+ All Categories
Home > Technology > Security managers july 2015 (1)

Security managers july 2015 (1)

Date post: 12-Aug-2015
Category:
Upload: cloudzone
View: 56 times
Download: 5 times
Share this document with a friend
Popular Tags:
48
Arthur Schmunk Director of CloudZone [email protected] +972 54 6668291 AWS is our Business! Whats yours? מהו ענן? Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic
Transcript
Page 1: Security managers july 2015 (1)

Arthur Schmunk

Director of CloudZone

[email protected]

+972 54 6668291

AWS is our Business! Whats yours?

ענןמהו ?

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 2: Security managers july 2015 (1)

CloudZone, Matrix’s cloud unit, is a leading AWS solution provider in region. With over 5 years of experience with AWS, CloudZone provides its customers with a complete service package that includes consulting, professional services and managed services.

As an Premier Consulting Partner , Worldwide Channel Reseller, Authorised Government Reseller and Managed Service Provider of Amazon Web Services, we ensure that our customers adopt the most advanced technologies and best practices.

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 3: Security managers july 2015 (1)

We Are Here to Help

Account Managers Solution Architects Tools Professional Services

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 4: Security managers july 2015 (1)

The cloud is the new normalAndy Jassy, senior vice president of Amazon Web Services

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 5: Security managers july 2015 (1)

Gartner Magic Quadrant for Cloud IaaS

Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” Lydia Leong, Douglas Toombs, Bob Gill, Gregor Petri, Tiny Haynes, May 28, 2014. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available at http://aws.amazon.com/resources/analyst-reports/. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 6: Security managers july 2015 (1)

More than 1 million active customers

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 7: Security managers july 2015 (1)

Trusted by Enterprises Around the World

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 8: Security managers july 2015 (1)

8

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 9: Security managers july 2015 (1)

AWS Global Infrastructure

Application Services

Networking

Deployment & Administration

DatabaseStorageCompute

Breadth & Depth of Functionality

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 10: Security managers july 2015 (1)

AWS Rapid Pace of Innovation

2009

Amazon RDS

Amazon VPC

Auto Scaling

Elastic Load

Balancing

+48

2010

Amazon SNS

AWS Identity

& Access

Management

Amazon Route 53

+61

2011

Amazon

ElastiCache

Amazon SES

AWS

CloudFormation

AWS Direct

Connect

AWS Elastic

Beanstalk

GovCloud

+82

Amazon

CloudTrail

Amazon

CloudHSM

Amazon

WorkSpaces

Amazon Kinesis

Amazon Elastic

Transcoder

Amazon

AppStream

AWS OpsWorks

+280

2013

Amazon SWF

Amazon Redshift

Amazon Glacier

Amazon

Dynamo DB

Amazon

CloudSearch

AWS Storage

Gateway

AWS Data

Pipeline

+159

2012

Since inception AWS has:

• Released 1111 new services and features

• Introduced more than 40 major new services

• Announced 45 price reductions

2008

+24Amazon EBS

Amazon

CloudFront

+500

2014

Amazon Cognito

Amazon Zocalo

Amazon Mobile

Analytics

AWS Directory

Service

Amazon RDS for Aurora

AWS CodeDeploy

AWS Lambda

AWS Config

AWS Key Management

Service

AWS Service Catalog

Amazon EC2

Container Service

AWS CodePipeline

AWS CodeCommit

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 11: Security managers july 2015 (1)

Amazon

ElasticCache

reduces prices for

cache nodes by an

average of 34%

March 26, 2014

34%Amazon S3 reduces

prices for Standard and

Reduced Redundancy

Storage, by an average

of 51%

March 26, 2014

51%

We’ve announced price reductions 47* times since our

inception in 2006. Recent price drops included…

Amazon Route 53

lowers prices for both

Standard Queries and

Latency Based Routing

Queries by 20%

July 31, 2014

20%

*as of Nov 10, 2014

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 12: Security managers july 2015 (1)

11 Regions

28 Availability Zones

54 Edge Locations

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 13: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 14: Security managers july 2015 (1)

Reserved

Make a low, one-time

payment and receive a

significant discount on

the hourly charge

For committed

utilization

Free Tier

Get Started on AWS

with free usage & no

commitment

For POCs and

getting started

On-Demand

Pay for compute

capacity by the hour

with no long-term

commitments

For spiky workloads,

or to define needs

Spot

Bid for unused

capacity, charged at a

Spot Price which

fluctuates based on

supply and demand

For time-insensitive or

transient workloads

Dedicated

Launch instances within

Amazon VPC that run

on hardware dedicated

to a single customer

For highly sensitive or

compliance related

workloads

Many pricing models to support different workloads

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 15: Security managers july 2015 (1)

Increased agility has become

the #1 reason organizations use

the AWS cloud

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 16: Security managers july 2015 (1)

Organizations Can’t Afford to Be Slow

Add New Dev Environment

Add New Prod Environment

Add New Environment in Japan

Add 1,000 Servers

Remove 1,000 Servers

Deploy 1 PB Data Warehouse

Shut down 1 PB Data Warehouse

AWS:

Infrastructure in minutesOld World:

Infrastructure in weeks

Everything changes with this kind of agility

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 17: Security managers july 2015 (1)

A Culture of Innovation: Experiment Often & Fail without Risk

On-Premises

Experiment infrequently

Failure is expensive

Less innovation

Experiment often

Fail quickly at a low cost

More innovation

$ Millions

Nearly $0

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 18: Security managers july 2015 (1)

Cloud Is Always About Money?

