security from the ground up

13
Master Seller Webinar: Security from the Ground Up Solution Providers site: apps.gepportal.com

Upload: buggeen

Post on 14-Jan-2015

253 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Security From The Ground Up

Master Seller Webinar:Security from the Ground UpSolution Providers site:apps.gepportal.com

Page 2: Security From The Ground Up

I Heard About This Cloud Computing.

Is It Secure?

Page 3: Security From The Ground Up

Where’s the Best Place For My Data?

Company Servers In the Cloud

Page 4: Security From The Ground Up

Now

Changing the Mindset

Then

Page 5: Security From The Ground Up

Why is Security So Tough?Data Problem: Users want to access their data anytime, from anywhere

of corporate data resides unprotected on PC

desktops and laptops

60%laptop computers will

be stolen within 12 months of purchase

1-out-of-10of USB thumb drive owners

report losing them, over 60% with private corporate data on

them

66%

Page 6: Security From The Ground Up

Why is Security So Tough?

• Companies have multiple operating systems, each with different versions

• Different applications and different security patches for different applications

• While you’re working on deploying your patch, other people are working on reverse engineering and gaining access to your environment

• On Average Companies took between 25-60 days to deploy each patch after it was available

Patching Problem

Page 7: Security From The Ground Up

How is Google Securing My Data?

Page 8: Security From The Ground Up

People• Hired some of the world's

foremost experts in security• Google Code of Conduct • Security Training

Page 9: Security From The Ground Up

Process• Security is part of the Google DNA• Security baked into our products

from the initial design, not an afterthought

• Secure Code development process

• External Security Audits

Page 10: Security From The Ground Up

Technology• Custom built hardware• Data replicated in multiple

datacenters• Data sharding across servers• Data obfuscation on disk• Rigorous media disposal process• Tight control of Network

Perimeter

Page 11: Security From The Ground Up

So Who Can Really Read My Data?

Page 12: Security From The Ground Up

Why Should I Trust Google?• User trust is key to our business• Strong Privacy policy to customer data• We store our own data in the same

environment

Page 13: Security From The Ground Up