<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Shatakshi, Author at Techyaz.com</title>
	<atom:link href="https://techyaz.com/author/shatakshi/feed/" rel="self" type="application/rss+xml" />
	<link>https://techyaz.com/author/shatakshi/</link>
	<description>Tips, Tutorials and How-to Topics</description>
	<lastBuildDate>Mon, 23 Sep 2019 11:22:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>

<image>
	<url>https://techyaz.com/wp-content/uploads/2017/11/cropped-Site-icon-150x150.png</url>
	<title>Shatakshi, Author at Techyaz.com</title>
	<link>https://techyaz.com/author/shatakshi/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</title>
		<link>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/</link>
					<comments>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Mon, 23 Sep 2019 10:56:08 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2476</guid>

					<description><![CDATA[<p>Here we are going to discuss about top Cloud Data Center locations. Best Cloud Service Providers ensure to meet or exceed Tier 3 levels of security for their Data Center. Security layer of Clod Service Provider&#8217;s (CSP) Data center comprises&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/">Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here we are going to discuss about top Cloud Data Center locations. Best Cloud Service Providers ensure to meet or exceed Tier 3 levels of security for their Data Center. Security layer of Clod Service Provider&#8217;s (CSP) Data center comprises of Physical Layer, Infrastructure Layer, data layer and Ecological environmental layer. The design and systems of data centers are to protect them from man-made and natural risks. Major cloud providers are certified for various regulations and industry requirements such as PCI, DSS, SOC1, SOC2, HIPAA, best practices/frameworks like CSA CCM, and global/regional regulations like the EU GDPR etc.</p>
<h2><span style="color: #0000ff;"><strong>AWS Data Center Locations</strong></span></h2>
<p>The AWS Cloud Data Center locations are spread across the globe with 22 Regions and 69 AZ (Availability Zones), AWS has broadcast plans for 9 new Availability Zones and 3 additional Regions in Cape Town, Jakarta, and Milan.</p>
<p><img fetchpriority="high" decoding="async" width="998" height="542" class="wp-image-2477" src="https://techyaz.com/wp-content/uploads/2019/09/word-image.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image.png 998w, https://techyaz.com/wp-content/uploads/2019/09/word-image-300x163.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-768x417.png 768w" sizes="(max-width: 998px) 100vw, 998px" /></p>
<p><strong>Image :AWS Data center Location Map</strong></p>
<h3><span style="color: #008000;"><strong>AWS Regions</strong></span></h3>
<h4>North America</h4>
<ol>
<li>US East Region (Northern Virginia)<br />
EC2 Availability Zones: 6<br />
<em>Launched 2006</em></li>
<li>US East Region (Ohio)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>US West Region (Oregon)<br />
EC2 Availability Zones: 4<br />
<em>Launched 2011</em></li>
<li>US West (Northern California)<br />
EC2 Availability Zones: 3*<br />
<em>Launched 2009</em></li>
<li>GovCloud (US-West)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2011</em></li>
<li>GovCloud (US-East)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2018</em></li>
<li>Canada (Central) Region**<br />
EC2 Availability Zones: 2<br />
<em>Launched 2016</em></li>
</ol>
<h4>South America</h4>
<ol>
<li>South America Region (São Paulo)<br />
EC2 Availability Zones: 3*<br />
Launched 2011</li>
</ol>
<h4>Europe /Middle east/Africa</h4>
<ol>
<li>Europe Region (London)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Stockholm)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Frankfurt)<br />
EC2 Availability Zones: 3</li>
<li>Europe Region (Paris)<br />
EC2 Availability Zones: 3<br />
Middle East Region(Bahrain)<br />
EC2 Availability Zones: 3</li>
</ol>
<h4>Asia Pacific</h4>
<ol>
<li>Mainland China Region (Beijing)<br />
EC2 Availability Zones: 2</li>
<li>Asia Pacific Region (Sydney)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2012</em></li>
<li>Asia Pacific Region (Tokyo)<br />
EC2 Availability Zones: 4*<br />
<em>Launched 2011</em></li>
<li>Asia Pacific Region (Seoul)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>Mainland China Region (Ningxia)<br />
EC2 Availability Zones: 3</li>
<li>Asia Pacific Local Region<sup>1</sup>(Osaka)<br />
EC2 Availability Zones: 1<br />
<em>Launched 2018</em></li>
<li>Asia Pacific Region (Mumbai)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2016</em></li>
<li>Asia Pacific Region (Hong Kong)<br />
EC2 Availability Zones: 3<br />
<em>Launched 2019</em></li>
</ol>
<h2><strong><span style="color: #0000ff;">Microsoft Azure Data Center Locations</span></strong></h2>
<p>Cloud data center locations of Microsoft Azure has further extended its reach by having maximum global regions than any other cloud provider in the world. The Azure Data center conserving data placement and contribution inclusive compliance and resiliency options for their client.</p>
<p>They have covered 54 regions across the globe</p>
<p>With 140 available Zones in 140 countries</p>
<p><img decoding="async" width="1417" height="722" class="wp-image-2478" src="https://techyaz.com/wp-content/uploads/2019/09/word-image-1.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image-1.png 1417w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-300x153.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-768x391.png 768w, https://techyaz.com/wp-content/uploads/2019/09/word-image-1-1024x522.png 1024w" sizes="(max-width: 1417px) 100vw, 1417px" /></p>
<p><strong>Image :Azure DC Location Map</strong></p>
<h3><span style="color: #008000;"><strong>Azure Regions</strong></span></h3>
<h4>UNITED STATES</h4>
<table style="height: 807px;" width="366">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>Central US</td>
<td>Iowa</td>
</tr>
<tr>
<td>East US 2</td>
<td>Virginia</td>
</tr>
<tr>
<td>East US</td>
<td>Virginia</td>
</tr>
<tr>
<td>North Central US</td>
<td>Illinois</td>
</tr>
<tr>
<td>South Central US</td>
<td>Texas</td>
</tr>
<tr>
<td>West US 2</td>
<td>Washington</td>
</tr>
<tr>
<td>West Central US</td>
<td>Wyoming</td>
</tr>
<tr>
<td>West US</td>
<td>California</td>
</tr>
<tr>
<td>Canada Central</td>
<td>Toronto</td>
</tr>
<tr>
<td>Canada East</td>
<td>Quebec City</td>
</tr>
<tr>
<td>Brazil South</td>
<td>Sao Paulo State</td>
</tr>
</tbody>
</table>
<h4>Europe</h4>
<table style="height: 1075px;" width="361">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>North Europe</td>
<td>Ireland</td>
</tr>
<tr>
<td>West Europe</td>
<td>Netherlands</td>
</tr>
<tr>
<td>France Central</td>
<td>Paris</td>
</tr>
<tr>
<td>France South</td>
<td>Marseille</td>
</tr>
<tr>
<td>UK South</td>
<td>London</td>
</tr>
<tr>
<td>UK West</td>
<td>Cardiff</td>
</tr>
<tr>
<td>Germany Central</td>
<td>Frankfurt</td>
</tr>
<tr>
<td>Germany Northeast</td>
<td>Magdeburg</td>
</tr>
<tr>
<td>Germany West Central</td>
<td>Frankfurt</td>
</tr>
<tr>
<td>Germany North</td>
<td>Berlin</td>
</tr>
<tr>
<td>Switzerland North</td>
<td>Zurich</td>
</tr>
<tr>
<td>Switzerland West</td>
<td>Geneva</td>
</tr>
<tr>
<td colspan="2"><strong>Azure Newly announced DC</strong></td>
</tr>
<tr>
<td>Norway West</td>
<td>Norway</td>
</tr>
<tr>
<td>Norway East</td>
<td>Norway</td>
</tr>
</tbody>
</table>
<h4>ASIA PACIFIC Region</h4>
<table style="height: 1243px;" width="363">
<tbody>
<tr>
<td></td>
<td></td>
</tr>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>East Asia</td>
<td>Hong Kong SAR</td>
</tr>
<tr>
<td>Southeast Asia</td>
<td>Singapore</td>
</tr>
<tr>
<td>Australia Central</td>
<td>Canberra</td>
</tr>
<tr>
<td>Australia Central 2</td>
<td>Canberra</td>
</tr>
<tr>
<td>Australia East</td>
<td>New South Wales</td>
</tr>
<tr>
<td>Australia Southeast</td>
<td>Victoria</td>
</tr>
<tr>
<td>China East</td>
<td>Shanghai</td>
</tr>
<tr>
<td>China North</td>
<td>Beijing</td>
</tr>
<tr>
<td>China East 2</td>
<td>Shanghai</td>
</tr>
<tr>
<td>China North 2</td>
<td>Beijing</td>
</tr>
<tr>
<td>Central India</td>
<td>Pune</td>
</tr>
<tr>
<td>South India</td>
<td>Chennai</td>
</tr>
<tr>
<td>West India</td>
<td>Mumbai</td>
</tr>
<tr>
<td>Japan East</td>
<td>Tokyo, Saitama</td>
</tr>
<tr>
<td>Japan West</td>
<td>Osaka</td>
</tr>
<tr>
<td>Korea Central</td>
<td>Seoul</td>
</tr>
<tr>
<td>Korea</td>
<td>Busan</td>
</tr>
</tbody>
</table>
<h4>Middle East and Africa</h4>
<table style="height: 345px;" width="363">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>South Africa North</td>
<td>Johannesburg</td>
</tr>
<tr>
<td>South Africa West</td>
<td>Cape Town</td>
</tr>
<tr>
<td>UAE Central</td>
<td>Abu Dhabi</td>
</tr>
<tr>
<td>UAE North</td>
<td>Dubai</td>
</tr>
</tbody>
</table>
<h4>GOVERNMENT</h4>
<table style="height: 672px;" width="364">
<tbody>
<tr>
<td><strong>Region</strong></td>
<td><strong>Location</strong></td>
</tr>
<tr>
<td>US DoD Central</td>
<td>Iowa</td>
</tr>
<tr>
<td>US DoD East</td>
<td>Virginia</td>
</tr>
<tr>
<td>US Gov Arizona</td>
<td>Arizona</td>
</tr>
<tr>
<td>US Gov Iowa</td>
<td>Iowa</td>
</tr>
<tr>
<td>US Gov Texas</td>
<td>Texas</td>
</tr>
<tr>
<td>US Gov Virginia</td>
<td>Virginia</td>
</tr>
<tr>
<td><strong>Newly Announced Region</strong></td>
<td></td>
</tr>
<tr>
<td>US Sec West</td>
<td>Undisclosed</td>
</tr>
<tr>
<td>US Sec East</td>
<td>Undisclosed</td>
</tr>
</tbody>
</table>
<h2><span style="color: #0000ff;"><strong>Google Cloud Data Center Locations &#8211; GCP</strong></span></h2>
<p>The Google Cloud data center locations is spread across 61 Availability Zones with 134 Edge Location (Network) across 20 Regions. The Google cloud Data centers are available in 200 countries</p>
<p>Announced Google DC &#8211; Google Cloud is expanding its reach into new regions: Seoul (South Korea), Salt Lake City (USA), Las Vegas (USA) and Jakarta (Indonesia).</p>
<p><img decoding="async" width="1239" height="557" class="wp-image-2479" src="https://techyaz.com/wp-content/uploads/2019/09/word-image-2.png" srcset="https://techyaz.com/wp-content/uploads/2019/09/word-image-2.png 1239w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-300x135.png 300w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-768x345.png 768w, https://techyaz.com/wp-content/uploads/2019/09/word-image-2-1024x460.png 1024w" sizes="(max-width: 1239px) 100vw, 1239px" /></p>
<p><strong>Image : Google Data Center Location Map</strong></p>
<h3><span style="color: #008000;"><strong>GCP Data Center Regions</strong></span></h3>
<h4>AMERICAS</h4>
<ol>
<li>OREGON (us-west1)</li>
<li>LOS ANGELES (us-west2)</li>
<li>IOWA (us-central1)</li>
<li>SOUTH CAROLINA (us-east1)</li>
<li>N. VIRGINIA (us-east4)</li>
<li>MONTRÉAL (northamerica-northeast1)</li>
<li>SÃO PAULO (southamerica-east1)</li>
</ol>
<h4>EUROPE</h4>
<ol>
<li>LONDON (europe-west2)</li>
<li>BELGIUM (europe-west1)</li>
<li>NETHERLANDS (europe-west4)</li>
<li>ZURICH (europe-west6)</li>
<li>FRANKFURT (europe-west3)</li>
<li>FINLAND (europe-north1)</li>
</ol>
<h4>ASIA PACIFIC</h4>
<ol>
<li>MUMBAI (asia-south1)</li>
<li>SINGAPORE (asia-southeast1)</li>
<li>HONG KONG (asia-east2)</li>
<li>TAIWAN (asia-east1)</li>
<li>TOKYO (asia-northeast1)</li>
<li>OSAKA (asia-northeast2)</li>
<li>SYDNEY (australia-southeast1)</li>
</ol>
<p><strong>Reference </strong></p>
<ul>
<li>AWS &#8211; <a href="https://aws.amazon.com/about-aws/global-infrastructure/">https://aws.amazon.com/about-aws/global-infrastructure/</a></li>
<li>Google &#8211; <a href="https://cloud.google.com/about/locations/?region=asia-pacific#region">https://cloud.google.com/about/locations/?region=asia-pacific#region</a></li>
<li>Azure &#8211; <a href="https://azure.microsoft.com/en-in/global-infrastructure/regions/">https://azure.microsoft.com/en-in/global-infrastructure/regions/</a></li>
