SlideShare a Scribd company logo
5
Most read
8
Most read
11
Most read
Security As A Service In Cloud(SECaaS)

               Presented By
               Vivek Mehta
            Bismillah Rawthar
Various Cloud Services
 1. Software As A Service(SaaS)
    •   provider licenses an application to customers either as a
        service on demand, through a subscription, in a “pay-as-
        you-go” model, or (increasingly) at no charge.
    •   Characteristic Of SaaS
          Web access to commercial software.
          Software is managed from a central location
          Software delivered in a “one to many” model.
          Users not required to handle software upgrades and
           patches.
Various Cloud Services
 2. Platform As A Service(PaaS)
    • a computing platform that allows the creation of web
      applications quickly and easily and without the complexity
      of buying and maintaining the software and infrastructure
      underneath it.
    • Characteristic Of PaaS
        Multi-Tenant Architecture.
        Services to develop, test, deploy, host and maintain
          applications in the same integrated development
          environment.
        All the varying services needed to fulfill the application
          development process.
Various Cloud Services
 3. Infrastructure As A Service(IaaS)
    • is a way of delivering Cloud Computing infrastructure –
      servers, storage, network and operating systems – as an on
      demand service.
    • Rather than purchasing servers, software, datacenter space
      or network equipment, clients instead buy those resources
      as a fully outsourced service on demand.
    • Characteristics Of IaaS
         Resources are distributed as a service.
         Generally includes multiple users on a single piece of
          hardware.
Various Cloud Services
 4. Storage As A Service(STaaS)
    •   is a business model in which a large service provider rents space in their
        storage infrastructure on a subscription basis.
 5. Security As A Service(SECaaS)
    •   is a business model in which a large service provider integrates their
        security services into a corporate infrastructure on a subscription basis.
    •   security services include authentication, anti-virus, anti-
        malware/spyware, intrusion detection, and security event management,
        among others.
    •   Cloud providers provide various services for protection i.e. to protect an
        individual computer or an organization’s network.
    •   The various application/product that they offer falls under the category
        of SECaaS.
Various Cloud Services
Top 10 Companies That Provide Cloud Services
  1. Amazon Web Services
  2. Rackspace
  3. CenturyLink/Savvis
  4. Salesforce.com
  5. Verizon/Terremark
  6. Joyent
  7. Citrix
  8. Bluelock
  9. Microsoft
  10. VMware
Why Cloud-Based Security Is Required?
 • the increase in use of cloud-based services, such as
   salesforce.com or Google Apps, means that many mobile IT
   users will be accessing business data and services without
   traversing the corporate network. This will increase the need for
   enterprises to place security controls between mobile users and
   cloud-based services.
 • the use of peer-to-peer in-the-cloud computing will also make
   enterprises more vulnerable to some security risks by reducing
   the cost of brute force attacks. Inexpensive cloud-based
   processing will make it easier and cheaper to break encryption
   keys or find vulnerabilities in software, and financially motivated
   criminals will certainly seek to take advantage of that.
Why Cloud-Based Security Is Required?
 • Most threats never hit the on-premises network.
 • Reduced total cost of ownership.
 • Easier support for mobile and remote users.
 • Rapid deployment of services.
 • Extending the life of on-premises solutions.
SECaaS Are Provided For The Following Area
 1.   Identity and Access Management.
 2.   Data Loss Prevention.
 3.   Web Security.
 4.   Security Assessment.
 5.   Intrusion management.
 6.   Encryption.
 7.   Network Security.
 8.   Business Continuity And Disaster Recovery.
 9.   Security information And Event Management.
Various Services/Products
 1. Altor VF By Altor Networks
    •   Altor Virtual Firewall is a software security appliance that runs in a
        virtualized environment and enforces security policy on a per virtual
        machine basis. Data center administrators can now pinpoint a broad
        range of virtual network security compromises and easily create
        roles-based security policies. Security policies can be continuously
        enforced on individual virtual machines, even as they move
        throughout the virtualized data center.
 2. AppGate Security Server - By Cryptzone Group AB
    •   The AppGate is a secure access system that protects servers (virtual,
        physical or virtualized) with an inbuilt application layer firewall. It
        includes encryption of all communication between workstations,
        mobile phones and the AppGate Server. The granular and role based
        access makes it possible for system administrators to give specific
        access.
Various Services/Products
 3. BIObeans - By TouchTier Technology Pte Ltd
    • BIObeans is a scalable Biometric-Secured Identification &
      Authentication Solution, built upon service-oriented architecture (SOA)
      using onboard biometric finger print sensors and commercially available
      off-the-shelf hardware. BIObeans provides an advantage when it goes
      for hundreds of thousands of users deployment with control to one
      identity per person.
 4. CipherCloud - By CipherCoud, Inc
    • CipherCloud provides a solution to address data privacy, sovereignty,
      security and regulatory challenges with cloud adoption. It leverages
      strong encryption to protect sensitive data in real-time before it's sent
      to the cloud. It does not require any change to cloud applications, and
      doesn’t impact functionality, performance, or user experience.
Various Services/Products
 5. DefensePro - By Radware, Ltd
    • Radware's DefensePro is a real-time Intrusion Prevention System (IPS)
      that maintains your business continuity by protecting your IP
      infrastructure against existing and emerging network-based threats that
      can't be detected by traditional IPS' such as application misuse threats,
      SSL attacks and VoIP service misuse.
 6. McAfee Total Protection - By McAfee, Inc
    • McAfee Total Protection service provides total desktop protection
      including anti-virus, anti-spyware, firewall and basic email virus
      protection in one, integrated package with automatic security updates
      and a single reporting and configuration console via the McAfee Web-
      based Security Center.
Thank You
 And Finally

