Тёмный

What is Cloud Security? 

IBM Technology
Подписаться 790 тыс.
Просмотров 251 тыс.
50% 1

Learn about current threats: ibm.biz/BdP3C5
Learn more about Cloud Security: ibm.biz/BdP3C7
Check out this lightboard video with Nataraj Nagaratnam from IBM Cloud as he maps out what cloud security is and explains how important it is for enterprises to incorporate it into their business operations.
NEW free hands-on Kubernetes labs to earn a badge: ibm.biz/free-interactive-kuber...
Get started for free on IBM Cloud: ibm.biz/free-lite-cloud-account
#CloudSecurity #DataProtection #IBMCloud

Наука

Опубликовано:

 

26 сен 2019

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 104   
@dhivyanawesome5939
@dhivyanawesome5939 4 года назад
WHAT IS A CLOUD SECURITY - shared responsibilty between you and the service provider - PaaS - Making a program, migrating data and building applications - Responsible: workload, securing application and the data - Cloud provider: security of the application, the network, Runtime - Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software... -IaaS - Infrastructure as a service -Adoption model - a cloud provider hosts the infrastructure components traditionally present in an on-premises data center, - including servers, storage, and networking hardware, as well as the virtualization or hypervisor layer. - SaaS - Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications... ARCHITECTURE - DATA -confidential data - public data - sensitive data - Data must have at rest encryption - always data is encrypted - Data at rest - Data at motion - Data in storgae - You own your data and have complete control - Private keys and public keys overall control over data stored based upon the nature of data present on your server - You also have greater responsibilty with this model - Control over hardware module in which you have greater control over the encryption and decryption process - Holistic approach - Bring your own keys - keep your own keys - Data access is based upon the need - Limiting acccess to data - Application needs - User needs - Apllication Security - ensure the absence of application vunerabilities before releasing the application - Dynamic security - static security - Secure policy = control over data and clever oversight - User Access - who the user is : identity - what servers they are accessing - Network access -> unauthorized users are blocked from acessing the data - firewalls - network access control - DDOS protection - Intelligence built into the network - Continual surveillance - Insight - compliance - threats - Identifying your posture -> Ability to gain visibility and be able to remediate and in order to maintain control at all times within the system, and take necessary action at all time DEV OPS - DEVELOPMENT AND OPERATIONS - security a forethought instead of managing security Design - secure design - Integrating and embedding security as part of the process Build - Security build Manage Security - close loop - remediate while recognizing threats
@dhivyanawesome5939
@dhivyanawesome5939 4 года назад
hopefully someone finds this useful
@sgr2683
@sgr2683 3 года назад
Great Explanation 👌
@folafalusi7700
@folafalusi7700 3 года назад
Thank you for doing the lords work
@sJ-ls8pw
@sJ-ls8pw Год назад
I'm looking at this and realizing that I don't know how to take notes properly. Very well done.
@sujithacharie7304
@sujithacharie7304 11 месяцев назад
U r great 👍🏼👍🏼👍🏼
@lalitvazirani9925
@lalitvazirani9925 4 года назад
Very simple yet informative. Thank you for the very clear explanation. I would love to see you give a detailed video on BYOK and the pros and cons of the different key models
@luvkashyap
@luvkashyap 2 года назад
