RSA CEO: Cloud Computing is an opportunity to radically change the way security is delivered

Source: Internet
Author: User
Keywords Cloud computing CEO of RSA secure delivery
"51cto.com" March 2, 2010 – At the RSA Conference in 2010 (rsa®conference 2010), the EMC Information Security Division RSA Global President Asser Covillo (Arthur W). Coviello a keynote address to the conference, urging the security community to embrace the challenges and opportunities posed by the growing virtual infrastructure, and to take a broader security perspective and gather the IT changes brought about by cloud computing. Industry leaders, including ebay chief information Officer Dave Cullinane, VMware Chief executive Paul Maritz, commented on areas such as security cloud and virtual computing environment. Covelo said, "Some things hinder the full realization of the Cloud's vision." Simply put, that's security. 51% (note) Chief information Officer thinks security is the biggest concern of cloud computing. In today's increasingly virtualized and hyper-expanding enterprise towards cloud evolution, the security pace has not been followed. In short, people everywhere must be able to trust the cloud, even if they can't really or seem to see the cloud. "The 15 information security predecessor pointed out that embedding a virtual abstraction layer into the technology stack provides a unique opportunity for the industry to implement security" modifications "that are more secure than our existing physical infrastructure. In this way, companies can shift from an infrastructure-centric to an information-centric strategy, concentrating on the most important things: information and access, not a meaningless border or a simple pipe. In his speech, Mr. Covelo encouraged the industry to move forward to promote private cloud infrastructure security, compliance, and some sort of governance to provide confidentiality, integrity, and availability for information. He encouraged participants to look at the private cloud as a journey, and each organization would have its own pace, and every step would benefit. He further outlined that RSA believes that the journey towards private cloud has four distinct stages: 1. First, virtualization technologies are used to integrate non-critical infrastructure, such as testing and development systems, and low-risk applications. It encourages the enterprise to familiarize itself with the virtualization tools and begin the process of hardening the virtual infrastructure. 2. Virtualization-critical business applications that ensure the Organization's compliance with the virtual environment and maintain the same level of visibility as the physical infrastructure. 3. Develop an internal cloud that makes the information infrastructure a public facility, consisting of fully virtualized, automated data centers, with application loads driven by policy and service levels. 4. Outsource infrastructure to service providers. This stage needs to be carefully selected, based on their ability to "implement strategies, demonstrate compliance, and manage multiple leases." "If we built security into a virtual infrastructure from the outset, we could not only gain visibility and manageability, but also gain access to risk decision points and control everywhere," Covey concludes. In short, cloud computing will radically transform the way we deliver security. At the same time, information security will enable cloud computing to take full advantage of the Internet and transform existing ITMode。 This means that we can provide a new wave of efficiency, flexibility and synergy for organizations of all sizes. "The news from EMC, EMC Information Security division RSA, and industry partners is a further manifestation of the commitment to cloud security: · EMC works with VMware and Intel to provide conceptual validation of cloud critical business security, compliance, and control EMC, together with Intel and VMware, has released a common vision for a more secure, transparent, and accountable infrastructure for mission-critical cloud services. This concept includes hardware trust root, secure virtual environments, security information and event management, and GRC (governance, risk and compliance) management software, which leverages the technology and expertise of EMC's Information Security division RSA, Intel and VMware, has been summarized in the latest RSA Information security overview Infrastructure Security: Understanding the nature of cloud compliance. · EMC Company expands Security Consulting Services EMC announces expanded services, EMC consulting RSA Security Practice services can help organizations meet industry standards and regulatory compliance, provide secure virtualization and private cloud environments, reduce fraud, ensure identity, and provide advanced security operations. EMC Consulting's core capabilities for RSA Security practice services encompass governance, architecture, and operational security assessment, implementation, and management. Today, RSA's security expertise, combined with EMC Consulting's industry experience, business application, and infrastructure domain knowledge, is benefiting customers such as first data and MFS. The first data company launched a hundreds of retailer to launch data security demonstration points global E-commerce and payment processing leader First Data company announces the expansion of the retailer demonstration point of the initial data TRANSARMORSM solution to more than 400 different sizes of U.S. businesses. Transarmor is developed in close collaboration with EMC and RSA to protect cardholder data and to remove it in a business environment. For the full text of Asser Covillo today's keynote address at the RSA Security conference, and press releases from EMC, EMC Information Security division RSA and Partners, visit: RSA News Center. 2010 RSA Security Convention Year Exposition (March 1-4th, San Francisco) related booth Introduction: L Information-centric security solutions and consulting services-Booth 1725L RSA partner Pavilion-Booth 1737l from Archer Technology (now part of RSA) governance, Risk and Compliance Program-Booth 1338l "Speeding up Your security virtualization Journey" Presentation EMC, EMC Information Security Division, RSA, Intel, and VMware Concept verification-Booth 2029RSA Conference China Information Security Forum will be held for the first time in October 2010, please visit: HTTP://WWW.WMCCg.cn/rsa/100301/index.html. Note: CIO Magazine, 2010 Chief Information Officer status, December 10, 2009
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.