SlideShare a Scribd company logo
1 of 31
Download to read offline
CLOUD
COMPUTING
What are the benefits of moving your
business services to the cloud?
ATAGLANCE
WHAT IS THE CLOUD?
WHERE IS MY DATA ACTUALLY KEPT?
WHAT ARE THE BENEFITS OF THE CLOUD?
HOW DO I KNOW IT’S SECURE?
BEST PRACTICES WHEN USING CLOUD SOLUTIONS
WHAT TO CONSIDER WHEN CHOOSING CLOUD SERVICES
WHAT IS
THE
CLOUD?
ACCORDING TO
WIKIPEDIA
“The cloud” may refer to different
things like:
• The Cloud (Peak District) – a hill between Staffordshire
and Cheshire and forming part of their border in England
• The Cloud, a novel by Ray Hammond
• The Cloud, an 1820 poem by Percy Bysshe Shelley
• The Cloud in Auckland, New Zealand is a multi-purpose
venue built for the Rugby World Cup 2011
• The Cloud, sixth episode of Star Trek: Voyager
BUTWEARETALKING
ABOUT THIS
The Cloud
 A metaphor for internet in
cloud computing
Cloud computing
 Using multiple server computers via
a digital network, as though they
were one computer
But … think of it also as a SERVICE!
© F-Secure Confidential5
WEBASICALLY USE
CLOUD SOLUTIONS…
…ALMOST EVERY DAY IN PRIVATE LIFE
 E-Mail service providers
Google mail, Yahoo mail, Hotmail…
 Document storing and sharing
Dropbox, Google docs, Evernote…
 Multimedia storing and sharing
Youtube, Google Picasa, Facebook…
 Not to forget online games…
© F-Secure Confidential6
WHERE IS
MY DATA
ACTUALLY
KEPT?
TRADITIONAL
SETUPS
Storage solutions are kept in-house
E-Mail traffic is handled in-house
Web hosting and multimedia sharing is done in-house
COMPANIES TEND TO KEEP
ALL SOLUTIONS IN-HOUSE
CLOUDSETUPS
Storage solutions are kept in the
nearest datacenter
E-Mail traffic is handled from the
nearest datacenter
Web hosting and multimedia sharing
is hosted from the nearest datacenter
YOUR DATA IS IN VIRTUAL LOCATIONS AND
YOU HAVE ACCESS TO IT ALL THE TIME
NOWWEHAVETO
ASKOURSELVES
Are in-house solutions safer?
Are in-house solutions easier to manage?
Are in-house solutions cheaper?
Do you even like in-house solutions?
Do they cause you headaches?
?
WHAT ARE
THE BENEFITS
OF THE
CLOUD?
CAPEXVSOPEX
CAPEX or Capital expenditures
Expenditures creating future benefits. A capital
expenditure is incurred when a business spends
money either to buy fixed assets or to add to the
value of an existing asset with a useful life that
extends beyond the tax year.
OPEX or Operating expense
Expenses incurred in the course of ordinary business,
such as sales, general and administrative expenses
(and excluding cost of goods sold, taxes, depreciation and interest).
25%
CAPEX
75%
OPEX
TOMAKEITSIMPLER
CAPEX or Capital expenditures
Buying machinery and other equipment,
acquiring intellectual property assets
like patents…
OPEX or Operating expense
Wages, maintenance and repair of machinery,
utilities, rent…
25%
CAPEX
75%
OPEX
OR EVEN SIMPLER
CAPEX or Capital expenditures
OWNERSHIP
OPEX or Operating expense
