Securing a Cloud Computing Architecture

Securing a Cloud Computing Architecture

This chalktalk begins by demystifying the terminology around cloud computing architectures and examines the types of enterprise projects that are most commmonly being deployed to the cloud. You'll then learn the advantages of a unique solution that leverages identity information and policy information inside your enterprise Active Directory to automate security and management of Linux-based cloud servers. For additional reading, see our Cloud Security Step by Step guide.


Running Time: 25 minutes

Speaker

David McNeely, Director, Product Management

Moderator

Frank Cabri, Vice President, Marketing & Business Development

Topics Covered

  • Demystifying the terminology around cloud computing architectures: intrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS)
  • The types of enterprise projects that are being deployed in the cloud
  • How to set up your internal and DMZ-based Active Directory forests to enable centralized management of Linux-based cloud servers
  • The role that IPsec and Centrify DirectSecure plays in securing Active Directory in the DMZ
  • The different ways in which cloud servers can be joined to Active Directory, including through the cloud-enabled Centrify DeploymentManager console and preloaded server templates
  • The need for auditing user activity to ensure that cloud systems are being accessed only by authorized users and how Centrify DirectAudit improves over traditional log analysis solutions
  • Leveraging the power of Active Directory for efficient centralized, group-based management of resources