</ul>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong> <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz" target="_blank" rel="noopener">Twitter</a> handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/">Cloud Data Center Locations for Top 3 CSPs (AWS, Azure &#038; Google)</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-data-center-locations-for-top-3-csps-aws-azure-google/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CCSK Certification Training Material</title>
		<link>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/</link>
					<comments>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Sat, 21 Sep 2019 10:16:18 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[CCSK]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2466</guid>

					<description><![CDATA[<p>CCSK stands for Certificate of Cloud Security Knowledge. The CCSK Certification is an individual certification that any person can take if they want to make their carrier in Cloud security. What is CCSK? The Cloud Security Alliance (CSA) has established&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/">CCSK Certification Training Material</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CCSK stands for Certificate of Cloud Security Knowledge. The CCSK Certification is an individual certification that any person can take if they want to make their carrier in Cloud security.</p>
<h3><strong>What is CCSK?</strong></h3>
<p>The Cloud Security Alliance (CSA) has established a web-based/online examination for cloud security skills for an individual’s competence in key cloud security controls, policies, compliance &amp; issues. The Certification was launched in 2010 by CSA (Cloud Security Alliance), the CCSK is a widely recognized expertise benchmark for Cloud Security Professionals. It is widely approved catalog of security best practices, the &#8220;Security Guidance for Critical Areas of Focus in Cloud Computing V4.0&#8221;.</p>
<p>CCSK eases a common understanding of cloud security concepts. This surges the risk analytics of risk decisions that are made in your organization.</p>
<h3><strong>What are the benefits of CCSK?</strong></h3>
<p>The CCSK is envisioned to provide understanding of security issues and best practices over a broad range of cloud computing domains. The CCSK certification will identify you as an induvial who have knowledge about security issues, policies and compliance of Cloud Environment in all platform and domains.</p>
<p>The CCSK is strongly recommended for IT auditors, and it is even required for portions of the CSA Security, Trust &amp; Assurance Registry (STAR) program.</p>
<p>The CCSK was recognized as the most valuable IT certification in terms of average salary by Certification Magazine.</p>
<h3><strong>How to Prepare for CCSK?</strong></h3>
<p>CCSK test will have 60 questions to be completed in 90 minutes with no pause. It’s an open book exam however that is a myth if you believe you can complete 80% of questions while searching in book. So better prepare for exam and don’t investigate materials on books while giving exam.</p>
<p>The Test participants will have 2 opportunity to appear for exam in case you cannot score 80% in first attempt, I would recommend you take online course/trainings with vast variety of sample questions which will help you to clear the certification in final attempt. Have a look at below courses that will help you with sample questions.</p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourse%2Funderstanding-ccsk-v4%2F">CCSK v4.0 &#8211; Certificate of Cloud Security Knowledge Tests</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DCCSK%2520Cloud%2520Security%2520Certification%26src%3Dsac%26kw%3Dccsk">Udemy Courses on CCSK Certification (Certificate of Cloud Security Knowledge)</a></strong></li>
</ul>
<p>There are many formal Training course you can buy online before appearing for CSK certification which will make it easy for you to pass the examinations.</p>
<p>However, if you believe in self-learning all you need is to go read and deep understanding of 3 documents which are enough for clearing the exam of CCSK.</p>
<ul>
<li>6% of the questions are based on the <a href="https://www.enisa.europa.eu/publications/cloud-computing-risk-assessment/">ENISA (European Union agency for cyber security)</a> report.</li>
<li>87% of the questions are based on the <a href="https://cloudsecurityalliance.org/download/security-guidance-v4/">CSA Guidance v4.</a></li>
<li>7% of questions are based on the <a href="https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v3-0-1/">CSA’s CCM 3.0.1 (Cloud Control Matrix)</a></li>
</ul>
<h3><strong>What all domain are covered under CCSK course?</strong></h3>
<p>I have given below list of topics that anybody can learn from the above attached links in order to take this certification. I will again emphasis all of you to go through the links attached for sample questions and tests in above section. You can find such sample papers here as well.</p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DCCSK%2520Cloud%2520Security%2520Certification%26src%3Dsac%26kw%3Dccsk">Udemy Courses on CCSK Certification (Certificate of Cloud Security Knowledge)</a></strong></li>
</ul>
<p>Have a look at the topics from each documents.</p>
<h4><strong>CSA Topics</strong></h4>
<ul>
<li>Domain 1 Cloud Computing Concepts and Architectures</li>
<li>Domain 2: Governance and Enterprise Risk Management</li>
<li>Domain 3: Legal Issues, Contracts and Electronic Discovery</li>
<li>Domain 4: Compliance and Audit Management</li>
<li>Domain 5: Information Governance</li>
<li>Domain 6: Management Plane and Business Continuity</li>
<li>Domain 7: Infrastructure Security</li>
<li>Domain 8: Virtualization and Containers</li>
<li>Domain 9: Incident Response</li>
<li>Domain 10: Application Security</li>
<li>Domain 11: Data Security and Encryption</li>
<li>Domain 12: Identity, Entitlement, and Access Management</li>
<li>Domain 13: Security as a Service</li>
<li>Domain 14: Related Technologies</li>
</ul>
<h4><strong>ENISA Topics</strong></h4>
<ul>
<li>ENISA Cloud Computing: Benefits, Risks and Recommendations for</li>
<li>Information Security</li>
<li>Isolation failure</li>
<li>Economic Denial of Service</li>
<li>Licensing Risks</li>
<li>VM hopping</li>
<li>Five key legal issues common across all scenarios</li>
<li>Top security risks in ENISA research</li>
<li>OVF</li>
<li>Underlying vulnerability in Loss of Governance</li>
<li>User provisioning vulnerability</li>
<li>Risk concerns of a cloud provider being acquired</li>
<li>Security benefits of cloud</li>
</ul>
<h4><strong>Cloud Security Alliance &#8211; Cloud Controls Matrix</strong></h4>
<ul>
<li>CCM Domains</li>
<li>CCM Controls</li>
<li>Architectural Relevance</li>
<li>Delivery Model Applicability</li>
<li>Scope Applicability</li>
<li>Mapped Standards and <strong>Frameworks</strong></li>
</ul>
<p>Reference links: <a href="https://cloudsecurityalliance.org/">https://cloudsecurityalliance.org/</a></p>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/">Understanding Cloud Security &amp; Data Protection</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz" target="_blank" rel="noopener">Twitter </a>handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/">CCSK Certification Training Material</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/ccsk-certification-training-material/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Security &#8211; How to Secure Cloud Environment?</title>
		<link>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/</link>
					<comments>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Mon, 24 Dec 2018 11:08:04 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud security]]></category>
		<guid isPermaLink="false">https://techyaz.com/?p=2442</guid>

					<description><![CDATA[<p>Today, I am going to discuss about securing cloud environment. Cloud security is popular word in IT industries these days. Let&#8217;s start with basics and all possible ways to protect your cloud environment. Cloud Security Streams / Features Today we&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today, I am going to discuss about securing cloud environment. Cloud security is popular word in IT industries these days. Let&#8217;s start with basics and all possible ways to protect your cloud environment.</p>
<h3><span style="color: #333399;"><strong>Cloud Security Streams / Features</strong></span></h3>
<p>Today we will discuss about cloud security areas which we should consider in scope while designing a security solution for your cloud environment. In Cloud context, security comes as a shared responsibility between the Cloud Service provider (CSP)and its Tenants. All major CSP’s ensure to make available different features, tools and solution options which can be leverage by clients to have a secure cloud environment. The Cloud Security Streams are as follows</p>
<ol>
<li><strong>Physical Security – </strong>includes Cloud Data Center protection of hardware, software, networks also data centers are protected by security personnel and electronic devices such as cameras.</li>
<li><strong>Network security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>as all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance</li>
</ol>
<h3><span style="color: #333399;"><strong>How to Secure your Cloud Environment?</strong></span></h3>
<p>Below are simple steps which can be followed to ensure the cloud infrastructure is secured. we must leverage best in market solution while designing a secure and cost-effective solution.</p>
<ol>
<li>Ensure to leverage data and Network security built-in features provided by the cloud Service provider partner solutions.</li>
<li>Design an Appropriate Data Backup solution along with Encryption enabled for covering data security.</li>
<li>Regular Audit / scan of Test of Application layer and get Quarterly/ yearly scan reports of Cloud infra from CSP.</li>
<li>Design Stable and Redundant Backup solution to cover Disaster Recovery and Business Continuity.</li>
<li>Design your environment to use layered security by allowing many data access accounts and permissions as possible.</li>
</ol>
<p><strong>Note:</strong> In cloud environment security comes with shared responsibility model. The Hypervisor layer and anything below it which includes hardware and applications &amp; physical security are protected by service provider. The operating system and above layer need to be taken care by the client /User. I would recommend leveraging CSP’s features with combination of Third party tools to ensure having secure environment for Business.  <strong> </strong></p>
<p>Today I will share the top best in class Cloud Service provider Microsoft Azure, AWS and Google cloud platform build in features which can be leveraged to design a secure cloud solution for your CSP.</p>
<h4><span style="color: #993300;"><strong>Microsoft Azure Security Built In Security Features</strong></span></h4>
<p>Microsoft is providing numerous tools and features to secure your cloud environment. These tools have their respective cost. Microsoft has also provided broker platform features like monitoring your cloud estate from single plane of glass.  Below is the list of security tools which can be leveraged to design a secure cloud environment:</p>
<ul>
<li>Operations Management Suite Security (OMS) and Audit Dashboard</li>
<li>Azure Resource Manager</li>
<li>Application Insights</li>
<li>Azure Monitor</li>
<li>Log Analytics</li>
<li>Azure Advisor</li>
<li>Azure Security Center</li>
<li>Role-Based Access Control (RBAC)</li>
<li>Shared Access Signature</li>
<li>Internal DNS</li>
<li>Azure DNS</li>
<li>Log Analytics NSGs</li>
<li>Enable log categories for NSGs:
<ol>
<li>Event</li>
<li>Rules counter</li>
</ol>
</li>
</ul>
<p><strong>Encryption</strong><strong> </strong></p>
<p>Azure supports various encryption models, including server-side encryption that uses service-managed keys, customer-managed keys in Key Vault, or customer-managed keys on customer-controlled hardware. With client-side encryption, client can manage and store keys on-premises or in another secure location.<strong> </strong></p>