SERVICE
25%
CAPEX
75%
OPEX
WHATARETHEBENEFITS
OFTHECLOUD?
OPEX
No investment
Subscription
Low risk
Grow or reduce
Continuous strategy
Evolves, or exit
Service partner
Service focused
CAPEX
High investment
Ownership
High risk
Only growth
Long term strategy
Situational snapshot
Fulfillment
Solution focused
FINANCE
FLEXIBILITY
SOLUTION
RELATIONSHIP
SOHOWDOESITLOOKLIKE
INREALLIFE?
Small SMB go for the cloud…
No resources
No need for owned
The bigger the SMB gets go for owned…
More resources
Whish to own and control the solution
No capabilities to manage outsourced solutions
Big SMB or enterprise chose the cloud
Resources at hand
Capabilities to manage and control the solution
No wish for big onetime investments
Company size
CloudLicense
HOW DO I
KNOW IT’S
SECURE?
THISISNOT
ALWAYSSIMPLE
What are your control and trust needs
How to gain control and trust?
How dependent can you be
If the solution that you have breaks, what do you lose?
How much are you willing to invest
Want to go for cheep or need to go for reliable?
THISISNOT
ALWAYSSIMPLE
 Your resources
Attackers take advantage of
this fact
 Your network security
Easy entry point for attackers
 Monitoring capabilities
Attacks not detected until it is
too late
 Insider attacks
Needs resources for
preventing them
Not to forget security awareness…
BEST PRACTICES
WHEN USING
CLOUD
SOLUTIONS
STOPTHINKINGLIKE:
“THISCANNOT
HAPPEN TOME”
Money transfers
Credit cards
Confidential documents
Business contacts
Emails
Hardware
PROTECTION IS
NEEDEDEVERYWHERE
HOME
OFFICE
ON THE WAY
THESOLUTION
YOUCHOOSE
Needs to be
 flexible
 manageable
 provides reporting functionality
And most of all
 protects against unknown threats
STARTWITHTHEBASICS
CHECK YOUR
RESOURCES AND
PROCESSES
DESKTOP COMPUTERS
Login, firewall, user rights,…
NETWORK
VPN, hardware, wireless access…
SECURITY POLICIES
How are they enforced, managed,
developed…
SERVERS
Physical, DMZ, IP addresses…
CONTINUEWITHTHE
CAPEX/OPEXDECISION
What kind of solution brings you most VALUE?
Think of the Risk Assessment and Management
RISK = THREAT x VULNERABILITY x COST
Be sure you know the MIGRATION details
WHAT TO
CONSIDER
WHEN
CHOOSING
CLOUD SERVICES
THESOLUTION
ISRELIABLE
SERVESYOU
PROVIDESYOUHELP
WHENNEEDED
WHATTOCONSIDERWHEN
CHOOSINGCLOUDSERVICES
The solution can handle all
communication channels you use
The solution can handle all the data
The solution provides top notch
technology
And it does not use up all your
resources
WHATTOCONSIDERWHEN
CHOOSINGCLOUDSERVICES
ALWAYS BE
REAL!
Security in co-relation with
paranoia
But keep a healthy paranoia amount
Check your situation
Differences in risks, resources, needs…
Be sure you have a threshold
Flexibility of the solution is the key
Spread awareness in the
company
Not everybody has to be a security expert
but awareness is the key!
Six things to take into account when choosing cloud solutions

