SlideShare a Scribd company logo
Security of cloud computing
Thirty-nine years of my life had passed
before I understood that clouds were not my enemy.
Iimani David
Paul Neumann
pneumann@umt.edu.al
Infrastructure as a Service
Flexibility.
Economy of resources.
Free choice of computing power.
New risks to providers and enterprises.
Economy
1. IT infrastructure on demand – more cost-effective.
2. No redundant IT infrastructure, staff, and/or
investments.
3. Flexible response to the needs in computing
power.
No restraining factor to innovations.
Flexibility, scalability, configurability, mobility.
Flexibility
1. Outsourcing hardware infrastructure; retaining IT
management.
2. Outsourcing all aspects of IT management.
3. Mixed model; outsourcing some segments of IT
management where applicable.
Most often implemented
on demand of enterprise administrative branches.
IDC market research
International Data Corporation
Surveyed
top managers of
244 leading
IT companies
world-wide.
As early as in 2008.
Primary concerns
Will I have the same level of control over the IT
infrastructure and the data?
Does the IT infrastructure comply with the Law?
How can I demonstrate it to the auditors?
How will I prove to my company that the IT system
is secure?
How do I know that Service-Level Agreements will
be observed?
Data-Processing Centre
Risk 1:
Placing sensitive data outside the secure perimeter
may expose them to security risks.
Risk 2:
Placing sensitive data outside the secure perimeter
may be incompatible with the Law.
Secure perimeter
Firewall.
DMZ.
Network segmentation.
Intrusion Detection & Prevention Systems.
Network monitors.
Virtualization
More computing power from physical servers'
redundant capacities.
Individual services; diversified configuration of
applications.
Smaller DPC's, server consolidation, reduced costs of operation.
Virtualization kills secure perimeter
Impossible to build and apply secure perimeter:
Many servers are installed on one hardware platform.
Generally low level of security.
Data security has to be built around the data themselves and each
server.
Secure perimeter loses its sense.
Only application of new line of defence allows for
transferring IT operations to the cloud.
Difficulties of cloud security
Means of cloud security in principle the same as
traditional means of system security.
Providers of cloud services install virtual machines
on the same physical servers.
Increases efficiency of virtualization, compromises security.
Traditional means of system security can't protect
from attacks on virtual machines from within the
same physical server.
Access to the servers
System administrators have access via Internet.
Additional challenges to the system security.
Unlike traditional systems with access control on physical level.
Strict control of the administrators' access – critical.
So is control and transparency of changes on the
system level.
VM state and volatility
Virtual machines are dynamic.
Can be easily
– shut down and/or restarted;
– cloned and moved between servers.
– rolled back to a previous state;
Vulnerabilities and/or misconfigurations can spread
uncontrollably.
Vulnerabilities & attacks from within
The same level of risk to be hacked or infected.
In fact it's even higher: A number of VM's working at the same
time on a physical server increases the attacked space.
New challenge: hacking or infecting from within.
On the same physical server one virtual machine may attack
another virtual machine.
Intrusion Detection and Prevention systems now
must be capable of working on the VM level,
regardless of the location of that VM in the cloud.
Idle virtual machines
A VM may be compromised even if turned off.
Enough if the perpetrator has access to the images storage.
VM defenceless while turned off:
No security software is operating.
It's responsibility of the provider of cloud services to
scan idle virtual machines regularly.
Companies should control if providers enable scanning on
regular basis in their cloud environment.
Efficiency
Security solutions designed for x86 platform.
Without the virtualization in mind.
Massive scanning of multiple resources will cause a
dramatic decrease in efficiency of the whole cloud
structure.
Solution is in scanning on the hypervisor level:
No concurrency for resources on the VM level.
Companies should control if providers enables scanning on
regular basis in their cloud environment.
Data integrity
In a cloud attacked space is bigger and under
greater risks than in traditional environment.
It's critically important to prove that the data were
not compromised to internal and external auditors.
Logs must be analyzed for system integrity, file
integrity, as well as internal activities.
Compliance with security standards (PCI DSS, HIPAA, etc.)
provides “safe haven” in case of data security breach.
Update management
Once a company subscribed to a cloud service,
updating their applications is not provider's
responsibility.
About 90% of data security breaches occurred due to
misunderstanding of update management.
If timely update is impossible or impracticable.
“Virtual patches”: Blocking vulnerability attacks on
the network level.
Laws and policies
Data security standards (PCI DSS, HIPAA, GLBA,
etc.) and security audit recommendations (ISO,
SAS70, etc.) require ability to prove compliance
with Law regardless physical loction of the cloud
system
Service-Level Agreements must provide for access
to physical servers, virtual servers, firewall
configuration, intrusion detection and prevention
systems, logs, and anti-viruses.
Firewalls
Reduce the attacked space.
Cloud firewalls must comprise:
– VM isolation;
– input/output traffic filtration;
– IP protocols coverage (TCP, UDP, ICMP, etc.);
– IP frameworks coverage (TCP, ARP, etc.);
– DoS attacks prevention;
– sniffing and spoofing prevention.
Also control over the physical location.
Intrusion detection & prevention
Primary task to screen operating system's and
applications' vulnerabilities until they will be
eliminated.
Must provide protection from known, as well as
unknown (zero-day) vulnerabilities.
Must provide protection from XSS and SQL
injection.
Data integrity
Detecting and preventing unauthorized changes
in the operating system, files, and/or registers.
Must include:
– scheduled scanning and scanning on demand;
– files' formats, properties, attributes and CRC;
– directories' properties and attributes;
– configurability of the scope of scanned objects;
– reports (for audit).
Log analysis
Detecting events, significant from the point of
view of the information security, in the logs.
Suspicious behaviour.
Administrators' actions.
Statistical analysis of events throughout the whole
cloud infrastructure.
Security of Information and Event Management (SIEM).
Measures against malicious s/w
Anti-viruses adpted for the cloud environment.
VMsafe: Software interface provided from the
hypervisor (Vmware).
Scanning active and idle virtual machines.
Checking integrity of the VM's as well as their
content (files, applications, and registers).
Guarantees economical use of the physical resources.
VMsafe
Protects active as well as idle virtual machines.
Prevents blocking and/or uninstalling anti-viruses.
Integrated with the cloud management control panel
(Vmware vCenter).
Automatic configuration of new virtual machines.
Any questions?
Thank you for your attention!