<ul>
<li>Encryption in Transit</li>
<li>Encryption at rest</li>
<li>Storage Service Encryption</li>
<li>Client-side Encryption</li>
<li>Azure Disk Encryption (IaaS Virtual Machine Disk)</li>
</ul>
<p><strong>Applications Security</strong><strong> </strong></p>
<p>This feature provides security micro-segmentation for your virtual networks in Azure.</p>
<ul>
<li>Web Application vulnerability scanning</li>
<li>Penetration Testing</li>
<li>Web Application firewall</li>
<li>The web application firewall (WAF)</li>
<li>Authentication and authorization in Azure App Service</li>
<li>Layered Security Architecture (providing differing levels of network access for each application tier)</li>
<li>Web server diagnostics
<ul>
<li>Detailed Error Logging</li>
<li>Failed Request Tracing</li>
<li>Web Server Logging</li>
<li>Application diagnostics</li>
<li>All (displays all events)</li>
<li>Application Errors (displays exception events)</li>
<li>Performance (displays performance events)</li>
<li>Storage</li>
<li>Storage Analytics (Successful requests, Failed requests, including timeout, throttling, network, authorization, and other errors)</li>
<li>Enabling Browser-Based Clients Using CORS</li>
<li>Cross-Origin Resource Sharing (CORS)</li>
</ul>
</li>
</ul>
<p><strong>Network Security </strong></p>
<p>Microsoft Azure provides confidentiality, integrity, and availability of customer data, while also enabling transparent accountability. Available network recommendations by Microsoft are as follows:</p>
<ol>
<li>Add a Next Generation Firewall Recommends that client can add a Next Generation Firewall (NGFW) from a Microsoft partner to increase your security protections</li>
<li>Route traffic through NGFW only Recommends that you configure network security group (NSG) rules that force inbound traffic to your VM through your NGFW.</li>
<li>Enable Network Security Groups on subnets or virtual machines Recommends that you enable NSGs on subnets or VMs.</li>
<li>Restrict access through Internet facing endpoint Recommends that you configure inbound traffic rules for NSGs.</li>
</ol>
<p>Below are the main components or areas where you should focus to enhance the network security of your cloud environment.</p>
<ul>
<li>Network Layer Controls</li>
<li>Network Security Groups</li>
<li>A Network Security Group (NSG)</li>
<li>Route Control and Forced Tunneling</li>
<li>Forced tunneling</li>
<li>Virtual Network Security Appliances &#8211; Azure partner network security appliance solution.</li>
<li>Azure Virtual Network</li>
<li>Azure networking supports various secure remote access scenarios. Some of these include:</li>
<li>Connect individual workstations to an Azure Virtual Network</li>
<li>Connect on-premises network to an Azure Virtual Network with a VPN</li>
<li>Connect on-premises network to an Azure Virtual Network with a dedicated WAN link</li>
<li>Connect Azure Virtual Networks to each other</li>
<li>VPN Gateway</li>
<li>Express Route</li>
<li>Microsoft Azure ExpressRoute (Dedicated WAN Link -ExpressRoute connections do not go over the public Internet)</li>
<li>Application Gateway (Layer 7 Load Balancer)</li>
<li>Web Application Firewall</li>
<li>Traffic Manager</li>
<li>Microsoft Azure Traffic Manager</li>
<li>Azure Load Balancer (Layer 4 Load Balancer) &#8211; Internet-facing load balancing.</li>
</ul>
<p><strong>Compute Security </strong></p>
<p>Unified security management and advanced threat protection across hybrid cloud workloads , there are various tool available by azure for the compute environment.</p>
<ul>
<li>Antimalware &amp; Antivirus &#8211; Azure IaaS, use antimalware software from security vendors such as (Microsoft, Symantec, Trend Micro, McAfee, and Kaspersky to protect your virtual machines).</li>
<li>Hardware Security Module (store keys in hardware Security modules (HSMs) certified to FIPS 140-2 Level 2 standards.)</li>
<li>Virtual machine backup</li>
<li>Azure Backup (Windows &amp; Linux only)</li>
<li>Azure Site Recovery (DR &amp; BCP Orchestration)</li>
<li>SQL VM TDE (Transparent data encryption (TDE) and column level encryption (CLE) are SQL server encryption features. This form of encryption requires customers to manage and store the cryptographic keys you use for encryption.)</li>
<li>The Azure Key Vault (AKV)</li>
<li>VM Disk Encryption (Azure Disk Encryption (industry standard BitLocker feature of Windows and the DM-Crypt feature of Linux))</li>
<li>Virtual networking</li>
<li>Patch Updates</li>
<li>Security policy management and reporting</li>
<li>Identify and access management</li>
</ul>
<p><strong>Secure Identity (IAM)</strong></p>
<p>Protect application and data at the front gate with Azure Identify and access management solutions.</p>
<ul>
<li>Multi-Factor Authentication (Multi-Factor Authentication experience that works with both Microsoft Azure Active Directory and Microsoft accounts, and includes support for wearables and fingerprint-based approvals)</li>
<li>Password policy enforcement</li>
<li>Token-based authentication enables authentication via Azure Active Directory.</li>
<li>Role-based access control (RBAC)</li>
<li>Integrated identity management (hybrid identity) enables you to maintain control of users’ access across internal data centers and cloud platforms, creating a single user identity for authentication and authorization to all resources.<strong> </strong></li>
</ul>
<h4><span style="color: #993300;"><strong>AWS Built-in Security Features </strong></span></h4>
<p>Like other CSP the AWS cloud security solution has also been offering various feature to design cloud security. Below are the list of some of the services that you can use for cloud security.</p>
<ul>
<li>AWS Artifact</li>
<li>AWS Certificate Manager (SSL/TLS Certificates)</li>
<li>Amazon Cloud Directory</li>
<li>AWS CloudHSM Key Storage &amp; Management</li>
<li>Amazon Cognito User Sign Up &amp; Sign In</li>
<li>AWS Directory Service Directory</li>
<li>AWS Firewall Manager</li>
<li>Amazon GuardDuty Threat Detection</li>
<li>AWS Identity and Access Management (IAM)</li>
<li>Amazon Inspector</li>
<li>Security Assessment</li>
<li>AWS Key Management Service</li>
<li>Amazon Macie (Sensitive Data Classification)</li>
<li>AWS Organizations (Multiple Account Management)</li>
<li>AWS Shield (DDoS Protection)</li>
<li>AWS Secrets Manager</li>
<li>AWS Single Sign-On (SSO)</li>
<li>AWS WAF (Web Application Firewall)</li>
</ul>
<p><strong>Infrastructure Security</strong></p>
<p>It help identify and protect applications and infrastructure from cyber-attacks and other advanced threats vectors. Infrastructure security is important area to secure cloud environment. Have a look at below tools that is available in AWS market place to secure cloud environment.</p>
<p><strong>Tools Offered in AWS Market Place </strong></p>
<ul>
<li>Barracuda</li>
<li>Check Point</li>
<li>TM_logo_red_2c_transparent_small</li>
<li>Alert Logic</li>
<li>Intel Security</li>
<li>Symantec</li>
<li>600x400_Sophos_logo</li>
<li>FORTINET_logo</li>
<li>PaloAlto</li>
<li>imperva-new</li>
<li>openvpn</li>
<li>netgate</li>
<li>Gigamon-Free-Standing-Orange-Logo</li>
</ul>
<p><strong>Configuration &amp; Vulnerability Analysis</strong></p>
<p>Tools to help you inspect application deployments for security risks and vulnerabilities, while receiving priorities and advice to assist with remediation.</p>
<p><strong>Stealth</strong></p>
<ul>
<li>cloudcheckr- The CloudCheckr CMP offers a single pane of glass view to help modern enterprises manage and optimize their public cloud</li>
<li>600x400_Tenable_Logo</li>
<li>600x400_EvidentIo</li>
</ul>
<p><strong>Logging and monitoring</strong></p>
<p>Help maintain visibility and auditability of activity in your application infrastructure and receive policy-driven alerting, and reporting.</p>
<ul>
<li>Sumo Logic</li>
<li>200x133_Splunk_Logo</li>
<li>Cisco_600x400</li>
</ul>
<p><strong>Data Security</strong></p>
<p>Assist with safeguarding your data from unauthorized disclosure and modification, through encryption, key management, and policy-driven controls.</p>
<ul>
<li>300x100_Gemalto_Logo</li>
<li>hytrust</li>
<li>townsendsecurity</li>
</ul>
<h4><span style="color: #993300;"><strong>Google Cloud Platform Build In Security Features</strong></span></h4>
<p><strong>Shielded VMs</strong> are virtual machines (VMs) on Google Cloud Platform hardened by a set of security controls that help defend against rootkits and boot kits to secure cloud environment.</p>
<ul>
<li>Verifiable integrity with secure and measured boot</li>
<li>vTPM exfiltration resistance</li>
<li>Trusted UEFI firmware</li>
<li>Tamper-evident attestations</li>
<li>Live migration and patching</li>
</ul>
<p><strong>Binary Authorization</strong> is a deploy-time security control that ensures only trusted container images are deployed on Kubernetes Engine.</p>
<ul>
<li>Policy creation</li>
<li>Policy verification and enforcement</li>
<li>Audit logging</li>
<li>Open source support for Kubernetes</li>
<li>Break Glass support</li>
<li>Integration with third-party solutions</li>
<li>Integrate Binary Authorization with leading container security and CI/CD partners, such as CloudBees and Twistlock.</li>
</ul>
<p><strong>Google Cloud Load Balancing </strong></p>
<p>Scale your applications on Google Compute Engine from zero to full-throttle with Google Cloud Load Balancing, with no pre-warming needed</p>
<ul>
<li>HTTP(S) Load Balancing</li>
<li>TCP/SSL Load Balancing</li>
<li>SSL Offload</li>
<li>Advanced Feature Support</li>
<li>UDP Load Balancing</li>
<li>Stackdriver Logging</li>
<li>Seamless Autoscaling</li>
<li>High Fidelity Health Checks</li>
<li>Affinity</li>
<li>Cloud CDN Integration</li>
</ul>
<p><strong>Authentication, Integrity, and Encryption</strong></p>
<p>Google employs several security measures to help ensure the authenticity, integrity, and privacy of data in transit.</p>
<ul>
<li><strong>Encryption at rest</strong></li>
<li><strong>Encryption in transit </strong></li>
</ul>
<p><strong>Encryption in use &#8211; </strong>protects data when it is being used by servers to run computations, e.g. homomorphic encryption.</p>
<p>ALTS, a mutual authentication and transport encryption system that runs at the application layer, to protect RPC communications. Using application-level security allows applications to have authenticated remote peer identity, which can be used to implement fine-grained authorization policies</p>
<p><strong>Google Key Management Service</strong></p>
<p>Cloud KMS is a cloud-hosted key management service that lets you manage cryptographic keys for your cloud services the same way you do on premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.<strong> </strong></p>
<ul>
<li>Symmetric and asymmetric key support</li>
<li>Encrypt and decrypt via API</li>
<li>Automated and at-will key rotation</li>
<li>Delay for key destruction</li>
<li>High global availability</li>
<li>Application Layer Transport Security</li>
</ul>
<p><strong>Google Cloud Data Loss Prevention </strong></p>
<p>Automatically discover and redact sensitive data everywhere</p>
<ul>
<li>Flexible Classification</li>
<li>Secure Data Handling</li>
<li>Custom Detectors</li>
<li>Easy Workload Integration</li>
<li>Likelihood Scores</li>
<li>Pay As You Go Pricing</li>
<li>Detailed Findings</li>
<li>Simple and Powerful Redaction</li>
<li>REST API</li>
</ul>
<p><strong>Google Cloud HSM</strong></p>
<p>Cloud HSM a cloud-hosted hardware security module (HSM) service on Google Cloud Platform.</p>
<ul>
<li>Symmetric and asymmetric key support</li>
<li>Statement attestation</li>
<li>Integration with Cloud KMS</li>
<li>Multi-region support</li>
<li><a href="https://support.google.com/a/answer/6280516?hl=en">G Suite DLP Mail</a></li>
<li><a href="https://support.google.com/a/answer/6321530?hl=en">G Suite DLP Drive</a></li>
<li><a href="https://support.google.com/a/answer/60781?hl=en">G Suite Doc Controls</a></li>
</ul>
<p><strong>Google Chrome Browser</strong></p>
