SlideShare a Scribd company logo
Delivering	real	world	results	
from	cloud	deployments
Joel	Friedman
Chief	Technology	and	Security	Officer,	Datapipe
Datapipe	are	Experts	in	the	Cloud
2
Gartner	MQ	for	Cloud-Enabled	Managed	Hosting,	2015	 Forrester	Hosted	Private	Cloud	Wave	Study,	2014
Security
Datapipe’s	industry-leading	advanced	
security	services	provide:
• Intrusion	detection	and	threat	
management
• Security	event	and	log	analysis	and	
management
• Data	encryption	for	multiple	platforms
• Two-factor	authorization	for	role-based	
and	user-based	access	control
• Web	application	firewall	to	protect	
against	internet-based	threats
Secure	Controls
Secure	Administration
Secure	Infrastructure
The	Datapipe	Security	Method
3
Security	Use	Cases
Architected	and	deployed	a	true	PCI	compliant	hybrid	IT	solution.	The	
enterprise	application	environment	maintained	PCI	compliance	across	
the	AWS	environment	and	a	managed,	physical	Oracle	database.
Deployed	and	managed	a	multi-region	ticketing	system	using	a	PCI	
compliant	hosted	private	cloud.	Led	the	client	migration	of	applications	
to	a	PCI	environment,	providing	a	global	compliant	footprint	for	
business	expansion.
Quickly	and	efficiently	enforced	compliance	of	environments	through	
instrumentation	and	“auto-fix”	– sensing	and	responding	to	issues	or	
changes	and	reverting	the	environment	to	compliant	standards.
+
4
Automation	&	Orchestration
Datapipe	uses	multi	cloud	
automation	and	orchestration	tools	
to:
• Optimize	the	deployment	of	multi-
Cloud	environments
• Improve	response	times	through	
Standard	resource	configurations
• Reduce	errors	through	standards	
management
• Full	cloud	services	lifecycle	
management
• Quickly	deploy	updates	and	patches
Best	Practices
Automation	Tools
Self	Healing	Configuration
The	Datapipe	Method
5
Automation	&	Orchestration	Use	Cases
Automated	the	deployment	of	a	large-scale	e-commerce	production	
environment	on	AWS,	spinning	up	the	environment	in	4	minutes.	By	
automating,	Datapipe	enabled	instant	repeatability	as	new	regions	
were	deployed.
Automated	the	configuration	and	deployment	of	a	large-scale	Hosted	
Private	Cloud	infrastructure	– completed	in	minutes	versus	days.	
Implemented	complete	automation	of	software	configuration	and	
installation.
Quickly	and	efficiently	enforced	compliance	of	environments	through	
instrumentation	and	“auto-fix”	– sensing	and	responding	to	issues	or	
changes	and	reverting	the	environment	to	compliant	standards.
6
Proactive	Monitoring
Advanced	monitoring	for	both	physical	
and	cloud	environments:
• Client-defined	thresholds	are	established	
and	data	collection	mechanisms	are	
deployed	to	monitor	the	client’s	entire	
infrastructure	solutions
• Ensures	issues	are	detected	and	resolved	
before	performance	or	availability	are	
negatively	impacted
• Monitoring	and	analysis	of	network	flow	
data	provides	in-depth	insight	into	
network	traffic,	performance,	and	
utilization
Infrastructure	Monitoring
Application	Monitoring
Network	Monitoring
The	Datapipe	Monitoring	Method
7
Proactive	Monitoring	Use	Cases
Deployed	a	custom	monitoring	solution	for	a	large-scale,	elastic	multi-
region	AWS	environment.		Implemented	auto-discovery	of	every	new	
and	decommissioned	machine,	followed	by	the	automated	deployment	
of	measuring	devices	and	monitoring.
Deployed	a	global	monitoring	solution	for	a	hosted	private	cloud	that	
spanned	three	continents	and	four	data	centers.	Implemented	a	
custom	dashboard	which	allowed	the	client	to	view	all	data	and	
reporting	in	a	single	pane	of	glass.
Deployed	a	monitoring	solution	for	a	hybrid	IT	environment.	This	
included	monitoring	the	back-end	infrastructure	and	database	in	a	
traditional	stack,	and	the	application	layer	running	on	AWS.		Custom	
designed	to	support	unique	data	pulls	for	the	client.
+
8
Lifecycle	of	Security,	Automation	and	Monitoring	
Plan
ü Client	current	state	analysis,	cloud	
readiness,	planning	and	solution	
design
Build
ü Account	and	security	management,	
deploy	environments	and	integrate	
into	IT	operations.
Run
ü Validation	and	implementation	of	
managed	operations	with	ongoing	
optimization
9

More Related Content

PPT
Cloud Use Cases And Standards
PPTX
Service Fabric and Azure Service Fabric Mesh introduction
PPTX
DotnetConf - Cloud native and .Net5 announcements
PPTX
Monitoring Containerized Micro-Services In Azure
PDF
John Willis Cc Use Cases
PDF
Aws serverless multi-tier_architectures
PPTX
Azure Container Instance
PPTX
Presentation Tier optimizations
Cloud Use Cases And Standards
Service Fabric and Azure Service Fabric Mesh introduction
DotnetConf - Cloud native and .Net5 announcements
Monitoring Containerized Micro-Services In Azure
John Willis Cc Use Cases
Aws serverless multi-tier_architectures
Azure Container Instance
Presentation Tier optimizations