More Related Content

What's hot (19)

PPTX
Basic Technology - Module 13 cloud computing
solarisyougood
 
PDF
Cloud computing reference architecture from nist and ibm
Richard Kuo
 
PPTX
Cloud computing security
Gahya Pandian
 
PPT
Cloud Computing and the Datacenter of the Future
Appistry
 
PDF
Cloud computing
ananyaakk
 
PDF
Disadvantages of Cloud Computing
Maikel Mardjan
 
PPTX
Cloud Computing security issues
Pradeepti Kamble
 
PPTX
Cloud computing ppt
Pravesh ARYA
 
DOC
Cloud Computing Documentation Report
Usman Sait
 
PDF
Cloud Computing Architecture
Animesh Chaturvedi
 
PPTX
Cloud computing architecture
V.V.Vanniapermal College for Women
 
PPTX
Debunking common cloud hosting myths
manoharparakh
 
PPT
Cloud deployment models
Ashok Kumar
 
PPT
Cloud Computing Ppt
Anjoum .
 
PPTX
Cloud computing
Jayant Chauhan
 
PPTX
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
PPSX
Key Challenges In CLOUD COMPUTING
Atul Chounde
 
PPT
Cloud computing security
Akhila Param
 
PDF
20 Cloud Computing Quotes You Can't Miss
Nerdio
 
Basic Technology - Module 13 cloud computing
solarisyougood
 
Cloud computing reference architecture from nist and ibm
Richard Kuo
 
Cloud computing security
Gahya Pandian
 
Cloud Computing and the Datacenter of the Future
Appistry
 
Cloud computing
ananyaakk
 
Disadvantages of Cloud Computing
Maikel Mardjan
 
Cloud Computing security issues
Pradeepti Kamble
 
Cloud computing ppt
Pravesh ARYA
 
Cloud Computing Documentation Report
Usman Sait
 
Cloud Computing Architecture
Animesh Chaturvedi
 
Cloud computing architecture
V.V.Vanniapermal College for Women
 
Debunking common cloud hosting myths
manoharparakh
 
Cloud deployment models
Ashok Kumar
 
Cloud Computing Ppt
Anjoum .
 
