Microsoft shares about cloud computing and network security

Sep 30th at 15:19
30-09-2014 15:19:28+07:00

Microsoft shares about cloud computing and network security

As the guest speaker today at AmCham’s Global Leaders Luncheon co-hosted with Microsoft and Vietnam Chamber of Commerce and Industry at Sheraton Hanoi Hotel, executive vice president, general counsel of Microsoft Corporation Brad Smith shared with VIR about Microsoft cloud computing and services, focusing on security policy and network security.

How does Microsoft ensure that data is safe on the cloud?

Microsoft cloud services are designed, developed, and are operated to help ensure customer data is secure.

Microsoft is committed to delivering trustworthy cloud services, and is in a unique position to do so based on its experience, investments, partnerships in the industry and history of commitment over the past 10-plus years toward the creation and delivery of secure, private, and reliable computing experiences.

To help protect against Internet-based security threats and continuously asses and enhance the security of Microsoft services, Microsoft utilises Operational Security Assurance (OSA). OSA is a framework that incorporates the knowledge gained through a variety of capabilities that are unique to Microsoft, and deep awareness of the cybersecurity threat landscape. OSA combines this knowledge with the experience of running hundreds of thousands of servers in data centres around the world that deliver more than 200 online services to more than a billion customers and 20 million businesses in 88 countries.

OSA helps make Microsoft cloud-based services’ infrastructure more resilient to attack by decreasing the amount of time needed to prevent, detect, and respond to real and potential Internet-based security threats, thereby increasing the security of those services for customers.

How does Microsoft help ensure security is built into its products and services?

Cybersecurity and data privacy are engineered into Microsoft products and services from the initial design stage and throughout the development process using the Security Development Lifecycle (SDL) – a holistic and comprehensive software development process for writing more secure and privacy-enhanced code, and enabling more reliable products and services.

How does Microsoft work with governments?

Throughout the history of our company, we have worked with governments to help them build and deploy more secure IT infrastructure and services to protect their citizens and national economies.

We work with governments, businesses, and other industry leaders to help enforce and shape legislative proposals, harmonise laws across jurisdictions, develop responsible business practices, and strengthen self-regulatory mechanisms that lead to greater protections for individuals and their personal information

How closely do you work with the Vietnamese government to gather users’ data?

We do not provide any government with direct and unfettered access to our customers’ data. We only comply with valid legal orders for customer data that are targeted at specific accounts and identifiers, and we only provides the specific data mandated by the relevant legal demand. Our transparency reports demonstrate clearly that only a tiny fraction – fractions of a per cent – of our customers have ever been subject to a government demand related to criminal law or national security.

How should companies address cyber threats?

There are a number of steps that companies can take to instill confidence that customers’ data will be handled securely. First, those managing IT systems must improve their basic security fundamentals to counter the opportunistic threats and make persistent and determined adversaries work harder. This includes migrating to newer, more secure systems, patching vulnerabilities promptly, configuring systems properly (in part through increased automation), educating users about the risks of social engineering, and taking other steps - whether they involve people, processes or technology - to manage risks more effectively than they do today.

The second part of the strategy involves fundamentally altering their security posture to address the persistent and determined adversary. The security strategy deployed for blunting opportunistic threats- security strategy focused predominantly on prevention and secondarily on incident response- will not be enough. We must focus on three key areas: prevention, detection, and recovery

vir



NEWS SAME CATEGORY

VN offers potential investment opportunities: Dragon Capital CEO

Viet Nam has attractive and potential investment opportunities and this is the message that Dragon Capital will convey to its international investors, said the...

France strike affects VN carrier

The national flag carrier Vietnam Airlines said yesterday that a number of flights between Vietnam and France was cancelled in this month, affecting about 1,400...

City economy grows 8.9 per cent

HCM City's economic output in the first nine months of 2014 was VND593.5 trillion (over US$28.1 billion), an increase of 8.9 per cent year-on-year, according to the...

PM okays Phan Thiet Airport plan

Prime Minister Nguyen Tan Dung has approved in principle a plan to build Phan Thiet Airport in the central province of Binh Thuan under the BOT...

Foreign visitor arrivals up

Viet Nam welcomed more than 6 million international arrivals during the first nine months of 2014, up by 10.42 per cent compared to the same period last year.

More firms close, fewer open in 2014

More businesses in Viet Nam have either suspended or shut down operations in the first three quarters of 2014, according to the General Statistics Office (GSO).

More room to grow in Vietnam-Germany trade, investment: GTaI chief

As trade and investment relations between the two countries have yet meet their full potential, there is room to grow, especially when free trade agreement between...

Modern trade centers push buyers away, Vietnam traders say

The planned trade centers that are set to replace traditional markets in many big cities in Vietnam may well share the fate of modern shopping venues in Hanoi...

MIC tells MO to pocket 70% of information content service revenue at maximum

The Ministry of Information and Communication has limited mobile network operators’ profits from working with information content-service providers must to a...

Vietnam's Hanel DTT plans Myanmar e-gov't platform

Viet Nam's Hanel DTT Technology Joint Stock Company signed a cooperation agreement with Sundrew Myanmar Company to build an open e-government platform (OEP) based...


MOST READ


Back To Top