+ All Categories
Home > Documents > Secure public cloud with end-user controlled key management

Secure public cloud with end-user controlled key management

Date post: 23-Feb-2016
Category:
Upload: gyan
View: 28 times
Download: 0 times
Share this document with a friend
Description:
Nimbus Ninjas. Secure public cloud with end-user controlled key management. Talked to 3 cloud service providers & 12 individual cloud users. Business Model V3. IaaS Providers Ex. Enki , Varinsic , Savvis. Rent storage+mgmt but own your data. Rent storage+mgmt - PowerPoint PPT Presentation
Popular Tags:
15
Secure public cloud with end-user controlled key management Talked to 3 cloud service providers & 12 individual cloud users Nimbus Ninjas
Transcript
Page 1: Secure public cloud with end-user controlled key management

Secure public cloud with end-user controlled key management

Talked to 3 cloud service providers&

12 individual cloud users

Nimbus Ninjas

Page 2: Secure public cloud with end-user controlled key management

IaaS ProvidersEx. Enki, Varinsic, Savvis

Prototype product

Outreach to security conscious customers

Product evaluation

Open source community

R&D costsSupport costs

Marketing costs S/W license

IP

PersonnelContent Mgmt ???

St.aaS Providers

Ex. Varinsic, Box

St.aaS Users – SMB+EntEx. Box users

High degree of trust & confidence

Indemnify against content liability

St.aaS, IaaS Providers

St.aaS User ConsumersEx. Dropbox, AMZN clouddrive users

IaaS, PaaS

IaaS Users – SMB+Ent

Ex. HealthcareStartups, LeagalFirms,

Rent storage+mgmtbut own your data

Provide secure storagemgmt service to customers

Rent storage+mgmtbut own your data

Securely shred data. Avoid provider lock-in.

Audit Trails ???

Direct

Business Model V3

Nimbus Ninjas

Page 3: Secure public cloud with end-user controlled key management

Price Per server encrypted

Service AgreementService Agreement

IaaS ProvidersEx. Enki, Varinsic, Savvis

Prototype product

Outreach to security conscious customers

Product evaluation

Open source community

R&D costsSupport costs

Marketing costs

Price Per server encrypted

IP

PersonnelContent Mgmt ???

St.aaS ProvidersEx. Varinsic, Box

St.aaS Users – SMB+EntEx. Box usersHigh degree of trust

& confidence

Indemnify against content liability

IaaS ProvidersSt.aaS User Consumers

Ex. Dropbox, AMZN clouddrive users

IaaS, PaaS

IaaS Users (SMB+ Ent.)

Ex. HealthcareStartups, LeagalFirms, Provide secure storage

mgmt service to customers

Rent storage+mgmt

but own your data

Securely shred data. Avoid

provider lock-in.

Direct

Cloud Service Integrators (Dell)

Business Model V4

Page 4: Secure public cloud with end-user controlled key management

• Informatica Revisited (SaaS, Cloud Data Integration)• Customer feedback: security is still a concern for enterprises who want to set up their

own cloud service• Pass/Fail test result – PASS

• Varinsic (IaaS)• Seeing demand for secure alternative to Box• Can build secure storage service using this + SDN (Nicira, Vyatta)• Legal firms, Govt. would like this• Pass/Fail test result - PASS

• Major enterprise software vendor (IaaS, SaaS) • “Ensuring secure data transportation is essential”• “Ensuring complete multi-tenancy isolation” is a basic requirement • Top features in mind: easy way to transport data in & out; support for mobile devices;

smooth collaboration among services• Pass/Fail test result – PASS

Customer Interview Takeaways

Nimbus Ninjas

Page 5: Secure public cloud with end-user controlled key management

• 12 individual Dropbox users (Storage as a Service users) • 1 user would DEFINITELY pay for the added security layer• 1 user considers it very useful and may pay depending on the price• 2 paid user likes “the idea of having an option to encrypt my Dropbox files on a need

basis”• 3 consider themselves “normal people” who “hackers are not interested in”• 5 have “not found a situation” when encryption is necessary because they would