What's hot (20)

DOC
Praveen Kumar Resume
PPTX
Lets talk about: Azure Kubernetes Service (AKS)
PPTX
TugaIT 2016 - Docker and the world of “containerized" environments​
PPTX
Azure Container Services​
PPTX
Azure Container Services​
PDF
Container orchestration k8s azure kubernetes services
PDF
Bandwidth: Use Cases for Elastic Cloud on Kubernetes
PPTX
Tooling and DevOps for the Hybrid Cloud with Azure and Azure Stack
PPTX
Monitor Cloud Resources using Alerts & Insights
PPTX
Innovation anywhere with microsoft azure arc
PDF
Building Hybrid Cloud Apps with Azure and Azure stack
PDF
Virtual Global Azure 2020 - Azure Monitor
PPTX
Debugging and Interacting with Production Applications - MS Online Tech Forum
PPTX
Deploying a 3 tier application using docker
PPTX
Manage your kubernetes cluster with cluster api, azure and git ops
PPTX
Application Development on Metapod
PPTX
Event Grid Unplugged - Using events as the fuel powering your applications
PPTX
Cisco integrated system for microsoft azure stack
PPTX
Microsoft Azure News - 2018 June
PPTX
Azure Logic Apps
Praveen Kumar Resume
Lets talk about: Azure Kubernetes Service (AKS)
TugaIT 2016 - Docker and the world of “containerized" environments​
Azure Container Services​
Azure Container Services​
Container orchestration k8s azure kubernetes services
Bandwidth: Use Cases for Elastic Cloud on Kubernetes
Tooling and DevOps for the Hybrid Cloud with Azure and Azure Stack
Monitor Cloud Resources using Alerts & Insights
Innovation anywhere with microsoft azure arc
Building Hybrid Cloud Apps with Azure and Azure stack
Virtual Global Azure 2020 - Azure Monitor
Debugging and Interacting with Production Applications - MS Online Tech Forum
Deploying a 3 tier application using docker
Manage your kubernetes cluster with cluster api, azure and git ops
Application Development on Metapod
Event Grid Unplugged - Using events as the fuel powering your applications
Cisco integrated system for microsoft azure stack
Microsoft Azure News - 2018 June
Azure Logic Apps
Ad

Similar to Deploying Cloud Use Cases (20)

PPTX
BT Cloud Enterprise Service Store - Rob Rowlingson
PPTX
Datacenter 2014: Trend Micro - Bill MCGee
PPTX
MDM - airwatch
PPTX
Student Presentation on Cloud Computing (MCO-205)
PPTX
Gitex journey to the cloud
PPTX
Rik Ferguson
PDF
MBT Webinar: Does the security of your business data keep you up at night?
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PDF
IBM Cloud Pak for MCM Partner Add Ons Humio, SysDig, and Turbonomic
PPTX
Azure Security Overview
PDF
Check Point vSEC for Microsoft Azure Webinar
PDF
azure-security-overview-slideshare-180419183626.pdf
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PDF
Presentation cloud security the grand challenge
PDF
Security Considerations When Using Cloud Infrastructure Services.pdf
PDF
2019 10-app gate sdp 101 09a
PDF
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
PPT
Cisco Security Technical Alliances
PDF
Key Trends Fueling Digital Transformation Services.pdf
BT Cloud Enterprise Service Store - Rob Rowlingson
Datacenter 2014: Trend Micro - Bill MCGee
MDM - airwatch
Student Presentation on Cloud Computing (MCO-205)
Gitex journey to the cloud
Rik Ferguson
MBT Webinar: Does the security of your business data keep you up at night?
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
IBM Cloud Pak for MCM Partner Add Ons Humio, SysDig, and Turbonomic
Azure Security Overview
Check Point vSEC for Microsoft Azure Webinar
azure-security-overview-slideshare-180419183626.pdf
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Presentation cloud security the grand challenge
Security Considerations When Using Cloud Infrastructure Services.pdf
2019 10-app gate sdp 101 09a
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Cisco Security Technical Alliances
Key Trends Fueling Digital Transformation Services.pdf
Ad

More from Jason Singh (6)

PDF
D+M Group_Digital Transformation_Datapipe
PDF
Use Case_Empowering Transformation_Equinix
PDF
Best Practice Public Cloud Security
PDF
Rise of the Superuser
PDF
Enabling the New Breed
PPTX
Enabling the New Breed
D+M Group_Digital Transformation_Datapipe
Use Case_Empowering Transformation_Equinix
Best Practice Public Cloud Security
Rise of the Superuser
Enabling the New Breed
Enabling the New Breed

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Machine Learning_overview_presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mushroom cultivation and it's methods.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
Machine Learning_overview_presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
1. Introduction to Computer Programming.pptx
Programs and apps: productivity, graphics, security and other tools
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
Assigned Numbers - 2025 - Bluetooth® Document
Per capita expenditure prediction using model stacking based on satellite ima...
MIND Revenue Release Quarter 2 2025 Press Release
Mushroom cultivation and it's methods.pdf
OMC Textile Division Presentation 2021.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Deploying Cloud Use Cases