<p>Manage centrally employee activity in the cloud, across all devices and platforms, now and in the future</p>
<ul>
<li>Advanced malware and phishing protection gives employees a safe cloud experience.</li>
<li>Regular security updates</li>
<li>Users are protected from the latest security vulnerabilities — no patching required.</li>
<li>Sandboxing</li>
<li>Prevents malware and isolates malicious web pages that try to infect devices, monitor web activity, or steal data.</li>
<li>Site isolation</li>
<li><a href="https://gsuite.google.com/products/admin/mobile/?_ga=2.85405721.-1694977695.1537292179">G Suite Device Management</a></li>
</ul>
<p><strong>Identity &amp; Access Management</strong></p>
<p>Protect user identities by managing the user lifecycle, authentication and assurance, and managing system and application access.</p>
<ul>
<li><a href="https://support.google.com/cloudidentity/answer/7319251?hl=en&amp;visit_id=1-636542458197935367-13221123&amp;rd=1">Cloud Identity</a></li>
<li><a href="https://cloud.google.com/iam/">Cloud IAM</a></li>
<li><a href="https://cloud.google.com/iap/">Cloud Identity-Aware Proxy</a></li>
<li><a href="https://cloud.google.com/security-key/">Security Keys</a></li>
<li><a href="https://cloud.google.com/resource-manager/">Cloud Resource Manager</a></li>
<li><a href="https://firebase.google.com/products/auth/">Firebase Authentication</a></li>
</ul>
<p><strong>Application</strong> <strong>Security</strong></p>
<ul>
<li><strong>Cloud Security Scanner</strong>-Automatically scan your App Engine apps for common vulnerabilities</li>
<li><strong>Apigee</strong>-API Management for Visibility and Control Design, secure, analyze, and scale APIs anywhere.</li>
</ul>
<p><strong>Security Monitoring &amp; Operations </strong></p>
<p>Monitor for malicious activity, handle security incidents, and support operational processes that prevent, detect, and respond to threats.</p>
<ul>
<li>Stackdriver Logging</li>
<li>Cloud Security Command CenterALPHA</li>
<li>Access Transparency</li>
</ul>
<p><strong>Cloud Security Command CenterALPHA</strong></p>
<ul>
<li>Asset Discovery and Inventory</li>
<li>Sensitive Data Identification</li>
<li>Application Vulnerability Detection</li>
<li>REST API</li>
<li>Access Control Monitoring</li>
<li>Anomaly Detection From Google</li>
<li>Third-party Security Tool Inputs (Integrate output from your existing security tools such as Cloudflare, CrowdStrike, Dome9, Palo Alto Networks, Qualys, and RedLock into Cloud Security Command Center to detect DDoS attacks)</li>
<li>Real-time Notifications</li>
</ul>
<p><strong>Google Governance, Risk &amp; Compliance</strong></p>
<p>Support governance and compliance processes, including performing assessments, demonstrating compliance, and achieving certifications. You should read attached Third-party audits and certifications article in given link: https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</p>
<p>I hope you liked this article. I would recommend you to also read this article about cloud security and data protection: <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security and Data Protection</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/">Cloud Security &#8211; How to Secure Cloud Environment?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/cloud-security-how-to-secure-cloud-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IT Presales Interview Questions &#038; Answers &#8211; Part 2</title>
		<link>https://techyaz.com/interview-questions/presales-interview-questions/it-presales-interview-questions-answers-part-2/</link>
					<comments>https://techyaz.com/interview-questions/presales-interview-questions/it-presales-interview-questions-answers-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 16:35:43 +0000</pubDate>
				<category><![CDATA[Interview Questions]]></category>
		<category><![CDATA[Presales]]></category>
		<category><![CDATA[Presales Interview Questions]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[presales]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=2101</guid>

					<description><![CDATA[<p>I have already published Presales Interview Questions &#38; Answers Part 1 in attached link . I would recommend you to visit attached link to read it. Here, i am going to write second part of pre sales interview questions. If you&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/interview-questions/presales-interview-questions/it-presales-interview-questions-answers-part-2/">IT Presales Interview Questions &#038; Answers &#8211; Part 2</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I have already published<strong> <a href="http://techyaz.com/learning/presales-interview-questions-answers/" target="_blank" rel="noopener">Presales Interview Questions &amp; Answers Part 1</a></strong> in attached link . I would recommend you to visit attached link to read it. Here, i am going to write second part of pre sales interview questions. If you want to build your career in presales then i would recommend you to attend this training:<span style="color: #993300;"> <em><strong><a style="color: #993300;" href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fpresales-management%2F" target="_blank" rel="noopener">Learn Presales Management &#8211; IT Solutions and Services</a></strong></em></span></p>
<h3><span style="color: #333399;">Presales Interview Questions</span></h3>
<ol>
<li><strong>Define Executive Summary in a RFP: What points you cover in this section? What is the word limit to it?</strong></li>
</ol>
<p><strong>Tips: </strong>It is brief descriptions of the problem /objective and how our organization can help you achieve you goal and get rid of your problem, it will give background information, brief analysis and main conclusions. it is most important part of the RFP and will cover gist of the document<strong>.</strong><strong> </strong></p>
<p>You generally get this information by sales lead, Account manager, Business manager or all of them contribute their share in making it impactful. We generally concise the word limit to 500 max.<strong> </strong></p>
<ol start="2">
<li><strong>Define your Approach/Methodology in a RFP.</strong></li>
</ol>
<p><strong>Tips: </strong>It&#8217;s solution Architect&#8217;s choice which approach he will follow considering the scope of work. I follow an approach that has entire scope of work followed by solution of every specification with its requirements. We generally include Project Timelines along with every phase or milestones based on different frameworks like waterfall, Lean, SCRUM etc.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1983 alignright" src="http://techyaz.com/wp-content/uploads/2018/03/Presales-Interview.png" alt="Presales Interview Questions" width="300" height="300" srcset="https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview.png 300w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-150x150.png 150w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-160x160.png 160w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-320x320.png 320w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>For e.g. I generally include below workflow on high level.</p>
<ul>
<li>Requirements</li>
<li>Solution</li>
<li>Timelines</li>
<li>Assumptions and Dependencies</li>
<li>Cost</li>
<li>Deliverables</li>
</ul>
<ol start="3">
<li><strong>What all tools you use for costing? Can you give example of any costing you have done in last few deals?</strong></li>
</ol>
<p><strong>Tips:</strong> Generally Microsoft Excel is used for costing but in many organization they have excel based tools  to fix the contingency , margin , other cost  associated with finance to pop out the final pricing. <strong> </strong></p>
<ol start="4">
<li><strong>SDLC &#8211; Which one is better Iterative/Waterfall/Lean/Scrum?</strong></li>
</ol>
<p><strong>Tips: </strong>For proposing a tentative timelines, phases and project delivery, Solution Architects always follow an Agile framework in their solution approach. Majorly these frameworks are designed for application development but these days SA’s use these models largely in managing any projects.</p>
<p><strong>Waterfall Framework &#8211;  </strong>It is traditional approach in which you follow step by step in phases. First complete one phase before moving on to the next phase.</p>
<p><strong>Lean Framework – </strong>In this model we follow features/Stages as milestone in project. We <em>plan, build, test and deploy</em> one feature before you do it for next feature.</p>
<p><strong>Scrum Framework – </strong>In Scrum Model we need to <em>plan, build, test and Deploy</em> on delivering fully-tested, independent, valuable, small features /stages.<strong> </strong></p>
<ol start="5">
<li><strong>What is your contribution in any RFP?</strong></li>
</ol>
<p><strong>Tips: </strong>Generally, Solution Architects work on many section<strong> </strong>like:</p>
<ul>
<li>Requirement response/ Solution</li>
<li>Scope of work</li>
<li>Solution Approach</li>
<li>Risk and Mitigation</li>
<li>Governance Model</li>
<li>Assumptions</li>
<li>Cost</li>
<li>Pricing</li>
<li>Service Levels Assumptions (SLA)</li>
</ul>
<p><b> </b>My contribution for any RFP cover all these areas.</p>
<p><strong><span style="color: #ff0000;"><em>Suggestion:</em> </span></strong>Tell specific contributions that you generally do it for RFPs in your organisation.<strong> </strong></p>
<ol start="6">
<li><strong>Please explain how will you propose ROI in RFP for infrastructure outsourcing?</strong></li>
</ol>
<p><strong>Tips: </strong>ROI means Return on Investment. It is a term that is used to measure performance and cost.  As I have mentioned in all my articles, Solution Architect needs to have a blend of technical and sales skills so that they can work a solution and showcase ROI to the client. It’s all about how you can convince the CTO/CEO and other stakeholders to invest in your project.  We can achieve ROI by re-architecting or redesigning your existing solution that will reduce the existing human’s efforts, Time, and TCO. Let&#8217;s take an example.</p>
<p>For example: Suppose we have 1000 database server that needs to be refreshed with new hardware because they are approaching end of life. We can propose database consolidation, Cloud or SaaS to reduce the number of servers from 1000 to 500 based on their potential candidature to qualify for consolidation. Further we can apply Automation to reduce the repetitive tasks that will reduce the total human effort. This way customer need to invest in on-premise to cloud migration with some  one time cost and within 6 months there will be visible ROI in monthly maintenance of services because we have already reduced total no of servers.</p>
<ol start="7">
<li><strong>Explain Onsite Offshore Model in IT industry?</strong></li>
</ol>
<p><strong>Tips: </strong>The Onshore /offshore model is based on client requirement and SA proposed solution. This model is a mixture of onsite, offsite resources. The blend of onsite-offsite of resources provide the cost-effectiveness of the offshore model along with client representation at the onshore. The onsite resources fill in the crucial communication gaps and safeguard projects’ escalations if any.  The hybrid Onsite-offshore model, are very cost effective and popular in IT industry.</p>
<ol start="8">
<li><strong>Please elaborate “Table of contents” for any RFP?</strong></li>
</ol>
<p><strong>Tips:</strong> For any RFI and RFP document building” Table of content” is one of the most important part. It’s always a discrete approach followed by solution architect how he or she prefer to design their response. However, in some cases client RFI and RFP clearly state the response document and strictly define the format, table of content and response which has to be followed by SA’s.</p>
<p>In general Table of content covers the following area:</p>
<ul>
<li>Executive Summary</li>
<li>Company Portfolio</li>
<li>Competitive Advantage</li>
<li>Requirement response/ Solution</li>
