaert (Zion Security)

• 10.30: Break

• 11.00: Case: moving from a shared infrastructrure to a hybrid cloud: security considerations Jan Colpaert en Timour Ezizov (Fedict)

• 11.30: Case: Peter Hellemans, Atos

• 12.00: Case: Steve Meyns, Selor

• 12.30: Walking Dinner •