One of the BEST presentations I found on RU-vid on Cloud security. Simple, concise but meaningful
@IBMTechnology
@IBMTechnology 2 года назад
We're happy you enjoyed it, Luv! 👍 Stay tuned for more like this.
@MrKeith-hc2fv
@MrKeith-hc2fv 2 года назад
I like the content density, pace, and clarity of explanation. Thank you.
@ronaik
@ronaik 3 года назад
Great video, I like the simplicity with which you explained. Thanks!
@tameonetwothree
@tameonetwothree 4 года назад
Good video - I'm just as impressed that he can write back to front so easily!
@ohjubilee
@ohjubilee 4 года назад
I thought a lot about this and then i realized that they just flip the video. Maybe that is obvious to everyone else but it wasn't to me lol
@Greerbowski
@Greerbowski 3 года назад
ohjubilee no. They only hire left handed people 😂
@Christopher.dreamless
@Christopher.dreamless 3 года назад
Lol Ibm gets everyone with this 😂😂😂😂
@DennisMcCoy-b2r
@DennisMcCoy-b2r 3 года назад
@@ohjubilee Did they? That would mean his wedding ring was on his right hand. Or did they put it there so it would look like it had not been flipped?
@drMoonish
@drMoonish 2 года назад
@@DennisMcCoy-b2r in many countries the ring on the right is the correct way
@gideonaudu6588
@gideonaudu6588 2 года назад
Very informative and a glimpse to the world of Cloud Security and critical value of cloud security in the present Data sensitive world. Thanks for this.
@farukm7627
@farukm7627 Год назад
Thank you for this overview of the holistic approach to cloud security. Very well put.
@pracitoshsahu538
@pracitoshsahu538 3 года назад
Great Thank you for the very clear explanation, it is just a wonderful overview of cloud security , Impressed....
@RobBastien
@RobBastien 4 года назад
Well done, thank for posting.
@michaelpruitt1753
@michaelpruitt1753 4 года назад
Great Job for a ten minute presentation!! Please due more videos on the Cloud
@mircodhd4326
@mircodhd4326 2 года назад
Very good video. Nice mimic and gestic. Great info, clear speech. In my opinion one of the best (videos on the topic) out there.
@olutundejiyt
@olutundejiyt 2 года назад
Great video! Highly informative, simplified and holistically explained. Thanks you.
@IBMTechnology
@IBMTechnology 2 года назад
You're welcome and thank you for the appreciation! We're glad you found it helpful! 🙂
@suchismitagoswami5609
@suchismitagoswami5609 3 года назад
Great explanation - Crisp and concise!
@srinivasabburi4070
@srinivasabburi4070 9 месяцев назад
Concise and informative. Gives a high level overview of security model to be followed in cloud.
@lenevoyogatab3plus740
@lenevoyogatab3plus740 3 года назад
thank you, God bless you Dr. Raj Robonotro
@shaktirio7130
@shaktirio7130 3 года назад
Wow, great explanation...thank you Nataraj.
@Spider-Man_67
@Spider-Man_67 3 года назад
The video was informative...it attuned me about the security approach in IBM cloud...👍
@ppvshenoy
@ppvshenoy Год назад
Good concise high-level explanation of cloud security. Thank you.
@NMarz-tu2td
@NMarz-tu2td Год назад
Thank You so much you cleared everything in a very nice professional way
@isaacntim2784
@isaacntim2784 4 месяца назад
Very detailed. Thank you
@glacier9491
@glacier9491 3 года назад
One of the best videos on cloud
@englishlearner3011
@englishlearner3011 3 года назад
Love the video - thanks!
@sumitpaul3080
@sumitpaul3080 4 года назад
This kind of videos is like blessings, Thanks for the enlightenment!!!
@IBMTechnology
@IBMTechnology 4 года назад
We are happy it blessed you, Sumit.
@dedoscalera1161
@dedoscalera1161 4 года назад
Great video! Very useful
@shyamdixit007
@shyamdixit007 Год назад
Very Nice video!! I learnt more about Security by watching your short video than reading so cloud security vendor offerings.
@shalinikapoor1486