<li>Scope of work</li>
<li>Solution Approach</li>
<li>Risk and Mitigation</li>
<li>Governance Model</li>
<li>Assumptions</li>
<li>Cost</li>
<li>Pricing</li>
<li>Service Levels Assumptions (SLA)</li>
<li>Appendix</li>
</ul>
<ol start="9">
<li><strong>Have you been part of Bid Complexity process? What’s was your role?</strong></li>
</ol>
<p><strong>Tips:</strong> It is a team work, all organization spends lots of their energy in Analyzing the contract, the bid process, the margins, the profit and how they have competitive advantage with other bidders. The process is complex as a SA pays a pivotal role and providing optimum price for the contract. The Bid optimization covers rigorous efforts between margins and actual cost and the specified work.</p>
<p><strong><em><span style="color: #ff0000;">Suggestions:</span> </em></strong>Being in solution architect role I would discuss pricing with all stakeholders (Delivery, Sales , Bid manager , SA’s and Technical Architects )“How can we be more competitive with Margins” and based on our analysis we conclude or bid. Below are the questions which we discuss:</p>
<ul>
<li>Are we getting reasonable profit post being competitive?</li>
<li>If being competitive and we lost money on the initial contract can we assume high possibility of getting follow on work with considerable amount of profit?</li>
<li>If being into Business (initial contract) with no margin will increase our chances to eliminate other bidders from any associated contract?</li>
<li>To bid or Not to bid? How it changes the probability of getting future deals?</li>
</ul>
<ol start="10">
<li><strong>How will you differentiate between Team Structure and Governance Model?</strong></li>
</ol>
<p><strong>Tips: </strong></p>
<p><strong>Team Structure</strong> – In Organization employees are structured in different projects and category. The set of employees who will work on project together are essentially called as a Team. Based on their respective responsibilities the Team is structured to perform individual task.</p>
<p><strong>Governance Model</strong> &#8211; Governance Model define power and its accountability in governing or management roles in an organization. The Model designate operatives who will set rules, procedures, and other informational guidelines. In addition, governance frameworks define, guide, and provide for enforcement of these processes.</p>
<ol start="11">
<li><strong>Difference between Incident and Problem in terms of ITIL framework?</strong></li>
</ol>
<p><strong>Tips:</strong> An Incident is an event which could lead disruption of the services or Business.</p>
<p>Any problem which occur during Business Hours is considered as an Incident (ITIL Def.). A problem is the original cause that leads to an incident. For e.g. A website URL is not reachable as Database is down. This issue will be raised as in incident as it has disrupted the Business.</p>
<p>The actual root cause of problem was space issue in database. A problem may be something that could lead to the same incident occurring again, or lead to another incident entirely. A problem is the original cause that leads to an incident. For e.g. During maintenance hours due to some problem database was down, but it did not cause any service disruption hence it was just a problem that needed to be fixed.</p>
<ol start="12">
<li><strong>What is the difference between RFI and RFP?</strong></li>
</ol>
<p><strong>Tips:</strong> Please read my attached article to learn about RFI and RFP.</p>
<ul>
<li><strong><a href="http://techyaz.com/learning/is-presales-a-good-career-opportunity/" target="_blank" rel="noopener">Difference between RFI and RFP</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter</a> handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fpresales-management%2F" target="_blank" rel="noopener">Learn Presales Management in IT Solutions</a></strong></li>
<li><strong><a href="http://techyaz.com/learning/is-presales-a-good-career-opportunity/" target="_blank" rel="noopener">Is Presales a Good Career Opportunity in IT?</a></strong></li>
<li><strong><a href="http://techyaz.com/learning/presales-interview-questions-answers/" target="_blank" rel="noopener">Presales Interview Questions &amp; Answers &#8211; Part 1</a></strong></li>
</ul>
<p>The post <a href="https://techyaz.com/interview-questions/presales-interview-questions/it-presales-interview-questions-answers-part-2/">IT Presales Interview Questions &#038; Answers &#8211; Part 2</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/interview-questions/presales-interview-questions/it-presales-interview-questions-answers-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Presales Interview Questions &#038; Answers &#8211; Part 1</title>
		<link>https://techyaz.com/interview-questions/presales-interview-questions/presales-interview-questions-answers/</link>
					<comments>https://techyaz.com/interview-questions/presales-interview-questions/presales-interview-questions-answers/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 13:51:55 +0000</pubDate>
				<category><![CDATA[Interview Questions]]></category>
		<category><![CDATA[Learning]]></category>
		<category><![CDATA[Presales]]></category>
		<category><![CDATA[Presales Interview Questions]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[presales]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1979</guid>

					<description><![CDATA[<p>These days Presales has been providing very fascinating and promising career prospects in IT/ITeS. Maximum beginners are not aware of this career option. Here i am going to write most asked Presales interview questions and answers. Answers of few questions might&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/interview-questions/presales-interview-questions/presales-interview-questions-answers/">Presales Interview Questions &#038; Answers &#8211; Part 1</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days Presales has been providing very fascinating and promising career prospects in IT/ITeS. Maximum beginners are not aware of this career option. Here i am going to write most asked Presales interview questions and answers. Answers of few questions might vary depending on the Pre-sales domain.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1983 alignright" src="http://techyaz.com/wp-content/uploads/2018/03/Presales-Interview.png" alt="Presales Interview Questions" width="300" height="300" srcset="https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview.png 300w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-150x150.png 150w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-160x160.png 160w, https://techyaz.com/wp-content/uploads/2018/03/Presales-Interview-320x320.png 320w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Typically, presales means prepare yourself before selling your services or products. It is imperative to understand pre-sales consultants are technical person who fully understand the domain he or she decided to represent or work upon. However, in most of the cases these consultants choose their domain based on their experience for e.g. Infra Consultant, Platform consultant, product consultant, software consultant in cloud (IaaS, PaaS &amp; SaaS).</p>
<p>As the name pre-sales suggest preparing yourself to present, respond and demonstrate your services in smartest way to win deal for your organization. Essentially Sales and Presales consultant work very closely for any Request for Information (RFI) and Request for Proposal (RFP). Refer to my article on for additional information on RFI and RFP.</p>
<ul>
<li><strong><a href="http://techyaz.com/learning/is-presales-a-good-career-opportunity/">Is Presales a Good Career Opportunity in IT/ITeS?</a></strong><strong> </strong></li>
<li><strong><a href="http://techyaz.com/interview-questions/it-presales-interview-questions-answers-part-2/" target="_blank" rel="noopener">IT Presales Interview Questions &amp; Answers &#8211; Part 2</a></strong></li>
</ul>
<h3><span style="color: #333399;"><strong>Presales Interview Questions</strong></span></h3>
<p><strong>Question 1 &#8211; The very first question in any presales interview will always be “Tell me about yourself”?</strong></p>
<p><strong>Answer: </strong>As you introduce yourself to the interviewer you need to understand he/she wish to know lesser about you more about your profile and how you can fulfil their requirements.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>Start with your introduction and try rapping it up in a minute.</li>
<li>In Introduction give brief about your educational qualification.</li>
<li>Precise introductions about your overall experience in industry or as mentioned in your CV.</li>
<li>Give 2 minutes to talk about your relevant experience in pre-sales how it started and how you have grown up in this role as a consultant.</li>
<li>Rap up on positive attitude about your hobbies or interest.</li>
</ul>
<p><strong>Question 2 – Tell me about your current role in your organization as a presales resource?</strong></p>
<p><strong>Answer: </strong>There are many roles in Presales consulting, you need to be specify and talk about your role. You must ensure you choose wisely the profile you mention as it will decide the course of interview session.</p>
<ul>
<li>Deal Managers (Could be different abbreviations in your firm)</li>
<li>Finance Operative (Could be different abbreviations in your firm)</li>
<li>Solution Architect</li>
<li>Technical Architect</li>
<li>Sales Consultant</li>
<li>Legal Consultants</li>
</ul>
<p><strong>Tips:</strong></p>
<ol>
<li>Explain your role as a solution Architect and in what stage you get involved.</li>
<li>Explain what kinds of deals you have handled so far and you can provide generic details about the deal Size (Number of FTE’s), total deal cost and domains involved but remember never to mention the client name as you need to ensure Data Privacy norms.</li>
</ol>
<p><strong>Question 3 – What all area you cover in deal scope (e.g. Infra, Software, help desk, support or overall deal)?</strong></p>
<p><strong>Answer: </strong>Consider below points while answering this type of questions.</p>
<ul>
<li>Here you need to choose the best technical domain of yours and then brief about the same.</li>
<li>All Scope of work or service catalog of your technical domain or you could provide solution in a deal.</li>
<li>Explain how you gather the client requirement and how you planned a solution</li>
<li>Brief on documents you prepared for the solutions.<strong> </strong></li>
</ul>
<p><strong>Question 4 – Tell me something about your projects, deals which you have worked upon?</strong></p>
<p><strong>Answer: </strong>Explain about your past projects where you have contributed as Presales Consultant. Explain your part of contribution.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>Brief descriptions on overall experience on projects as per your CV.</li>
<li>Brief on Distinct deals you handled during the tenure of your service as a presales consultant.<strong> </strong></li>
</ul>
<p><strong>Question 5 –  What was your role in projects or deals you have worked upon?</strong></p>
<p><strong>Answer: </strong>Specify your role as a Solution Architect or whatever suits your profile as described below along with some of your contributions to the deals.</p>
<ul>
<li>Deal Managers (Could be different name in your firm)</li>
<li>Finance Operative (Could be different name in your firm)</li>
<li>Solution Architect</li>
<li>Technical Architect</li>
<li>Sales Consultant</li>
<li>Legal Consultants<strong> </strong></li>
</ul>
<p><strong>Questions 6 – What’s all frameworks have you worked upon?</strong></p>
<p><strong>Answer: </strong>This is very important question and need to be answered carefully with full knowledge of framework you decided to speak on. See below few frameworks for e.g.</p>
<ul>
<li>ITIL</li>
<li>COBIT</li>
</ul>
<p><strong>Question 7 – Have you ever designed an operating model for Level 1 Support / Help Desk? Provide a brief description of the same?</strong></p>