More Related Content

PPTX
Cloud Computing
PDF
Cloud Computing Architecture
PPT
Evolution of the cloud
PPTX
cloud computing Multi cloud
PPTX
Cloud Security Architecture.pptx
PPTX
Virtualization- Cloud Computing
PPTX
Cloud Computing PPT.pptx
Cloud Computing
Cloud Computing Architecture
Evolution of the cloud
cloud computing Multi cloud
Cloud Security Architecture.pptx
Virtualization- Cloud Computing
Cloud Computing PPT.pptx

What's hot (20)

PDF
Cloud Computing - An Introduction
PPTX
Hypervisor
PDF
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
PPTX
01. 03.-introduction-to-infrastructure
ODP
Introduction to Virtualization
PPTX
Cloud computing presentation
PDF
Cloud security
PPTX
Virtualization
PPTX
Cloud computing and its security issues
PDF
Introduction to virtualization
PDF
cloud virtualization technology
PPTX
Zero Trust Model
PPTX
Public vs private vs hybrid cloud what is best for your business-
PPTX
Wireless network security
PDF
Overview of computing paradigm
PPTX
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
PPTX
NIST Cloud Computing Reference Architecture
PPTX
cloud security ppt
PPTX
Cloud computing ppt
PPT
Cloud deployment models
Cloud Computing - An Introduction
Hypervisor
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
01. 03.-introduction-to-infrastructure
Introduction to Virtualization
Cloud computing presentation
Cloud security
Virtualization
Cloud computing and its security issues
Introduction to virtualization
cloud virtualization technology
Zero Trust Model
Public vs private vs hybrid cloud what is best for your business-
Wireless network security
Overview of computing paradigm
Cloud Computing For Beginners | Cloud Computing Explained | Cloud Computing T...
NIST Cloud Computing Reference Architecture
cloud security ppt
Cloud computing ppt
Cloud deployment models
Ad

Viewers also liked (13)

PDF
Security Service Management
PPT
Security As A Service
PDF
Cyber Security as a Service
PPTX
Elite Force Security Service Brief
PDF
Security as a Service with Microsoft Presented by Razor Technology
PDF
Security As A Service
PDF
Security As A Service
PDF
How to avoid your website from keep getting hacked
PPTX
Security As A Service
PDF
IT Security As A Service
PDF
Hosted Security as a Service - Solution Architecture Design
PDF
Security as a Service in a Financial Institution: Reality or Chimera?
PPTX
Security as a Service = JSOC
Security Service Management
Security As A Service
Cyber Security as a Service
Elite Force Security Service Brief
Security as a Service with Microsoft Presented by Razor Technology
Security As A Service
Security As A Service
How to avoid your website from keep getting hacked
Security As A Service
IT Security As A Service
Hosted Security as a Service - Solution Architecture Design
Security as a Service in a Financial Institution: Reality or Chimera?
Security as a Service = JSOC
Ad