Cloud computing
Jayant Chauhan
 
NIST Cloud Computing Reference Architecture
Thanakrit Lersmethasakul
 
Key Challenges In CLOUD COMPUTING
Atul Chounde
 
Cloud computing security
Akhila Param
 
20 Cloud Computing Quotes You Can't Miss
Nerdio
 

Similar to Cloud Computing (20)

PDF
The ultimate guide to cloud computing security-Hire cloud expert
Chapter247 Infotech
 
DOCX
CSEC630 individaul assign
Ronald Jackson, Jr
 
PDF
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Miller Energy, Inc.
 
PDF
Defending Industrial Control Systems From Cyberattack
Mountain States Engineering and Controls
 
PDF
Seven recommendations for bolstering industrial control system cyber security
CTi Controltech
 
PDF
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
PDF
Defending industrial control systems from cyber attack
Analynk Wireless, LLC
 
PDF
Defending Industrial Control Systems From Cyberattack
CTi Controltech
 
PDF
Is it an internal affair
George Delikouras
 
PPTX
Rik Ferguson
CloudExpoEurope
 
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
PDF
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
PPTX
Cloud Security_ Unit 4
Integral university, India
 
PDF
N017259396
IOSR Journals
 
PDF
Internal & External Attacks in cloud computing Environment from confidentiali...
iosrjce
 
DOCX
PROJECT REPORT.docx
Sakamsivasankarreddy
 
PDF
PCI DSS & Virtualization
TobyRobinson13
 
PDF
Challenges with Cloud Security by Ken Y Chan
Ken Chan
 
PDF
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
Protected Harbor
 
The ultimate guide to cloud computing security-Hire cloud expert
Chapter247 Infotech
 
CSEC630 individaul assign
Ronald Jackson, Jr
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Miller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Mountain States Engineering and Controls
 
Seven recommendations for bolstering industrial control system cyber security
CTi Controltech
 
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
Defending industrial control systems from cyber attack
Analynk Wireless, LLC
 
Defending Industrial Control Systems From Cyberattack
CTi Controltech
 
Is it an internal affair
George Delikouras
 
Rik Ferguson
CloudExpoEurope
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
Cloud Security_ Unit 4
Integral university, India
 
N017259396
IOSR Journals
 
Internal & External Attacks in cloud computing Environment from confidentiali...
iosrjce
 
PROJECT REPORT.docx
Sakamsivasankarreddy
 
PCI DSS & Virtualization
TobyRobinson13
 
Challenges with Cloud Security by Ken Y Chan
Ken Chan
 
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
Protected Harbor
 
Ad

More from Commit Software Sh.p.k. (18)

PPTX
Building real time app by using asp.Net Core
Commit Software Sh.p.k.
 
PDF
Let's talk about GraphQL
Commit Software Sh.p.k.
 
PPTX
Arduino and raspberry pi for daily solutions
Commit Software Sh.p.k.
 
DOCX
Lets build a neural network
Commit Software Sh.p.k.
 
PPTX
Hacking a WordPress theme by its child
Commit Software Sh.p.k.
 
PPTX
Magento 2 : development and features
Commit Software Sh.p.k.
 
PPTX
Building modern applications in the cloud
Commit Software Sh.p.k.
 
PPTX
Design patterns: Understand the patterns and design your own
Commit Software Sh.p.k.
 
PPTX
Blockchain - a simple implementation
Commit Software Sh.p.k.
 
PPTX
Laravel and angular
Commit Software Sh.p.k.
 
PPTX
Drupal 7: More than a simple CMS
Commit Software Sh.p.k.
 
PPTX
Intro to Hybrid Mobile Development && Ionic
Commit Software Sh.p.k.
 
PDF
Wordpress development 101
Commit Software Sh.p.k.
 
PPTX
Ruby on rails
Commit Software Sh.p.k.
 
PDF
Web apps in Python
Commit Software Sh.p.k.
 
PPTX
Laravel - The PHP framework for web artisans
Commit Software Sh.p.k.
 
PDF
Automation using RaspberryPi and Arduino
Commit Software Sh.p.k.
 
PPTX
ASP.NET - Building Web Application..in the right way!
Commit Software Sh.p.k.
 
Building real time app by using asp.Net Core
Commit Software Sh.p.k.
 
Let's talk about GraphQL
Commit Software Sh.p.k.
 
Arduino and raspberry pi for daily solutions
Commit Software Sh.p.k.
 
Lets build a neural network
Commit Software Sh.p.k.
 
Hacking a WordPress theme by its child
Commit Software Sh.p.k.
 