<p><strong>Answer: </strong>Consider below points while answering this question.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>As in presales each client comes with their own set of requirements hence every deal needs different operating model.</li>
<li>Prepare in advance your well versed operating model which you can explain in few minutes. It should be easy, short and quick to explain best is L1, L2 support or Help desk. You can explain the onsite off shore model here.</li>
</ul>
<p><strong>Question 10 &#8211; How good are you with Microsoft Excel, Microsoft Project, MS Word and Power point?</strong></p>
<p><strong>Answer: </strong>Be honest and answer whatever knowledge you have about these applications.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>You can rate your skills on the scale of 10 based on your expertise. These are much needed skills in presales so you can say you are well versed with these software’s.</li>
<li>You can name excel functions for e.g. v-look up, If and else statements, Sum, Average, count, password protection etc.</li>
</ul>
<p><strong>Question 11- How will you manage Shortfuse deals?</strong></p>
<p><strong>Answer – </strong>Shortfuse deals are the ones with short deadline to submit solution. You can take any example where you got &lt; 2 days for providing solution, getting approval, costing etc. and describe its challenges and how did you overcome it. Explain how you planned it<strong>.</strong></p>
<p><strong>Example/Tips:</strong></p>
<ul>
<li>Get all stakeholders on call to gather requirement / scope and provide solution in power point.</li>
<li>Send solution deck to all stake holders for approval and suggestions.</li>
<li>Inform the Finance team in advance about costing request.</li>
<li>Onboard delivery team to participate in solution approval and cost drill down exercise.</li>
<li>Divide submission documents among other stake holders to finish the docs on time.</li>
<li>All documents should be versioned and kept on SharePoint repository and Quick follow calls twice /thrice a day should be scheduled to wind up the short fuse deal on time<strong>.</strong></li>
</ul>
<p>All the above steps will allow you to manage short fuse deals but onboarding stake holders, Quick follow-up calls and Team work is mandatory for successful submission and win.</p>
<p><strong>Question 12– Have you ever presented to client/Client Orals?</strong></p>
<p><strong>Answer: </strong>Share your experience by picking any relevant deal where you presented your solution.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>Talk about you preparatory work.</li>
<li>Then describe the audience and Presentation challenges.</li>
<li>Explain how your presentation provided a positive impact.</li>
</ul>
<p><strong>Question 13 – Did ever presented to CTO’s or CEO what was your preparation?</strong></p>
<p><strong>Answer: </strong>Share your experience if you have ever presented any solution to CTO/CEO.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>Talk about you preparatory work.</li>
<li>Explain how your presentation provided a positive impact.</li>
</ul>
<p><strong>Questions 14 – Did you ever analyze the lost deals and prepared report for the same and shared with all stakeholders?</strong></p>
<p><strong>Answer:  </strong>Yes, every firms do root cause analyses of lost deals. There is various factor which we analyze. Some of the factors are given below.</p>
<ul>
<li>Less competitive pricing</li>
<li>RTO &amp; RPO was not presented</li>
<li>Lack of experience in domain</li>
<li>Solution provided was not cost effective</li>
<li>Solution not fit to the Client requirement</li>
</ul>
<p><strong>Question 15 &#8211; How good are you in handling pressure?</strong></p>
<p><strong>Answer: </strong>I hardly feel pressure as presales is my passion and don’t feel weight about it. I get excited about the dynamic which presales brings in my life. I believe if we have technical knowledge with blend of confidence and motivation there is no pressure which can oppress us.<strong> </strong></p>
<p><strong>Question 16 – How did you manage escalation for a short fuse deal?</strong></p>
<p><strong>Answer: </strong>The Short fuse deal comes with pressure and panic among all which could lend us to escalation in some cases. However, if I decided to take responsibility I ensure I complete it and I have hardly faced any major escalation in my tenure. I always plan my work in 3-way process.</p>
<ol>
<li>Acknowledge the responsibility / Area of scope which I can provide solution with timelines</li>
<li>Address the concern of Sales and delivers teams in my area of scope</li>
<li>Timely sending the progress report to stake holders to avoid panic and escalations.<strong> </strong></li>
</ol>
<p><strong>Question 17 – What all certification have you done on Solution Architect?</strong></p>
<p><strong>Answer: </strong>Answer about your certifications or trainings you have done to learn presales role.</p>
<p><strong>Tips:</strong></p>
<p>It’s not mandatory to have Solution Architect certification however if someone wishes to excel in the same. BCS Intermediate level certificate is there or either TOGAF 8 or TOGAF 9 level 2 certificate could be useful.</p>
<p><strong>Question 18 – Do you have any experience in Upsell?</strong></p>
<p><strong>Answer: </strong>In case you have any experience, you can talk about it.</p>
<p><strong>Tips:</strong></p>
<p>Basically, in this question you can showcase your sales skills. How did you analyze client requirement and able to convince them to buy proposed solution to solve their concerns.<strong> </strong></p>
<p><strong>Question 19 &#8211;  what was your role post you won the deal?</strong></p>
<p><strong>Answer: </strong>You can explain about your role post winning the deal and tell about till what stage you were involved.</p>
<p><strong>Tips:</strong></p>
<ul>
<li>SOW (scope of work)</li>
<li>Final contract</li>
<li>Project Initiation</li>
<li>Handover to delivery <strong> </strong></li>
</ul>
<p><strong>Question 20 – How good are you in preparing SOW and what all you cover in the same?</strong></p>
<p><strong>Answer: </strong>You can define scope of work providing few major headings below.</p>
<ul>
<li>Scope of services</li>
<li>Cover client requirement</li>
<li>Terms and condition</li>
<li>Final deliverables</li>
<li>Sign off procedure</li>
<li>Any legal contractual terms and conditions/Governance</li>
<li>RACI Matrix</li>
<li>Assumptions &amp; Key Dependencies</li>
<li>Termination/Exit Plan</li>
</ul>
<p><strong>Questions 21 – How comfortable are you with travelling on short notice?</strong></p>
<p><strong>Answer: </strong>I am comfortable in travelling considering the fact presales /Sales is a Travel job.<strong> </strong></p>
<p><strong>Question 22 – How many deals you can handle in parallel?</strong></p>
<p><strong>Answer: </strong>I can work on 3-5 deals in parallel depending on the size of the deal.</p>
<p><strong>Tips:</strong></p>
<p>It is imperative that you speak truth in this question. As it’s like commitment so unrealistic figure can get you in trouble<strong>. </strong>With Presales as carrier 3 deal at a time is Business as usual so Be Honest here.<strong> </strong></p>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter</a> handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/interview-questions/presales-interview-questions/presales-interview-questions-answers/">Presales Interview Questions &#038; Answers &#8211; Part 1</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/interview-questions/presales-interview-questions/presales-interview-questions-answers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Learn Cloud Computing?</title>
		<link>https://techyaz.com/learning/how-to-learn-cloud-computing/</link>
					<comments>https://techyaz.com/learning/how-to-learn-cloud-computing/#comments</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 12:06:25 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Learning]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[learning]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1677</guid>

					<description><![CDATA[<p>This article is very useful if you want to learn Cloud Computing. Here, I have explained all concerns that comes in a beginner’s mind along with required training courses.  Cloud Computing is growing faster than ever and creating lot of high&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is very useful if you want to learn<strong> <a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a>.</strong> Here, I have explained all concerns that comes in a beginner’s mind along with required training courses.  Cloud Computing is growing faster than ever and creating lot of high paying jobs. Cloud means compute for e.g. (Storage, Software, Platform, CPU, RAM, Processor, network, Cluster etc.) using Internet anywhere, anytime and in any size. It enables any organization to focus on their core business rather than maintaining IT infrastructure.</p>
<p><strong><a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a></strong> brings best in breed technologies mesh to provide high availability, durability and capacity with minimum time frame. In simple words your traditional data center (DC) would have flew down from on-premise to somewhere with big giants Cloud Service Providers DC like GCP (Google Cloud Platform), AWS (Amazon Web Services), Azure, IBM, Salesforce etc.</p>
<h3><span style="color: #333399;">Why Should You Learn Cloud Computing?</span></h3>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1758 alignright" src="http://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min.png" alt="Learn Cloud Computing" width="300" height="300" srcset="https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min.png 300w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-150x150.png 150w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-160x160.png 160w, https://techyaz.com/wp-content/uploads/2018/02/Learn-Cloud-Computing-min-320x320.png 320w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>As i mentioned above, Cloud Computing is growing faster than ever and creating lot of high paying jobs. The reason behind its popularity is its <strong><em>Pay As You Use</em></strong> model.</p>
<p>All cloud services are running on “<em><strong><span style="color: #000000;">Pay As You Use</span></strong></em>” model. You only pay for the services till you are using and can increase/decrease the usage capacity in few hours only. The Cloud Computing takes away hassle of procurement of servers, software’s &amp; resources. It also removes the need of building, managing &amp; maintenance of Data centres that is why most of the organizations are adopting cloud computing these days.</p>
<p>As more organizations will move to cloud, more cloud related jobs or opportunities will arise. So, it is imperative to learn cloud computing technology so that you can make use of it in your IT career. The added advantage of learning cloud is that you can bring value to your organization and its clients.</p>
<h3><span style="color: #333399;">Prerequisites to Learn Cloud Computing</span></h3>
<p>Today I will brief you about the skills needed to learn cloud and build promising career in it. Cloud can add value to your CV/Resume. Every IT professional need to have some familiarity with cloud. It has become an essential part of Information Technology. We as Digital Users are leveraging cloud Technology every day in our life. The most common example is social media, mails, music, YouTube, Facebook, Instagram, Twitter, News etc. Everything where data is stored in huge size is using cloud technology in the background.</p>
<p>Cloud Computing services falls into three categories:</p>
<ul>
<li>Infrastructure as a Service (IaaS),</li>
<li>Platform as a Service (PaaS)</li>
<li>Software as a Service (SaaS).</li>
</ul>
