jump to navigation

Cloud Security Presentation at SXSW March 19, 2012

Posted by wholmes in Cloud, Security.

I had a great experience last weekend presenting “Securing the Cloud – What’s Your Cloud Entry Point?” during the SXSW interactive conference in Austin, TX. Most people in the Virtualization community are not aware that SXSW includes a very large annual technology conference that attracts over 20,000 annually. This is in addition to a SXSW film and of course the SXSW music festival.

It was great to see a decent size audience attend on an uncharacteristically rainy cold Austin day, with over 200 attendees. This speaks to the fact that VMware, virtualization, and Cloud are gaining mindshare within more than just the typical infrastructure admin community. With technologies such as Cloud Foundry and vFabric at the PaaS Layer; Horizon Mobile, SlideRocket, Socialcast, and the upcoming Project Octopus and AppBlast at the SaaS and End-User-Compute layer to compliment our IaaS Cloud solutions, we have a large and growing number of products that allow for multiple entry points into the Cloud, each with their own security considerations.

Below is a link to my presentation (on SlideRocket) with audio the audio link. Feel free to leave comments within the SlideRocket Presentation. (One of the cool features of SlideRocket!).

Presentation Slides: http://portal.sliderocket.com/vmware/SXSW-2012

Audio: http://audio.sxsw.com/2012/podcasts/10-HIL-Securing-The-Cloud-Whats-your.mp3

Session Description http://schedule.sxsw.com/2012/events/event_IAP13577

Session Abstract:

The move to cloud computing is still froth with questions about the confidentiality, integrity and availability of data moved to the cloud. These questions, and their answers, differ depending on the cloud entry point chosen by the end-user. Potential cloud entry points include Infrastructure-as-a-Service, Platform-as-a-Service, or Software-as-a-Service (IaaS, PaaS, or SaaS) cloud computing solutions. This presentation will review the current state of affairs around cloud computing security, and delve into security considerations end-users should make for each of the differing cloud solution entry points


No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: