Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >

Securing a Cloud Computing Architecture

11 April,19 at 11:49 AM


This chalktalk begins by demystifying the terminology around cloud computing architectures and examines the types of enterprise projects that are most commmonly being deployed to the cloud. You'll then learn the advantages of a unique solution that leverages identity information and policy information inside your enterprise Active Directory to automate security and management of Linux-based cloud servers. For additional reading, see our Cloud Security Step by Step guide.


Running Time: 25 minutes


David McNeely, Director, Product Management


Frank Cabri, Vice President, Marketing & Business Development


Topics Covered

  • Demystifying the terminology around cloud computing architectures: intrastructure as a service (IAAS), platform as a service (PAAS) and software as a service (SAAS)
  • The types of enterprise projects that are being deployed in the cloud
  • How to set up your internal and DMZ-based Active Directory forests to enable centralized management of Linux-based cloud servers
  • The role that IPsec and Centrify DirectSecure plays in securing Active Directory in the DMZ
  • The different ways in which cloud servers can be joined to Active Directory, including through the cloud-enabled Centrify DeploymentManager console and preloaded server templates
  • The need for auditing user activity to ensure that cloud systems are being accessed only by authorized users and how Centrify DirectAudit improves over traditional log analysis solutions
  • Leveraging the power of Active Directory for efficient centralized, group-based management of resources