Date: 24 August 2011, 3 pm BST (4 pm CET). Duration: 01:00 hours
Many organizations are facing a Catch-22 when it comes to migrating applications to the cloud. They get the biggest ROI by migrating business-critical apps that need to scale rapidly and on-demand. But these are precisely the applications that need the tightest security controls. Executive management is pressing for progress on cost savings, but sorting through the variety of security issues unique to cloud environments can be dauntingly complex.
The solution is to break the process of securing cloud servers into a set of well defined, achievable steps that enable IT organizations to securely extend their existing enterprise infrastructure out into their cloud environment.
In this free webinar, we will initially discuss the key requirements for securing cloud systems. David McNeely, senior director of product management at Centrify, will then present a five-step process, using Amazon EC2 as an example, for automating provisioning of security policies, centralizing account and privilege management, hardening network access, auditing systems, and implementing enterprise-centric single sign-on. Uri Budnik, ISV Program Director at RightScale, will describe how RightScale's ServerTemplate and RightScripts can be used to achieve the automated provisioning and system lockdown.
Drew Amorosi US Bureau Chief, Infosecurity Magazine
David McNeely Senior Director, Product Management, Centrify
Uri Budnik ISV Program Director, RightScale