More Related Content

What's hot

Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...Aladdin Dandis
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersMerry D'souza
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Luxembourg cybersecurity radar
Luxembourg cybersecurity radarLuxembourg cybersecurity radar
Luxembourg cybersecurity radarPaperjam_redaction
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365Beyondkey
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingDDoS Mitigation
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing StudyNorth Bridge
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldSamsung Business USA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterAnna Landolfi
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 

What's hot (19)

Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...The importance of information systems security amid risks posed by accelerate...
The importance of information systems security amid risks posed by accelerate...
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Colin Richardson Cocoon
Colin Richardson Cocoon Colin Richardson Cocoon
Colin Richardson Cocoon
 
Luxembourg cybersecurity radar
Luxembourg cybersecurity radarLuxembourg cybersecurity radar
Luxembourg cybersecurity radar
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
Beyond Office-365
Beyond Office-365Beyond Office-365
Beyond Office-365
 
Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 
Enterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile worldEnterprise innovation in an ever-expanding mobile world
Enterprise innovation in an ever-expanding mobile world
 
Technology in Business
Technology in Business Technology in Business
Technology in Business
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
Technology Predictions for 2014
Technology Predictions for 2014Technology Predictions for 2014
Technology Predictions for 2014
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
IBM per la sicurezza del Datacenter
IBM per la sicurezza del DatacenterIBM per la sicurezza del Datacenter
IBM per la sicurezza del Datacenter
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 

Viewers also liked

Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
Theoretical and Design Analysis of SAVONIUS TURBINE
Theoretical and Design Analysis of SAVONIUS TURBINETheoretical and Design Analysis of SAVONIUS TURBINE
Theoretical and Design Analysis of SAVONIUS TURBINERajeev Ranjan
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Pushpa
 
SOLAR ROADWAYS ~ Ch. Sai Krishna
SOLAR ROADWAYS ~ Ch. Sai Krishna SOLAR ROADWAYS ~ Ch. Sai Krishna
SOLAR ROADWAYS ~ Ch. Sai Krishna Sai Krishna
 
Wind turbine project presentation
Wind turbine project presentationWind turbine project presentation
Wind turbine project presentationImmanuel alexander
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaPrashant Gupta
 

Viewers also liked (9)

Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
Collins - Transporting Wind Turbine Blades: The Challenges and the Myths
Collins - Transporting Wind Turbine Blades: The Challenges and the MythsCollins - Transporting Wind Turbine Blades: The Challenges and the Myths
Collins - Transporting Wind Turbine Blades: The Challenges and the Myths
 
Theoretical and Design Analysis of SAVONIUS TURBINE
Theoretical and Design Analysis of SAVONIUS TURBINETheoretical and Design Analysis of SAVONIUS TURBINE
Theoretical and Design Analysis of SAVONIUS TURBINE
 
Dana Martin/Daniel Zalkind - 50 MW Segmented Ultralight Morphing Rotor (SUMR)...
Dana Martin/Daniel Zalkind - 50 MW Segmented Ultralight Morphing Rotor (SUMR)...Dana Martin/Daniel Zalkind - 50 MW Segmented Ultralight Morphing Rotor (SUMR)...
Dana Martin/Daniel Zalkind - 50 MW Segmented Ultralight Morphing Rotor (SUMR)...
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
SOLAR ROADWAYS ~ Ch. Sai Krishna
SOLAR ROADWAYS ~ Ch. Sai Krishna SOLAR ROADWAYS ~ Ch. Sai Krishna
SOLAR ROADWAYS ~ Ch. Sai Krishna
 
Wind turbine project presentation
Wind turbine project presentationWind turbine project presentation
Wind turbine project presentation
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
Seminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant GuptaSeminar on cloud computing by Prashant Gupta
Seminar on cloud computing by Prashant Gupta
 

Similar to Six things to take into account when choosing cloud solutions

What is Cloud Computing?
What is Cloud Computing?What is Cloud Computing?
What is Cloud Computing?Miminten
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingTGO Consulting
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computingtntsa1972
 
Cloud Banking - Post #01 Byte-Size.info
Cloud Banking - Post #01 Byte-Size.infoCloud Banking - Post #01 Byte-Size.info
Cloud Banking - Post #01 Byte-Size.infoFINAP Worldwide
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
 
Cloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your AssociationCloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your AssociationAssociations Network
 
Domain 8 of CEH Cloud Computing.pptx
Domain 8 of CEH Cloud Computing.pptxDomain 8 of CEH Cloud Computing.pptx
Domain 8 of CEH Cloud Computing.pptxInfosectrain3
 
Cloud computing for my business
Cloud computing for my businessCloud computing for my business
Cloud computing for my businessSpiderGroup
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To CloudMichael Yung
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingGAURAV SINHA
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudMark Hinkle
 
Online Hosting--Is It Right For Your Business?
Online Hosting--Is It Right For Your Business?Online Hosting--Is It Right For Your Business?
Online Hosting--Is It Right For Your Business?Gayle Smith
 
Nivio quest presentation v2
Nivio quest presentation v2Nivio quest presentation v2
Nivio quest presentation v2spriestnall
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedNJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedExigent Technologies LLC
 
Presentation For Dublin City County Enterprise Board 11th Oct 2011
Presentation For Dublin City County Enterprise Board 11th Oct 2011Presentation For Dublin City County Enterprise Board 11th Oct 2011
Presentation For Dublin City County Enterprise Board 11th Oct 2011niallmmackey
 

Similar to Six things to take into account when choosing cloud solutions (20)

What is Cloud Computing?
What is Cloud Computing?What is Cloud Computing?
What is Cloud Computing?
 