Similar to Security As A Service In Cloud(SECaaS) (20)

PDF
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
PPT
Contrast cbt cloud computing - v.2
PPTX
Security concerns with SaaS layer of cloud computing
PDF
IBM Point of View: Security and Cloud Computing
PDF
IBM Point of view -- Security and Cloud Computing (Tivoli)
PDF
Cloud Computing - Jan 2011 - Chandna
PPTX
Cloud Computing (1).pptx
PPTX
What is cloud computing
PDF
110307 cloud security requirements gourley
PPT
Radu crahmaliuc 23feb2012
PDF
Cloud Security: Perception Vs. Reality
PPT
Cloud Computing
PDF
10 security concerns cloud computing
PDF
Cloud Security - Made simple
PPTX
Cloud computing by Luqman
PDF
Cloud Security:Threats & Mitgations
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PPTX
Cloud presentation NELA
PDF
Paper id 27201433
PDF
PSee Solutions
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
Contrast cbt cloud computing - v.2
Security concerns with SaaS layer of cloud computing
IBM Point of View: Security and Cloud Computing
IBM Point of view -- Security and Cloud Computing (Tivoli)
Cloud Computing - Jan 2011 - Chandna
Cloud Computing (1).pptx
What is cloud computing
110307 cloud security requirements gourley
Radu crahmaliuc 23feb2012
Cloud Security: Perception Vs. Reality
Cloud Computing
10 security concerns cloud computing
Cloud Security - Made simple
Cloud computing by Luqman
Cloud Security:Threats & Mitgations
INFORMATION SECURITY IN CLOUD COMPUTING
Cloud presentation NELA
Paper id 27201433
PSee Solutions

More from أحلام انصارى (20)

PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
PPTX
Intention recognition for dynamic role exchange in haptic
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
PPTX
Human behaviour analysis based on New motion descriptor
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
PPTX
Security issues in cloud database
PPTX
Html5 offers 5 times better ways to hijack the website
PPTX
Honey pot in cloud computing
PPT
grid authentication
PPT
Dos presentation by ahlam shakeel
PPTX
Password craking techniques
PPT
Operating system vulnerability and control
PPT
Network ssecurity toolkit
PPTX
Image forgery and security
PPTX
Image based authentication
PPT
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
Intention recognition for dynamic role exchange in haptic
Noise Adaptive Training for Robust Automatic Speech Recognition
Human behaviour analysis based on New motion descriptor
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Security issues in cloud database
Html5 offers 5 times better ways to hijack the website
Honey pot in cloud computing
grid authentication
Dos presentation by ahlam shakeel
Password craking techniques
Operating system vulnerability and control
Network ssecurity toolkit
Image forgery and security
Image based authentication

Security As A Service In Cloud(SECaaS)