@shalinikapoor1486 4 года назад
Wonderful Explanation!
@kaywalker4386
@kaywalker4386 4 года назад
Great, thank you for that quick overview it was spot on; please continue to provide more content. Topic suggestion Utility Companies How Cloud Security the Best Direction for Protection change?
@yayacamara7176
@yayacamara7176 2 года назад
Clean and concise.
@danishazizkhan6099
@danishazizkhan6099 2 года назад
very well delivered the concepts
@pankajsinghv
@pankajsinghv 4 года назад
Excellent overview of cloud security
@ZoomZoomVan
@ZoomZoomVan 2 года назад
That was awesome!
@ganeshkrishamurthy413
@ganeshkrishamurthy413 4 года назад
Very useful video. Thanks
2 года назад
Thank you for the overview
@rajeshmurugan5655
@rajeshmurugan5655 4 года назад
Very informative video.. Thanks for sharing..
@premraj434
@premraj434 4 года назад
Very much Informative .
@Arun-Arasan
@Arun-Arasan 3 года назад
That was brilliant - Clear and concise!
@dawngalletly1877
@dawngalletly1877 2 года назад
Great presentation, thanks.
@zsurdo
@zsurdo 2 года назад
Great and spectacular video.
@kelvinsankale
@kelvinsankale 9 месяцев назад
so nice. Very informative. Thank you.
@SM7SM7SM7
@SM7SM7SM7 2 года назад
Great explanation! I love that IBM uses diagrams during explanation
@IBMTechnology
@IBMTechnology 2 года назад
We're glad you like our format, thanks for watching! 👍
@RyanSoul
@RyanSoul 3 года назад
great video good sir!
@daniyal4484
@daniyal4484 3 года назад
Just brilliant
@CarlosSantanaDev
@CarlosSantanaDev 4 года назад
Excellent video +1
@bouncer2005
@bouncer2005 3 года назад
Very very succinct and useful
@catatanteknokreatif
@catatanteknokreatif 5 месяцев назад
great videos
@bhuwanchandra23
@bhuwanchandra23 4 года назад
One of the best Video on cloud security
@IBMTechnology
@IBMTechnology 4 года назад
Great to hear!
@anilgawande4086
@anilgawande4086 2 года назад
awesome!
@CyberStoriesbyPrasidh
@CyberStoriesbyPrasidh 2 года назад
Thank you for this video. Explained well. I am sure this videos will be useful for every one to understand which are all controls required to secure applications hosted on cloud.
@IBMTechnology
@IBMTechnology 2 года назад
Thank you for the appreciation, Prasidh! Glad you found it useful! 👍
@ramakrishnabaratam9144
@ramakrishnabaratam9144 3 года назад
Very good overview of cloud security!! Thank you!!
@IBMTechnology
@IBMTechnology 3 года назад
You're welcome!
@clairelyle9516
@clairelyle9516 4 года назад
Very informative
@roseandmose
@roseandmose 7 месяцев назад
More videos pleaseeeee❤
@drakesh6379
@drakesh6379 4 года назад
Excellent overview Thanks, could you please make some more vedios of in depth cloud security and cloud Pentesting.
@chandrasekhargupta7316
@chandrasekhargupta7316 3 года назад
Hi Natarajan, its nice presentation. keep it up.
@karthigieyaan7986
@karthigieyaan7986 4 года назад
Best and short video for cloud security
@IBMTechnology
@IBMTechnology 4 года назад
Thank you, Karthi!
@haribabu4034
@haribabu4034 2 года назад
It was a good demonstration about the cloud security architecture and it's very useful too. Could please share video on how to secure Cloud environment in detail concepts.
@priyaa0512
@priyaa0512 4 года назад
Amazing explanation on cloud security! Great info
@IBMTechnology
@IBMTechnology 4 года назад
Thank you, Priya! Be sure to check out other videos on our channel for more information. 👍
@EllisPerry-co7gv
@EllisPerry-co7gv 5 месяцев назад
good idea
@Srithottappa9129
@Srithottappa9129 2 года назад
Nice explanation
@SuvarnaAmbure
@SuvarnaAmbure Год назад
I have 2 year of Preveledge access management experience. Can you suggest next career path for me.
@manikroy7768
@manikroy7768 2 года назад
Sir, what if a power user of the Cloud Admin password is compromised at the user end?
