secure public cloud with end-user controlled key management
DESCRIPTION
Nimbus Ninjas. Secure public cloud with end-user controlled key management. Talked to 3 cloud service providers & 12 individual cloud users. Business Model V3. IaaS Providers Ex. Enki , Varinsic , Savvis. Rent storage+mgmt but own your data. Rent storage+mgmt - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/1.jpg)
Secure public cloud with end-user controlled key management
Talked to 3 cloud service providers&
12 individual cloud users
Nimbus Ninjas
![Page 2: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/2.jpg)
IaaS ProvidersEx. Enki, Varinsic, Savvis
Prototype product
Outreach to security conscious customers
Product evaluation
Open source community
R&D costsSupport costs
Marketing costs S/W license
IP
PersonnelContent Mgmt ???
St.aaS Providers
Ex. Varinsic, Box
St.aaS Users – SMB+EntEx. Box users
High degree of trust & confidence
Indemnify against content liability
St.aaS, IaaS Providers
St.aaS User ConsumersEx. Dropbox, AMZN clouddrive users
IaaS, PaaS
IaaS Users – SMB+Ent
Ex. HealthcareStartups, LeagalFirms,
Rent storage+mgmtbut own your data
Provide secure storagemgmt service to customers
Rent storage+mgmtbut own your data
Securely shred data. Avoid provider lock-in.
Audit Trails ???
Direct
Business Model V3
Nimbus Ninjas
![Page 3: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/3.jpg)
Price Per server encrypted
Service AgreementService Agreement
IaaS ProvidersEx. Enki, Varinsic, Savvis
Prototype product
Outreach to security conscious customers
Product evaluation
Open source community
R&D costsSupport costs
Marketing costs
Price Per server encrypted
IP
PersonnelContent Mgmt ???
St.aaS ProvidersEx. Varinsic, Box
St.aaS Users – SMB+EntEx. Box usersHigh degree of trust
& confidence
Indemnify against content liability
IaaS ProvidersSt.aaS User Consumers
Ex. Dropbox, AMZN clouddrive users
IaaS, PaaS
IaaS Users (SMB+ Ent.)
Ex. HealthcareStartups, LeagalFirms, Provide secure storage
mgmt service to customers
Rent storage+mgmt
but own your data
Securely shred data. Avoid
provider lock-in.
Direct
Cloud Service Integrators (Dell)
Business Model V4
![Page 4: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/4.jpg)
• Informatica Revisited (SaaS, Cloud Data Integration)• Customer feedback: security is still a concern for enterprises who want to set up their
own cloud service• Pass/Fail test result – PASS
• Varinsic (IaaS)• Seeing demand for secure alternative to Box• Can build secure storage service using this + SDN (Nicira, Vyatta)• Legal firms, Govt. would like this• Pass/Fail test result - PASS
• Major enterprise software vendor (IaaS, SaaS) • “Ensuring secure data transportation is essential”• “Ensuring complete multi-tenancy isolation” is a basic requirement • Top features in mind: easy way to transport data in & out; support for mobile devices;
smooth collaboration among services• Pass/Fail test result – PASS
Customer Interview Takeaways
Nimbus Ninjas
![Page 5: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/5.jpg)
• 12 individual Dropbox users (Storage as a Service users) • 1 user would DEFINITELY pay for the added security layer• 1 user considers it very useful and may pay depending on the price• 2 paid user likes “the idea of having an option to encrypt my Dropbox files on a need
basis”• 3 consider themselves “normal people” who “hackers are not interested in”• 5 have “not found a situation” when encryption is necessary because they would
“never put files with privacy or personal information” online• Pass/Fail test result – NEED MORE DATA
• Consumer Market Competitors Exist• SecureSync (Dropbox)• CompletelyPrivateFiles (Box, Gmail)• BoxCryptor (Dropbox)• TrueCrypt• There exists a demand for Second-Level Security
Customer Interview Takeaways
Nimbus Ninjas
![Page 6: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/6.jpg)
IaaS Segment - Market Size Analysis
Nimbus Ninjas
IDC - Dec 2010 - Server Virtualization Market Forecast and Analysis
App Dynamics - Application Virtualization Outlook Survey
IDC - Dec 2010 - Worldwide Virtualization Tracker
Gartner – 2010 report
6.8 million server machines
9.0 millionVMs
1.3 million servers hosting Virtual Machines (VM)
1.25 millionSecurity Sensitive VMs (24% CAGR)
Nimbus Ninjas prospects
![Page 7: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/7.jpg)
2012 2013 2014 2015 2016
625775
961
1192
1478
1 8 48179
443
Market Size and Revenue Forecast ($ Million)
IaaS Segment - Market SizeIaaS Segment - NimbusNinjas Revenue
•Pricing: $500 per VM per year•Market: $625M market with a growth rate of
24% Nimbus Ninjas
![Page 8: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/8.jpg)
Goals for the week…• Last Weeks Goals
• Reach out to cloud providers [at the right level ! ]• 7 so far, Ongoing
• How do you ensure against becoming a feature (that existing vendors can “pick off”)
• Explored additional customer segments• Improved value proposition for multiple segments (focus on IaaS)
• Bottom-up method for establishing market size.• Done
• This Weeks Goals• Reach out to more Enterprise Users !
Nimbus Ninjas
![Page 9: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/9.jpg)
Backup
![Page 10: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/10.jpg)
Design Flow – IaaS
Nimbus NinjasEnterprise
Physical H/W + Hypervisor
IaaS ProviderH/W Virtalization Infrstructure VMWare,
Citrix etc.
![Page 11: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/11.jpg)
Design Flow – IaaSInstall
NimbusNinjas Client on VServers
Nimbus NinjasEnterprise
Physical H/W + Hypervisor
IaaS ProviderH/W Virtalization Infrstructure VMWare,
Citrix etc.
Key Server Appliance
(Key Management,Audit Trails)
Setup Onsite Key
Server
![Page 12: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/12.jpg)
Design Flow – St.aaS
Nimbus Ninjas
Corporate Users (Seats)
Confidential documents, Proprietary Code, Personal Stuff, etc…
St.aaS provider
User 1
User 2
Confidential documents, Proprietary Code, Personal Stuff, etc…
Corporate Active Directory Server
![Page 13: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/13.jpg)
Design Flow – St.aaS
Nimbus Ninjas
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^St.aaS provider
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%^(&^&^&#$@#^#^Confidential documents, Proprietary Code, Personal Stuff, etc…
Confidential documents, Proprietary Code, Personal Stuff, etc…Corporate Users (Seats)
Key Server Appliance
(Key Management,Audit Trails …)
Corporate Active Directory Server
User 1
User 2
Encrypt, Decrypt on endpoint
Install NimbusNinjas client on
endpoint
Setup Onsite Key
Server
![Page 14: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/14.jpg)
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
Design Flow – Individual Users
Nimbus Ninjas
Key Escrow Service(Authentication,
key management)
Individual Cloud Users
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
!@#2%$#@4!43%&$#%^(^&^&^@$@#^%
![Page 15: Secure public cloud with end-user controlled key management](https://reader034.vdocuments.net/reader034/viewer/2022051421/56816357550346895dd406d2/html5/thumbnails/15.jpg)
Business Model V2
Nimbus Ninjas