CFO Summit Series - Cloud Computing
CFO Summit Series - Cloud ComputingCFO Summit Series - Cloud Computing
CFO Summit Series - Cloud Computing
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Cloud Banking - Post #01 Byte-Size.info
Cloud Banking - Post #01 Byte-Size.infoCloud Banking - Post #01 Byte-Size.info
Cloud Banking - Post #01 Byte-Size.info
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Vucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud PresentationVucci IBM Smart Cloud Presentation
Vucci IBM Smart Cloud Presentation
 
Cloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your AssociationCloud Technology: What is it? What can it do for your Association
Cloud Technology: What is it? What can it do for your Association
 
Domain 8 of CEH Cloud Computing.pptx
Domain 8 of CEH Cloud Computing.pptxDomain 8 of CEH Cloud Computing.pptx
Domain 8 of CEH Cloud Computing.pptx
 
Cloud computing for my business
Cloud computing for my businessCloud computing for my business
Cloud computing for my business
 
basics of cloud computing
basics of cloud computingbasics of cloud computing
basics of cloud computing
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your CloudCloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
Cloud Expo Silicon Valley 2013 | Why Lease When You Can Buy Your Cloud
 
Online Hosting--Is It Right For Your Business?
Online Hosting--Is It Right For Your Business?Online Hosting--Is It Right For Your Business?
Online Hosting--Is It Right For Your Business?
 
Nivio quest presentation v2
Nivio quest presentation v2Nivio quest presentation v2
Nivio quest presentation v2
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing DemystifiedNJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
NJMGMA Practice Management Conference (PMC2014) - Cloud Computing Demystified
 
Presentation For Dublin City County Enterprise Board 11th Oct 2011
Presentation For Dublin City County Enterprise Board 11th Oct 2011Presentation For Dublin City County Enterprise Board 11th Oct 2011
Presentation For Dublin City County Enterprise Board 11th Oct 2011
 

More from F-Secure Corporation

How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?F-Secure Corporation
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!F-Secure Corporation
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsF-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace F-Secure Corporation
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceF-Secure Corporation
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?F-Secure Corporation
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3F-Secure Corporation
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2F-Secure Corporation
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeF-Secure Corporation
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業F-Secure Corporation
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?F-Secure Corporation
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetF-Secure Corporation
 

More from F-Secure Corporation (20)

Post-mortem of a data breach
Post-mortem of a data breachPost-mortem of a data breach
Post-mortem of a data breach
 
How do you predict the threat landscape?
How do you predict the threat landscape?How do you predict the threat landscape?
How do you predict the threat landscape?
 
Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!Got hacked? It’s too late to run now!
Got hacked? It’s too late to run now!
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important termsSecurity A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Les attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espaceLes attaques menées depuis la France dans le cyber espace
Les attaques menées depuis la France dans le cyber espace
 
Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?Cyber security webinar 6 - How to build systems that resist attacks?
Cyber security webinar 6 - How to build systems that resist attacks?
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 
Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2Defending Workstations - Cyber security webinar part 2
Defending Workstations - Cyber security webinar part 2
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
The State of the Net in India
The State of the Net in IndiaThe State of the Net in India
The State of the Net in India
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業大きなビジネスを生み出す中小中堅企業
大きなビジネスを生み出す中小中堅企業
 
Why should you care about government surveillance?
Why should you care about government surveillance?Why should you care about government surveillance?
Why should you care about government surveillance?
 
Arbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitetArbeta var du vill- eBook om modern mobilitet
Arbeta var du vill- eBook om modern mobilitet
 
Psb mobile security
Psb mobile securityPsb mobile security
Psb mobile security
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Six things to take into account when choosing cloud solutions