Magento 2 : development and features
Commit Software Sh.p.k.
 
Building modern applications in the cloud
Commit Software Sh.p.k.
 
Design patterns: Understand the patterns and design your own
Commit Software Sh.p.k.
 
Blockchain - a simple implementation
Commit Software Sh.p.k.
 
Laravel and angular
Commit Software Sh.p.k.
 
Drupal 7: More than a simple CMS
Commit Software Sh.p.k.
 
Intro to Hybrid Mobile Development && Ionic
Commit Software Sh.p.k.
 
Wordpress development 101
Commit Software Sh.p.k.
 
Ruby on rails
Commit Software Sh.p.k.
 
Web apps in Python
Commit Software Sh.p.k.
 
Laravel - The PHP framework for web artisans
Commit Software Sh.p.k.
 
Automation using RaspberryPi and Arduino
Commit Software Sh.p.k.
 
ASP.NET - Building Web Application..in the right way!
Commit Software Sh.p.k.
 
Ad

Recently uploaded (20)

PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PPTX
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
PDF
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
PDF
How Agentic AI Networks are Revolutionizing Collaborative AI Ecosystems in 2025
ronakdubey419
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PPTX
Farrell__10e_ch04_PowerPoint.pptx Programming Logic and Design slides
bashnahara11
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PDF
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PDF
Supabase Meetup: Build in a weekend, scale to millions
Carlo Gilmar Padilla Santana
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PDF
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
PDF
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
PDF
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
PDF
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
PPTX
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Virtual Threads in Java: A New Dimension of Scalability and Performance
Tier1 app
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
classification of computer and basic part of digital computer
ravisinghrajpurohit3
 
SAP GUI Installation Guide for macOS (iOS) | Connect to SAP Systems on Mac
SAP Vista, an A L T Z E N Company
 
How Agentic AI Networks are Revolutionizing Collaborative AI Ecosystems in 2025
ronakdubey419
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Farrell__10e_ch04_PowerPoint.pptx Programming Logic and Design slides
bashnahara11
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
WatchTraderHub - Watch Dealer software with inventory management and multi-ch...
WatchDealer Pavel
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
Supabase Meetup: Build in a weekend, scale to millions
Carlo Gilmar Padilla Santana
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
How to Download and Install ADT (ABAP Development Tools) for Eclipse IDE | SA...
SAP Vista, an A L T Z E N Company
 
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
Salesforce Implementation Services Provider.pdf
VALiNTRY360
 
Employee salary prediction using Machine learning Project template.ppt
bhanuk27082004
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 