<p>Although this article is very much applicable to all three categories for learning standpoint but primarily we will talk and refer about IaaS (Infrastructure as a Service) model. Infrastructure as a service (IaaS) is a form of cloud computing that provides virtualized compute resources over the internet following pay per use model.</p>
<p>As in earlier days Data center had multiple roles and responsibilities, similarly in cloud you can get similar technology, roles and career. If you belongs to IT Infrastructure services, then you  can pursue your career in IaaS cloud computing.</p>
<p>One can learn cloud as a beginner even if you have very basic skills in computers, prior experience in IT is an added advantage.</p>
<p>To begin with cloud there are three-important area to cover:</p>
<ul>
<li><strong>Virtualization concepts</strong></li>
<li><strong>Networking in virtual environment </strong></li>
<li><strong>Operating systems (Linux &amp; Windows)</strong></li>
</ul>
<h5><span style="color: #3366ff;">Virtualization </span></h5>
<p>It is important to understand how virtualized environment operates. In cloud context, virtual machines lie over and above hypervisor layer. Multiple VM’s shared same physical hardware and all the network equipment but are isolated or virtually separated from the other client machines using hypervisor technology. Virtualization means every type of application or workload which needed physical machines in past now can run by using shared resources across many clients. For more information refer to</p>
<h5><span style="color: #3366ff;">Networking</span></h5>
<p>The most important aspect of cloud is to understand cloud networking. It is very difficult section in cloud, and even those with some robust skills, typically require time to fully understand it.</p>
<h5><span style="color: #3366ff;">Operating System (Linux &amp; Windows)</span></h5>
<p>Hands on experience on Linux and Windows is with excellent command lines skills is must before begin journey in cloud computing. One must begin with above three concepts to enter cloud computing.</p>
<h3><span style="color: #333399;">How to Start Learning Cloud Computing?</span></h3>
<p>The very first thing you need to do is, you need to decide the cloud service provider for which you want to learn and pursue distinct roles. There are many Cloud service providers in the market. You can choose any of them but it’s always wise to choose from top 3 service providers. Currently, Amazon is top cloud service provider in the market followed by Microsoft. Below are the names of some popular cloud service providers.</p>
<ol>
<li>Amazon Web Services (AWS)</li>
<li>Microsoft Azure</li>
<li>IBM Cloud</li>
<li>Google Cloud Platform (GCP)</li>
<li>Salesforce</li>
</ol>
<p>Once you have chosen the right cloud service provider then you should focus on the distinct domains. For example, if you had prior experience in networks you can choose to become Cloud Network Architect role and start focusing on CSP network services. If you are a system administrator then you can pursue Cloud System Administrator role. Below is the list of some cloud computing roles.</p>
<p>You can choose any roles given below as per your choice and are of interest. It would be an added advantage if you choose a domain in which you have some knowledge. The Distinct Technical roles which you can pursue in cloud are given below.</p>
<ul>
<li>Cloud Operations Engineer</li>
<li>Cloud System Administrator</li>
<li>Cloud Solution Architect</li>
<li>Cloud Technical Architect</li>
<li>Cloud Network Architect</li>
<li>Cloud Security Architect</li>
<li>Cloud Sales Consultant</li>
</ul>
<p>I have explained the responsibilities and job profile of each and every role in below points.</p>
<ul>
<li><span style="color: #000000;"><strong>Cloud Operation Engineer &#8211;</strong></span> You should have at least 3 years of experience in this role. You need to ensure management of daily operations like adding Virtual machine (VM) to the cloud stack, installing software’s on the VM’s, monitoring cloud usage, controlling access to cloud environment, Identify and Access management for cloud.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud System Administrator – </strong></span>This job profile is similar to the system administrator job in legacy environment. Here, you need to take care of your cloud deployments and administration.  In cloud context security is shared responsibility however the systems security is client accountability. This role is mainly focus on hardening the Operating system and maintaining it. This will cover antivirus installation, policy control and overall protection services offered by cloud service provider. Strong Linux command line skills are needed.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Solution Architect –</strong></span> You should have more than 6 years of experience to pursue a cloud solution architect role. The Cloud Solution Architect roles means to understand client requirement and propose possible design for the cloud IaaS. This comprise of servers, Data storage strategy, location, region, monitoring, security, Disaster Recovery and Business Continuity solution. Cloud SA may need to design a Hosting solution for some website or Data analytics, Data warehousing, Graphics processing solution. The responsibility of cloud SA is to understand all services provided by the Cloud Service Provider (CSP) so that he can design a suitable solution considering all services and their relative cost.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Technical Architect – </strong></span>You should be on senior role or at least 7 years of experience to work as cloud Technical Architect. The Technical Architect role is to create the proposed design by the cloud Solution Architect. The responsibility of the Architect is to manage all technical queries in creating the entire cloud stack. Expert in shell, Perl, python compiled code language will be an added advantage. You must have expert level knowledge of Linux and windows operating system. This role demands knowledge of all fields including Networks, Infrastructure, Servers and settings, Identify and Access management. The Architect need to fix any issue which comes under configuring access, or security settings, Roles distribution etc. The hands-on experience on all services provided by CSP is mandatory for this role.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Network Architect</strong>&#8211;</span> The Network Architect need to configure Virtual Private Network(VPC), load balancing in cloud, manage ports, Incoming and outgoing connections, Tunnelling, Internet to cloud connection etc. Deep understanding of TCP/IP, Subnetting, DNS, DHCP, NAT and routing, strong knowledge of layer 2 network protocols, Good knowledge of IP routing, scripting abilities Perl or Shell. CCNA or CCNP preferred certification. The Network Architect need to design, create and maintain any network related issues.</li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Security Architect &#8211;</strong></span>The role is most crucial and important in cloud environment considering the fact you can access cloud from anywhere anytime and its security need to be designed by Cloud Security Architect. The data security at rest and in transit, encryptions and descriptions, to avoid data loss and exposure. Good understanding of Internet and hosting from network layer up through the application layer, monitoring tools, clustering and internet security. The cloud security policies, governance, risk assessment, Multi-factor authentication and Authorization. Read attached article if you want to <a href="http://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener"><strong>understand the basics of Cloud Security and Data Protection</strong>.</a></li>
</ul>
<ul>
<li><span style="color: #000000;"><strong>Cloud Sales</strong> <strong>Consultant</strong> &#8211;</span> Must be a business administration preferable MBA, Client facing roles, excellent communication skills, building strategic partnership at the C-level. Google knowledge of market leader in cloud in terms of services and costing. Love travel jobs.</li>
</ul>
<h3><span style="color: #333399;">Study Materials</span></h3>
<p>There are lot of study materials available on internet to start with. Many portals have free courses that you can register to learn cloud computing. You can also buy a cloud related course on <strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dcloud%2520computing%26src%3Dsac%26kw%3Dcloud%26sort%3Drelevance">Udemy</a> </strong>or <strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=40328&amp;murl=https%3A%2F%2Fwww.coursera.org%2Fcourses%3Flanguages%3Den%26query%3Dcloud%2Bcomputing%26userQuery%3Dcloud%2Bcomputing">Coursera</a></strong>. I have given specific training courses for each cloud providers in below links. You can access as per your choice to learn different cloud courses like AWS, Azure, GCP etc. You can also get practice papers as well if you are preparing for AWS or Azure certifications.</p>
<p><strong><span style="color: #993300;">Online Training Courses for Top Cloud Service Providers:</span></strong></p>
<ul>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Daws%2520certified%2520solutions%2520architect%26src%3Dsac%26kw%3DAWS" target="_blank" rel="noopener">AWS Certified Solution Architect &#8211; Online Training Courses</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=40328&amp;murl=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fgcp-architecture">Architecting with Google Cloud Platform</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dazure%2520certification%26src%3Dsac%26kw%3Dazure%26sort%3Dmost-reviewed">Architecting Microsoft Azure Solutions</a></strong></li>
<li><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3DGCP%2520certification%26src%3Dsac%26kw%3Dgcp%2520certification">Hands on Google Cloud Platform (GCP) &#8211; Cloud Architect</a></strong></li>
</ul>
<p>I hope you like this article. Please Like, Comment, Share &amp; Subscribe to this website to get latest articles directly into your inbox. You can also follow our <a href="https://www.facebook.com/Techyaz/">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter</a> handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Read More:</strong></em></span></p>
<ul>
<li><strong><a href="http://techyaz.com/learning/is-presales-a-good-career-opportunity/" target="_blank" rel="noopener">Is Presales a Good Career Opportunity in IT Industry?</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Top 5 Cloud Service Provider Accreditations and Third Party Auditor Reports</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Understanding Cloud Computing</a></strong></li>
<li><strong><a href="http://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security and Data Protection</a></strong></li>
</ul>
<p>The post <a href="https://techyaz.com/learning/how-to-learn-cloud-computing/">How to Learn Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/learning/how-to-learn-cloud-computing/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding Cloud Security &#038; Data Protection</title>
		<link>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/</link>
					<comments>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 10:44:16 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1099</guid>

					<description><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like Is our data secured in Cloud environment? Or Is your&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like <strong>Is our data secured in Cloud environment?</strong> Or <strong>Is your data in Cloud hackable?</strong> Or <strong>Can your data be disclosed by the Cloud Service Provider?</strong></p>
<p>Here I am going to answer all these questions and explaining about Cloud Security in this context.</p>
<h3><span style="color: #000080;"><strong>Is your data secure in Cloud environment?</strong></span></h3>
