Hi [[ session.user.profile.firstName ]]

Security within the Cloud: The Infrastructure Solution

Intel technology underpins many of the developments taking place in cloud computing today, from the servers in the data centre’s to the networks connecting data centre’s and users all the way through to the client devices being used to access cloud based services. Servers based on the latest generat
Intel technology underpins many of the developments taking place in cloud computing today, from the servers in the data centre’s to the networks connecting data centre’s and users all the way through to the client devices being used to access cloud based services. Servers based on the latest generations of Intel® Xeon® processors integrate functionality to support enhanced security both within the cloud and when communicating with the cloud. Alan will discuss how these new security related features can help an enterprise secure its transactions with the cloud, ensure that workload and data placed in the cloud are not compromised and that the cloud infrastructure and services can be 'trusted'.
Recorded Sep 9 2010
35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alan Priestley, Data Centre Group, Intel EMEA
Presentation preview: Security within the Cloud: The Infrastructure Solution
Recommended for you:
  • Date
  • Rating
  • Views
  • Cloud Storage: The 5 Reasons IT Can Do it Better Cloud Storage: The 5 Reasons IT Can Do it Better George Crump, Storage Switzerland Recorded: May 25 2016 61 mins
    In this live webinar, learn the five reasons why a private cloud storage system may be more cost effective and deliver a higher quality of service than public cloud storage providers.

    In this webinar you will learn:

    1. What Public Cloud Storage Architectures Look Like
    2. Why Public Providers Chose These Architectures
    3. The Problem With Traditional Data Center File Solutions
    4. Bringing Cloud Lessons to Traditional IT
    5. The Five Reasons IT can Do it Better
  • 3 secrets to becoming a Cloud Security superhero 3 secrets to becoming a Cloud Security superhero Dawn Smeaton, Director Cloud Workload Security at Trend Micro Recorded: May 25 2016 33 mins
    Learn how to leverage AWS and security ‘super’ friends like Trend Micro to create an impenetrable fortress for your workloads, without hindering performance or agility. Join this session and learn three cloud security super powers that will help you thwart villains interested in your workloads. We will walk through three stories of Amazon EC2 security superheroes who saved the day by overcoming compliance and design challenges using a (not so) secret arsenal of AWS and Trend Micro security tools.

    Key takeaways from this session include how to:
    · Design a workload-centric security architecture
    · Improve visibility of AWS-only or hybrid environments
    · Stop patching live instances but still prevent exploits
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • Enterprise Data Center Selection Criteria for Business in Southeast Asia Enterprise Data Center Selection Criteria for Business in Southeast Asia Kelly Morgan - 451 Research, Dalton Yap - Telin Recorded: May 25 2016 44 mins
    More than 20% of MNCs we surveyed currently have plans to expand into the SE Asia region, and are now considering their options to use third-party colocation/cloud exclusively, or in combination with on-premise IT deployments.

    Much of the current market activity is being driven by MNCs needing to build out their DC presence to serve as gateways to and from mainland China, and other high-growth markets in the region. Over a third of MNCs plan to increase their usage of colocation providers for their future IT deployments and are actively considering data center locations in established preferred locations of Singapore, Hong Kong or Tokyo - driven by factors such as regulations, geographical location, and the skills of the local workforce.

    So what are the key selection criteria, and how do certain locations compare?

    Singapore continues to be poised for solid growth, with an active supply pipeline, demand from local and international companies, and high-quality facilities. But do other factors, such as power supply costs, choice of bandwidth or the availability of carrier neutral space make it as an attractive location for datacenter investment as Hong Kong or Tokyo? Should MNCs look at Malaysia or Indonesia as possible areas for expansion as well, which could potentially offer lower-cost options for firms, as well as a way to target the local market in each country?

    This session will answer all the key questions such as:
    •Do Multinationals prefer to Own or Rent Datacenters in South-East Asia?
    •Why Do Organizations Need More Datacenter Space?
    •When Will They Need More Datacenter Space?
    •How Much Datacenter Space Will They Need?
    •What is Driving Datacenter Location Selection?
    •What Would Organizations Likely Do if They Needed More
    Datacenter Space/Power Capacity in SE Asia?
  • Health Management in Your Data Center Just Got Easier with Intel Virtual Gateway Health Management in Your Data Center Just Got Easier with Intel Virtual Gateway Dragos Georgescu, BDM, Intel Data Center Solutions - Dror Shenkar, Intel Data Center Solutions, Senior Application Engineer Recorded: May 25 2016 42 mins
    Health management in the data center has four main pillars. Monitoring, Analytics, Diagnostics and Remediation.

    In this session we will cover these main pillars and why they are important. We will unveil how you can use embedded sensors in the silicon available through standardized interfaces on your servers to help IT professionals start to add these pillars to their environment and begin to leverage them to help with MTTR reduction to outage avoidance. In the case of actual server issues, we will explain the ways to access those machines remotely and fix them with Intel Virtual Gateway.