Cloud Computing

  • 1. Security of cloud computing Thirty-nine years of my life had passed before I understood that clouds were not my enemy. Iimani David Paul Neumann [email protected]
  • 2. Infrastructure as a Service Flexibility. Economy of resources. Free choice of computing power. New risks to providers and enterprises.
  • 3. Economy 1. IT infrastructure on demand – more cost-effective. 2. No redundant IT infrastructure, staff, and/or investments. 3. Flexible response to the needs in computing power. No restraining factor to innovations. Flexibility, scalability, configurability, mobility.
  • 4. Flexibility 1. Outsourcing hardware infrastructure; retaining IT management. 2. Outsourcing all aspects of IT management. 3. Mixed model; outsourcing some segments of IT management where applicable. Most often implemented on demand of enterprise administrative branches.
  • 5. IDC market research International Data Corporation Surveyed top managers of 244 leading IT companies world-wide. As early as in 2008.
  • 6. Primary concerns Will I have the same level of control over the IT infrastructure and the data? Does the IT infrastructure comply with the Law? How can I demonstrate it to the auditors? How will I prove to my company that the IT system is secure? How do I know that Service-Level Agreements will be observed?
  • 7. Data-Processing Centre Risk 1: Placing sensitive data outside the secure perimeter may expose them to security risks. Risk 2: Placing sensitive data outside the secure perimeter may be incompatible with the Law.
  • 8. Secure perimeter Firewall. DMZ. Network segmentation. Intrusion Detection & Prevention Systems. Network monitors.
  • 9. Virtualization More computing power from physical servers' redundant capacities. Individual services; diversified configuration of applications. Smaller DPC's, server consolidation, reduced costs of operation.
  • 10. Virtualization kills secure perimeter Impossible to build and apply secure perimeter: Many servers are installed on one hardware platform. Generally low level of security. Data security has to be built around the data themselves and each server. Secure perimeter loses its sense. Only application of new line of defence allows for transferring IT operations to the cloud.
  • 11. Difficulties of cloud security Means of cloud security in principle the same as traditional means of system security. Providers of cloud services install virtual machines on the same physical servers. Increases efficiency of virtualization, compromises security. Traditional means of system security can't protect from attacks on virtual machines from within the same physical server.
  • 12. Access to the servers System administrators have access via Internet. Additional challenges to the system security. Unlike traditional systems with access control on physical level. Strict control of the administrators' access – critical. So is control and transparency of changes on the system level.
  • 13. VM state and volatility Virtual machines are dynamic. Can be easily – shut down and/or restarted; – cloned and moved between servers. – rolled back to a previous state; Vulnerabilities and/or misconfigurations can spread uncontrollably.
  • 14. Vulnerabilities & attacks from within The same level of risk to be hacked or infected. In fact it's even higher: A number of VM's working at the same time on a physical server increases the attacked space. New challenge: hacking or infecting from within. On the same physical server one virtual machine may attack another virtual machine. Intrusion Detection and Prevention systems now must be capable of working on the VM level, regardless of the location of that VM in the cloud.
  • 15. Idle virtual machines A VM may be compromised even if turned off. Enough if the perpetrator has access to the images storage. VM defenceless while turned off: No security software is operating. It's responsibility of the provider of cloud services to scan idle virtual machines regularly. Companies should control if providers enable scanning on regular basis in their cloud environment.
  • 16. Efficiency Security solutions designed for x86 platform. Without the virtualization in mind. Massive scanning of multiple resources will cause a dramatic decrease in efficiency of the whole cloud structure. Solution is in scanning on the hypervisor level: No concurrency for resources on the VM level. Companies should control if providers enables scanning on regular basis in their cloud environment.
  • 17. Data integrity In a cloud attacked space is bigger and under greater risks than in traditional environment. It's critically important to prove that the data were not compromised to internal and external auditors. Logs must be analyzed for system integrity, file integrity, as well as internal activities. Compliance with security standards (PCI DSS, HIPAA, etc.) provides “safe haven” in case of data security breach.
  • 18. Update management Once a company subscribed to a cloud service, updating their applications is not provider's responsibility. About 90% of data security breaches occurred due to misunderstanding of update management. If timely update is impossible or impracticable. “Virtual patches”: Blocking vulnerability attacks on the network level.
  • 19. Laws and policies Data security standards (PCI DSS, HIPAA, GLBA, etc.) and security audit recommendations (ISO, SAS70, etc.) require ability to prove compliance with Law regardless physical loction of the cloud system Service-Level Agreements must provide for access to physical servers, virtual servers, firewall configuration, intrusion detection and prevention systems, logs, and anti-viruses.
  • 20. Firewalls Reduce the attacked space. Cloud firewalls must comprise: – VM isolation; – input/output traffic filtration; – IP protocols coverage (TCP, UDP, ICMP, etc.); – IP frameworks coverage (TCP, ARP, etc.); – DoS attacks prevention; – sniffing and spoofing prevention. Also control over the physical location.
  • 21. Intrusion detection & prevention Primary task to screen operating system's and applications' vulnerabilities until they will be eliminated. Must provide protection from known, as well as unknown (zero-day) vulnerabilities. Must provide protection from XSS and SQL injection.
  • 22. Data integrity Detecting and preventing unauthorized changes in the operating system, files, and/or registers. Must include: – scheduled scanning and scanning on demand; – files' formats, properties, attributes and CRC; – directories' properties and attributes; – configurability of the scope of scanned objects; – reports (for audit).
  • 23. Log analysis Detecting events, significant from the point of view of the information security, in the logs. Suspicious behaviour. Administrators' actions. Statistical analysis of events throughout the whole cloud infrastructure. Security of Information and Event Management (SIEM).
  • 24. Measures against malicious s/w Anti-viruses adpted for the cloud environment. VMsafe: Software interface provided from the hypervisor (Vmware). Scanning active and idle virtual machines. Checking integrity of the VM's as well as their content (files, applications, and registers). Guarantees economical use of the physical resources.
  • 25. VMsafe Protects active as well as idle virtual machines. Prevents blocking and/or uninstalling anti-viruses. Integrated with the cloud management control panel (Vmware vCenter). Automatic configuration of new virtual machines.
  • 26. Any questions? Thank you for your attention!