• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

by on Nov 25, 2013

  • 460 views

(Presented by Trend Micro) ...

(Presented by Trend Micro)
In this session, you learn about the AWS shared security model, including considerations and best practices for deploying a secure and compliant application on AWS, and how to leverage the features and APIs provided by AWS. You also learn how to use best-in-class security and compliance solutions that have been optimized for enterprises deploying in AWS.

Key topics covered are Amazon EC2 and Amazon EBS encryption, including several key management methodologies as well as intrusion detection and prevention, anti-malware, anti-virus, integrity monitoring, firewall, and web reputation in the cloud.

Statistics

Views

Total Views
460
Views on SlideShare
460
Embed Views
0

Actions

Likes
0
Downloads
10
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013 How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013 Presentation Transcript