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 19: Security managers july 2015 (1)

72% savings

*According to the IDC in 2012

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 20: Security managers july 2015 (1)

SECURITY IS SHARED

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 21: Security managers july 2015 (1)

WHAT NEEDS

TO BE DONE

TO KEEP THE

SYSTEM SAFE

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 22: Security managers july 2015 (1)

WHAT

WE DO

FOR YOU

WHAT YOU DO

YOURSELF

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 23: Security managers july 2015 (1)

EVERY CUSTOMER HAS ACCESS

TO THE SAME SECURITY

CAPABILITIES

CHOOSE WHAT’S RIGHT FOR YOUR ENTERPRISE

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 24: Security managers july 2015 (1)

“Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers”

Tom Soderstrom – CTO NASA JPL

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 25: Security managers july 2015 (1)

IDC Survey

Attitudes and Perceptions Around Security and Cloud Services

Nearly 60% of organizations agreed that CSPs [Cloud Service Providers] provide better security than their own IT organization

Source: IDC 2013 U.S. Cloud Security Survey

Doc #242836, September 2013

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 26: Security managers july 2015 (1)

AWS SECURITY OFFERS MORE

VISIBILITYAUDITABILITY

CONTROL

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 27: Security managers july 2015 (1)

MORE VISIBILITY

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 28: Security managers july 2015 (1)

CAN YOU MAP YOUR NETWORK?

WHAT IS IN YOUR ENVIRONMENT

RIGHT NOW?

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 29: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 30: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 31: Security managers july 2015 (1)

TRUSTED ADVISOR

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 32: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 33: Security managers july 2015 (1)

MORE AUDITABILITY

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 34: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 35: Security managers july 2015 (1)

LOGSOBTAINED, RETAINED, ANALYZED

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 36: Security managers july 2015 (1)

You are making

API calls...On a growing set

of services around

the world…

CloudTrail is

continuously

recording API

calls…

And delivering

log files to you

AWS CLOUDTRAIL

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 37: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

AWS Security Delivers More Control & GranularityCustomize the implementation based on your business needs

AWS

CloudHSM

Defense in depth

Rapid scale for security

Automated checks with AWS Trusted Advisor

Fine grained access controls

Server side encryption

Multi-factor authentication

Dedicated instances

Direct connection, Storage Gateway

HSM-based key storage

AWS IAM

Amazon VPC

AWS Direct

Connect

AWS Storage

Gateway

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 38: Security managers july 2015 (1)

AWS IAMIDENTITY & ACCESS MANAGEMENT

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 39: Security managers july 2015 (1)

CONTROL WHO CAN DO WHAT

WITH YOUR AWS ACCOUNT

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 40: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 41: Security managers july 2015 (1)

MFA DELETE PROTECTION

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 42: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 43: Security managers july 2015 (1)

YOUR DATA STAYSWHERE YOU PUT IT

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 44: Security managers july 2015 (1)

USE MULTIPLE AZs

AMAZON S3

AMAZON DYNAMODB

AMAZON RDS MULTI-AZ

AMAZON EBS SNAPSHOTS

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 45: Security managers july 2015 (1)

ENCRYPT YOUR DATAAWS CLOUDHSM

AWS Key Management Service

AMAZON EBS

AMAZON S3 SSE

AMAZON GLACIER

AMAZON REDSHIFT

AMAZON RDS

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 46: Security managers july 2015 (1)

DATA ENCRYPTION

CHOOSE WHAT’S RIGHT FOR YOU:

Automated – AWS manages encryption

(e.g. S3 SSE)

Enabled – user manages encryption using AWS

(e.g. AWS CloudHSM, AWS KMS)

Client-side – user manages encryption using their own means

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 47: Security managers july 2015 (1)

AWS CloudHSM

Managed and monitored by AWS, but you control the keys

Increase performance for applications that use HSMs for key storage or encryption

Comply with stringent regulatory and contractual requirements for key protection

EC2 Instance

AWS CloudHSM

AWS CloudHSM

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Page 48: Security managers july 2015 (1)

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic

Thank You!

יקיריהםושלשלהםבתמונותששיתפומטריקסלעובדימיוחדתתודה

Arthur Schmunk

[email protected]

Matrix IT work Copyright 2014. Do not remove source or Attribution from any graphic or portion of graphic


Recommended