    Highlights of the Four Main Pillars:
    •Monitoring: automated server health monitoring, failure alerting, health dashboard, and more.
    •Analytics: root cause with health details, failure device report severity indication, and health history.
    •Diagnostics: Remote vKVM access, integrated in-band access, component level health details.
    •Remediation: remote power on/off and remote vMedia
  • The Psychology of Innovation:Why customers are looking to create change with AWS The Psychology of Innovation:Why customers are looking to create change with AWS Kevin Linsell, Director of Strategy & Architecture, Adapt​​ Recorded: May 25 2016 37 mins
    Hyperscale is here and its ability to support innovation and change has been grabbing the attention of businesses in the UK. But the 'journey to agile' is not straightforward for many businesses and the scale of transformation required is far from just technical. Psychology and culture play a massive role in the speed at which businesses are able to create competitive advantage through innovation - and adapting to hyperscale is a behavioural consideration that changes the way individual teams and the whole business work together. In this session, Adapt will demonstrate how they are helping customers make the most of the AWS cloud to drive innovation.
  • PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices PCI DSS 3.1 Compliance in Modern Data Center & Cloud: Lessons & Advices Forrest McMahon, Director Tech Advisory & Assessment Svcs Coalfire; & Steve Neville, Director Cloud & Data Center Trend Micro Recorded: May 25 2016 49 mins
    Join Forrest McMahon from Qualified Security Assessor (QSA) Coalfire for an insightful view of PCI DSS 3.1 requirements in the face of increasingly sophisticated cyber-attacks and more complicated deployment scenarios:
    1. How to approach the task of PCI DSS 3.1 compliance
    2. What the impacts of different deployment environments (physical, virtual, cloud) have on compliance
    3. What key tools & approaches can be used to streamline and ease compliance impacts
  • How Graze is experimenting their way to growth with Magento and AWS How Graze is experimenting their way to growth with Magento and AWS Edd Read, CTO at Graze.com and Osvaldo Spadano, CEO at Elastera Recorded: May 25 2016 41 mins
    Learn how Graze.com is testing the viability of new business models by leveraging AWS, Elastera and the Magento e-commerce platform, to create a Minimum Viable Site for their customers and lean how they respond.

    Often it takes retailers several months to plan, build and launch a site, hoping that it will deliver the projected revenue. Join this session if you want to learn a more practical and straight-forward approach to test the viability of new e-commerce ideas, without sacrificing quality and scalability, and better plan with real data on hand.
  • Next generation vulnerability and configuration management with the AWS Cloud Next generation vulnerability and configuration management with the AWS Cloud Dan Pitman, Solutions Architecture at Alert Logic Recorded: May 25 2016 21 mins
    The threat landscape is constantly changing and bad actors are making concerted efforts to exploit vulnerabilities to compromise cloud environments. Effectively managing vulnerabilities in the cloud can be challenging; traditional security tools are not built to enable you to fully exploit the agility and cost reduction benefits that the cloud offers.
    The dynamic and flexible nature of AWS workloads can make it difficult, or impossible, for legacy tools to effectively identify exposures in your cloud environments. In this session, you will learn how Alert Logic Cloud Insight enables you to dramatically improve the way in which you identify vulnerabilities and misconfigurations for the applications you are running on AWS. By delivering deep insight into your AWS environment, enabling you to perform intelligent remediation, and providing continuous protection, Cloud Insight reduces your time and costs associated with vulnerability and configuration management.
    Key takeaways:
    •What techniques you can ditch when it comes to finding vulnerabilities
    •How remediating vulnerabilities in the cloud will be faster
    •How the cloud makes it easier to visualize your environment
    •How tight integration with AWS APIs and CloudTrail can enable quick detection of changes as they occur
  • VoIP and the best OptiView XG trick you didn’t know existed VoIP and the best OptiView XG trick you didn’t know existed Mike Diss Recorded: May 25 2016 52 mins
    Listening to your feedback plus the high level of interest in this subject, we have created a free webinar for many unable to attend the recent live seminar.

    As your company has at least one OptiView ®, you most likely know it as the tablet providing the fastest way to “Prove it’s not the network” and find root cause.
    But here's an awesome tip about a “hidden” feature of the Optivew that you may not know about.
    You can pair OptiView XG with TruView Live and extend it’s reach beyond a direct connection to troubleshoot cloud-based services, SaaS applications and now VoIP.

    Join us and see how you can:
    •Test web application transaction performance and connectivity
    •Monitor VoIP service availability and call quality
    •Baseline real-time network quality

    And the great news is that if you are a new owner or purchaed Gold Product Support for OptiView® XG, you automatically qualify for a free CORE subscription of TruView Live

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security within the Cloud: The Infrastructure Solution
  • Live at: Sep 9 2010 9:00 am
  • Presented by: Alan Priestley, Data Centre Group, Intel EMEA
  • From:
Your email has been sent.
or close
You must be logged in to email this