@techfinick
@techfinick Год назад
great
@kamalpreet82
@kamalpreet82 2 года назад
Great video. Can you create another video to talk about key management?
@ktandon03
@ktandon03 4 года назад
Thanks, it was wonderful... can you help me saas security
@haribabu4034
@haribabu4034 2 года назад
well explained. I would love to know more about DevSecOps.
@IBMTechnology
@IBMTechnology 2 года назад
You're in luck. We've also produced a video on that. Check it out: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-J73MELGF6u0.html
@GS-td3yc
@GS-td3yc 4 года назад
Did you reverse the video right to left?
@IBMTechnology
@IBMTechnology 4 года назад
We did not. We actually have a blog post we wrote that explains our video technique. ibm.co/2LTPMjo
@sumitthakur9923
@sumitthakur9923 2 года назад
Secure by Design
@christylevin2801
@christylevin2801 Год назад
More character we have, more responsibility from that person 😀
@toenytv7946
@toenytv7946 2 года назад
Secdevops. Like that
@stefanangelov302
@stefanangelov302 3 года назад
Can i go for Cloud Security? Im not in IT Role, i want to start career. What should i do? thx :)
@IBMTechnology
@IBMTechnology 3 года назад
Hi Stefan! We appreciate your interest! 👏 You can start by learning about IBM Cloud and Cloud Security. We have a great number of courses and other resources, most of them free: IBM Center for Cloud Training 👉 ibm.co/3fYPQy0 Cloud Security 👉 ibm.co/3fWAWbi Even further, we have great free courses on the IBM Security Community 👉 ibm.co/3vUH09X or on edX (Cloud essentials, starts today: ibm.co/34ZD8II), Cogntive Class (ibm.co/3ptn0Zv) or Coursera (ibm.co/3vZyTJp) And in the end, you can check out our IBM Careers page: ibm.co/2S9B7XY Good luck!
@XxKINGatLIFExX
@XxKINGatLIFExX 3 года назад
This comment section is full of current or future millionaires
@shayberkovich8104
@shayberkovich8104 3 года назад
Great explanation of cloud security. I liked the structure of this video starting with adaptation model and going methodically through the concepts. One minor thing I disagree is the intake arrow to "Gain Insights" - it can really come from various logs and run-time events, not just from access management.
@ishmaildeco990
@ishmaildeco990 4 года назад
Bruh, this dude is writing backwards. Think about it
@IBMTechnology
@IBMTechnology 4 года назад
Well actually, we don't write backward. Here is a blog post we wrote that explains how we do it. ➞ ibm.co/2LTPMjo
@alitarek3708
@alitarek3708 9 месяцев назад
nah it's mirrored
@sportsboy5935
@sportsboy5935 3 года назад
these all controls are already being used in non cloud environments. i dont know which security controls u gona implement in cloud. you just use general security terms and did not provide any roadmap to secure cloud network. you should be ready enogh to speak on cloud security other than just sharing knowledge of cloud ccna level
@VirendraKumar-zo3cw
@VirendraKumar-zo3cw 3 года назад
Very informative
@IBMTechnology
@IBMTechnology 3 года назад
Thanks for watching, glad you found it useful, Virendra! Stay tuned for more videos like this.
Далее
Кто то встречал их на улице?
00:59
小天使和小丑离家出走#short #angel #clown
00:36
Hybrid Cloud Architecture Part 1: Connectivity
13:19
Просмотров 52 тыс.
2024 Cybersecurity Trends
7:57
Просмотров 157 тыс.
A Cloud Security Architecture Workshop
52:00
Просмотров 72 тыс.
What is OpenShift?
7:04
Просмотров 642 тыс.
Cybersecurity and Zero Trust
17:59
Просмотров 79 тыс.
Introduction to AWS Services
38:54
Просмотров 2,2 млн
Cybersecurity Architecture: Roles and Tools
14:07
Просмотров 92 тыс.
What is RAG? (Retrieval Augmented Generation)
11:37
Просмотров 108 тыс.
ОБСЛУЖИЛИ САМЫЙ ГРЯЗНЫЙ ПК
1:00
899$ vs 360$ which one will you choose ? #iphone #poco
0:18