Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Cloud-based Servers: Getting Security and Compliance Right the First Time

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Enforcing Consistent Security Policies in Dynamic Cloud Environments

Organisations moving their IT resources to the cloud are finding it a challenge to maintain the same security posture in their virtual environments that they have adopted in their physical data centers.

Cloud platforms like VMware vCloud and Amazon EC2 enable the quick and easy creation of servers in response to end-user demand. In such dynamic environments, IT security and compliance managers need an automated method for consistently provisioning user accounts and privileges and enforcing system security policies.

Other unique challenges include: isolating groups of servers for compliance reasons, protecting data as it moves across the public network, and auditing user activity on off-premise, virtual systems. 

Join our panel of experts for an informative webinar to learn how to consistently apply security policies in dynamic cloud environments.

You’ll learn how your organisation can benefit from linking all access rights, privileges, and audit logs to a single, definitive Active Directory identity that spans the cloud and the physical data centre.

The panel will answer your questions at the conclusion of the event.

Attend this webinar to learn how to:

  • Leverage existing IT infrastructure, knowledge and processes to manage on-premise and cloud systems
  • Apply role-based access and privilege control (RBAC) on dynamically-provisioned cloud servers
  • Achieve infinite scalability with host-based, peer-to-peer network security (IPsec transport mode)
  • Monitor and audit user activity on sensitive systems
  • Enable single sign-on to vCloud and EC2 systems and applications

This webinar is for:

  • IT security managers concerned about the security of their cloud environments
  • IT staff looking for a better understanding of the challenges presented by the cloud and the solutions to address them
  • Compliance managers concerned about how the cloud paradigm impacts their risk exposure

Speakers

Steve Gold

Steve Gold, Infosecurity Magazine

    David McNeely

    David McNeely Director of Product Management, Centrify Corporati

      Bob Tarzey

      Analyst and Director, Quocirca