  • 1. Security As A Service In Cloud(SECaaS) Presented By Vivek Mehta Bismillah Rawthar
  • 2. Various Cloud Services 1. Software As A Service(SaaS) • provider licenses an application to customers either as a service on demand, through a subscription, in a “pay-as- you-go” model, or (increasingly) at no charge. • Characteristic Of SaaS Web access to commercial software. Software is managed from a central location Software delivered in a “one to many” model. Users not required to handle software upgrades and patches.
  • 3. Various Cloud Services 2. Platform As A Service(PaaS) • a computing platform that allows the creation of web applications quickly and easily and without the complexity of buying and maintaining the software and infrastructure underneath it. • Characteristic Of PaaS Multi-Tenant Architecture. Services to develop, test, deploy, host and maintain applications in the same integrated development environment. All the varying services needed to fulfill the application development process.
  • 4. Various Cloud Services 3. Infrastructure As A Service(IaaS) • is a way of delivering Cloud Computing infrastructure – servers, storage, network and operating systems – as an on demand service. • Rather than purchasing servers, software, datacenter space or network equipment, clients instead buy those resources as a fully outsourced service on demand. • Characteristics Of IaaS Resources are distributed as a service. Generally includes multiple users on a single piece of hardware.
  • 5. Various Cloud Services 4. Storage As A Service(STaaS) • is a business model in which a large service provider rents space in their storage infrastructure on a subscription basis. 5. Security As A Service(SECaaS) • is a business model in which a large service provider integrates their security services into a corporate infrastructure on a subscription basis. • security services include authentication, anti-virus, anti- malware/spyware, intrusion detection, and security event management, among others. • Cloud providers provide various services for protection i.e. to protect an individual computer or an organization’s network. • The various application/product that they offer falls under the category of SECaaS.
  • 7. Top 10 Companies That Provide Cloud Services 1. Amazon Web Services 2. Rackspace 3. CenturyLink/Savvis 4. Salesforce.com 5. Verizon/Terremark 6. Joyent 7. Citrix 8. Bluelock 9. Microsoft 10. VMware
  • 8. Why Cloud-Based Security Is Required? • the increase in use of cloud-based services, such as salesforce.com or Google Apps, means that many mobile IT users will be accessing business data and services without traversing the corporate network. This will increase the need for enterprises to place security controls between mobile users and cloud-based services. • the use of peer-to-peer in-the-cloud computing will also make enterprises more vulnerable to some security risks by reducing the cost of brute force attacks. Inexpensive cloud-based processing will make it easier and cheaper to break encryption keys or find vulnerabilities in software, and financially motivated criminals will certainly seek to take advantage of that.
  • 9. Why Cloud-Based Security Is Required? • Most threats never hit the on-premises network. • Reduced total cost of ownership. • Easier support for mobile and remote users. • Rapid deployment of services. • Extending the life of on-premises solutions.
  • 10. SECaaS Are Provided For The Following Area 1. Identity and Access Management. 2. Data Loss Prevention. 3. Web Security. 4. Security Assessment. 5. Intrusion management. 6. Encryption. 7. Network Security. 8. Business Continuity And Disaster Recovery. 9. Security information And Event Management.
  • 11. Various Services/Products 1. Altor VF By Altor Networks • Altor Virtual Firewall is a software security appliance that runs in a virtualized environment and enforces security policy on a per virtual machine basis. Data center administrators can now pinpoint a broad range of virtual network security compromises and easily create roles-based security policies. Security policies can be continuously enforced on individual virtual machines, even as they move throughout the virtualized data center. 2. AppGate Security Server - By Cryptzone Group AB • The AppGate is a secure access system that protects servers (virtual, physical or virtualized) with an inbuilt application layer firewall. It includes encryption of all communication between workstations, mobile phones and the AppGate Server. The granular and role based access makes it possible for system administrators to give specific access.
  • 12. Various Services/Products 3. BIObeans - By TouchTier Technology Pte Ltd • BIObeans is a scalable Biometric-Secured Identification & Authentication Solution, built upon service-oriented architecture (SOA) using onboard biometric finger print sensors and commercially available off-the-shelf hardware. BIObeans provides an advantage when it goes for hundreds of thousands of users deployment with control to one identity per person. 4. CipherCloud - By CipherCoud, Inc • CipherCloud provides a solution to address data privacy, sovereignty, security and regulatory challenges with cloud adoption. It leverages strong encryption to protect sensitive data in real-time before it's sent to the cloud. It does not require any change to cloud applications, and doesn’t impact functionality, performance, or user experience.
  • 13. Various Services/Products 5. DefensePro - By Radware, Ltd • Radware's DefensePro is a real-time Intrusion Prevention System (IPS) that maintains your business continuity by protecting your IP infrastructure against existing and emerging network-based threats that can't be detected by traditional IPS' such as application misuse threats, SSL attacks and VoIP service misuse. 6. McAfee Total Protection - By McAfee, Inc • McAfee Total Protection service provides total desktop protection including anti-virus, anti-spyware, firewall and basic email virus protection in one, integrated package with automatic security updates and a single reporting and configuration console via the McAfee Web- based Security Center.
  • 14. Thank You And Finally