“never put files with privacy or personal information” online• Pass/Fail test result – NEED MORE DATA

• Consumer Market Competitors Exist• SecureSync (Dropbox)• CompletelyPrivateFiles (Box, Gmail)• BoxCryptor (Dropbox)• TrueCrypt• There exists a demand for Second-Level Security

Customer Interview Takeaways

Nimbus Ninjas

Page 6: Secure public cloud with end-user controlled key management

IaaS Segment - Market Size Analysis

Nimbus Ninjas

IDC - Dec 2010 - Server Virtualization Market Forecast and Analysis

App Dynamics - Application Virtualization Outlook Survey

IDC - Dec 2010 - Worldwide Virtualization Tracker

Gartner – 2010 report

6.8 million server machines

9.0 millionVMs

1.3 million servers hosting Virtual Machines (VM)

1.25 millionSecurity Sensitive VMs (24% CAGR)

Nimbus Ninjas prospects

Page 7: Secure public cloud with end-user controlled key management

2012 2013 2014 2015 2016

625775

961

1192

1478

1 8 48179

443

Market Size and Revenue Forecast ($ Million)

IaaS Segment - Market SizeIaaS Segment - NimbusNinjas Revenue

•Pricing: $500 per VM per year•Market: $625M market with a growth rate of

24% Nimbus Ninjas

Page 8: Secure public cloud with end-user controlled key management

Goals for the week…• Last Weeks Goals

• Reach out to cloud providers [at the right level ! ]• 7 so far, Ongoing

• How do you ensure against becoming a feature (that existing vendors can “pick off”)

• Explored additional customer segments• Improved value proposition for multiple segments (focus on IaaS)

• Bottom-up method for establishing market size.• Done

• This Weeks Goals• Reach out to more Enterprise Users !

Nimbus Ninjas

Page 9: Secure public cloud with end-user controlled key management

Backup

Page 10: Secure public cloud with end-user controlled key management

Design Flow – IaaS

Nimbus NinjasEnterprise

Physical H/W + Hypervisor

IaaS ProviderH/W Virtalization Infrstructure VMWare,

Citrix etc.

Page 11: Secure public cloud with end-user controlled key management

Design Flow – IaaSInstall

NimbusNinjas Client on VServers

Nimbus NinjasEnterprise

Physical H/W + Hypervisor

IaaS ProviderH/W Virtalization Infrstructure VMWare,

Citrix etc.

Key Server Appliance

(Key Management,Audit Trails)

Setup Onsite Key

Server

Page 12: Secure public cloud with end-user controlled key management

Design Flow – St.aaS

Nimbus Ninjas

Corporate Users (Seats)

Confidential documents, Proprietary Code, Personal Stuff, etc…

St.aaS provider

User 1

User 2

Confidential documents, Proprietary Code, Personal Stuff, etc…

Corporate Active Directory Server

Page 13: Secure public cloud with end-user controlled key management

Design Flow – St.aaS

Nimbus Ninjas

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^St.aaS provider

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^Confidential documents, Proprietary Code, Personal Stuff, etc…

Confidential documents, Proprietary Code, Personal Stuff, etc…Corporate Users (Seats)

Key Server Appliance

(Key Management,Audit Trails …)

Corporate Active Directory Server

User 1

User 2

Encrypt, Decrypt on endpoint

Install NimbusNinjas client on

endpoint

Setup Onsite Key

Server

Page 14: Secure public cloud with end-user controlled key management

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

Design Flow – Individual Users

Nimbus Ninjas

Key Escrow Service(Authentication,

key management)

Individual Cloud Users

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

!@#2%$#@4!43%&$#%^(^&^&^@$@#^%

Page 15: Secure public cloud with end-user controlled key management

Business Model V2

Nimbus Ninjas


Recommended