<p><strong>Yes,</strong> your data will be secured in <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">cloud environment</a> if you can design security solution/configurations leveraging public cloud providers features and third-party tools efficiently.</p>
<p>The amount of security configuration work you must do will varies, depending on what kind of cloud services you select and how sensitive your data is.</p>
<p>Security in Cloud creates a shared responsibility model between the customer and Cloud Service Provider (CSP). CSPs are responsible for securing the infrastructure (hardware, software, networks, and facilities of their Data center) that supports the cloud and you will be responsible for anything you put on the cloud or connect to the cloud (Data, Operating System, softwares, tools, License, Access, Credentials, authentication, encryption etc.)</p>
<h3><span style="color: #000080;"><strong>Is your data in Cloud Hackable?</strong></span></h3>
<p><strong>No,</strong> cloud systems are not hackable in terms of technology, hardware and network services provided by cloud provider. However, if security configurations are not done accurately by the user then loopholes in security may lead vulnerability in your cloud environment.</p>
<h3><span style="color: #000080;"><strong>Can your data be disclosed by the Cloud Service Provider?</strong></span></h3>
<p>Your content/data <strong>will not</strong> be disclosed unless service provider required to do so to comply with the law of the country or a valid and binding order of a governmental or regulatory body. Unless prohibited from doing so or there is clear indication of illegal conduct about the use of CSP’s products or services. CSP notifies customers before disclosing customer content so they can seek protection from disclosure.</p>
<p>To understand all above and similar security related concerns you should first understand Cloud Security. Let’s discuss what is cloud security and how many domains we need to take care from cloud security point of view.</p>
<h3><span style="color: #000080;"><strong>What is Cloud Security?</strong></span></h3>
<p>As every second your information/data travel through cloud and from different locations, networks and regions. We need to ensure it is not leaked in process of transmission from one place to other. Typically, all firms are well verse about physical and technical security of their On-premise data center. Similarly, cloud services and Infrastructure need to be secured to protect the confidentiality, integrity, and availability of your or your client data.</p>
<p>In Cloud context, security is a shared responsibility between the Cloud Service Provider (CSP) and its users/customers. CSPs take care of physical and logical security of its underlying hardware until Hypervisor layer. However, anything above Operating System is Client responsibility because customer owns the data and service provider has no access to it. Although it also varies in each model of Cloud Computing for some services.</p>
<p>Cloud Security is all about leveraging security features and tools to design and build a secure cloud environment to protect the privacy and integrity of cloud customers and their data. Cloud Security is blend of technologies and policies designed to adhere and regulate compliance rules and protect information, data applications and infrastructure associated with <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> use.</p>
<h3><span style="color: #000080;"><strong>Cloud Security Categories</strong></span></h3>
<p>From cloud security perspective, below are the cloud security domains or categories that needs to be considered while building cloud environment.</p>
<ol>
<li><strong>Physical Security</strong></li>
<li><strong>Network security</strong></li>
<li><strong>System Security</strong></li>
<li><strong>Application Security</strong></li>
<li><strong>Data Security</strong></li>
<li><strong>Identity and Access management</strong></li>
<li><strong>Encryptions</strong></li>
<li><strong>Security operations</strong></li>
</ol>
<p>Each ownership for each type of security in cloud varies in each model of Cloud. You can see who is responsible for  what in each cloud model in below image.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1100" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png" alt="cloud security" width="1024" height="410" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png 1024w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-300x120.png 300w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-768x307.png 768w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security.png 1204w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<ol>
<li><strong>Physical Security- </strong>is the protection of hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. CSPs are responsible to take care of this security.</li>
<li><strong>Network Security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc. This security is shared responsibility between CSPs &amp; Customer.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data Security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>As all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance.</li>
</ol>
<h3><span style="color: #000080;"><strong>Choose Cloud Service Provider considering Data Security, Information Security and Quality Assurance?</strong></span></h3>
<p>Its depends on data and its criticality in terms of sensitivity, availability &amp; durability requirement. For choosing most reliable cloud service provider we must consider <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">CSP’s accreditations, security certifications and third party audit assessment reports</a>. All major cloud service provider share their policies accreditation on data privacy, security, durability, availability information on their respective portals under valid Non-disclosure agreement. These certifications are global and can be achieved through periodic rigorous external audit accredited certification bodies based on <strong>NIST</strong> (National Industrial Security Program Operating Manual) global standards.</p>
<p>Some of the Most popular <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Cloud Service Provider Accreditations and Certification</a> for cloud computing compliance and security are given in attached article. Read it to understand Cloud Accreditations and Certification that will finally help you to choose right Cloud Service Provider.</p>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Reference Links:</strong></em></span> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</title>
		<link>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</link>
					<comments>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:13 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1094</guid>

					<description><![CDATA[<p>Cloud Service provider is responsible for protecting its infrastructure that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud Service provider is responsible for <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">protecting its infrastructure</a> that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and technical security of the cloud data center hence all CSPs publish several third-party auditors report to validate its compliance. CSPs  provide reports from third-party auditors who have verified their compliance with a variety of computer security standards and regulations that is known as Cloud Service Provider Accreditation.</p>
<p><img loading="lazy" decoding="async" class="aligncenter  wp-image-1097" src="http://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg" alt="Cloud Accreditations" width="525" height="295" srcset="https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg 1024w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-300x169.jpg 300w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-768x432.jpg 768w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations.jpg 1280w" sizes="auto, (max-width: 525px) 100vw, 525px" /></p>
<h3><span style="color: #000080;">Compliance Program provided by Cloud Services Providers</span></h3>
<p>Cloud Service providers ensure robust controls to secure their infrastructure, to protect client data. As virtual systems build over the cloud Infrastructure need also to be secured and it comes with shared responsibility and compliance. Cloud Data center environment comes with audit friendly features and standards to ensure client satisfaction about their data security. The IT infrastructure that CSP provides to its customers is designed and managed in orientation with security best practices and a variety of IT security standards due to economies of scale, including but not limited to the following:</p>
<p><span style="color: #800000;"><strong>AWS (Amazon) Security Certifications /Accreditation </strong></span></p>
<ul>
<li><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> Compliance Controls Catalogue (C5)</li>
<li>FedRAMP Partner Package</li>
<li>Global Financial Services Regulatory Principles IRAP Package</li>
<li>ISO 27001:2013 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27017:2015 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27018:2014 Certification and Statement of Applicability (SoA)</li>
<li>ISO 9001:2015 Certification</li>
<li>MAS TRM Guidelines Workbook</li>
<li>PCI DSS Attestation of Compliance (AOC) and Responsibility Summary</li>
<li>PSN Connection Compliance Certificate (CoCo)</li>
<li>PSN Service Provision Compliance Certificate</li>
<li>Quality Management System Overview</li>
<li>Service Organization Controls (SOC) 1 Report</li>
<li>Service Organization Controls (SOC) 2 Report</li>
<li>Service Organization Controls (SOC) 3 Report</li>
<li>SOC Continued Operations</li>
</ul>
<p><strong> </strong><span style="color: #800000;"><strong>Microsoft Azure Security and Compliance Certifications / Accreditation</strong></span><strong> </strong></p>
<ul>
<li>ISO 27001, FedRAMP, SOC 1 and SOC 2.</li>
<li>The Content Delivery and Security Association (CDSA)</li>
<li>Criminal Justice Information Services (CJIS)</li>
<li>The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) CSACCM</li>
<li>EU Model Clause</li>
<li>FDA 21 CFR Part 11(The US Food and Drug Administration (FDA) Code of Federal</li>
<li>Regulations (CFR) Title 21 Part 11)</li>
<li>FedRAMP(Federal Risk and Authorization Management Program (FedRAMP)</li>
<li>The Family Educational Rights and Privacy Act (FERPA)</li>
<li>FIPS 140-2. Federal Information Processing Standard (FIPS) Publication 140-2</li>
<li>The Health Insurance Portability and Accountability Act (HIPAA)</li>
<li>IRAP (Australian Government Information Security Registered Assessors Program)</li>
<li>ISO/IEC 27001/27002:2013</li>
<li>Multi-Level Protection Scheme (MLPS) is based on the Chinese state standard issued by the Ministry of Public Security</li>
<li>Multi-Tier Cloud Security Standard for Singapore (MTCS SS),</li>
<li>Payment Card Industry (PCI) Data Security Standards (DSS) version 3.0</li>
<li>TCS CCCPPF Trusted Cloud Service certification developed by the China Cloud Computing Promotion and Policy Forum (CCCPPF)</li>
<li>UK G-Cloud.<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>Google Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>SSAE16 / ISAE 3402 Type II:</li>
<li>SOC 1</li>
<li>SOC 2</li>
<li>SOC 3 public audit report</li>
<li>ISO 27017, Cloud Security</li>
<li>ISO 27018, Cloud Privacy</li>
<li>FedRAMP ATO for Google App Engine</li>
<li>PCI DSS v3.2</li>
<li>HIPAA</li>
<li>CSA STAR</li>
<li>MTCS Tier 3 Certification (Singapore)</li>
<li>Google Cloud Platform and the EU Data Protection Directive<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>IBM Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>FedRAMP</li>
<li>FISMA</li>
<li>FFIEC</li>
<li>SOC Reports</li>
<li>ISO 27001</li>
<li>ISO 27017</li>
<li>ISO 27018</li>
<li>Cloud Security Alliance</li>
<li>PCI Compliance</li>
<li>HIPAA</li>
<li>HITRUST Assessment</li>
<li>GSMA (DAL09, PAR01)</li>
<li>CJIS Standards</li>
<li>EU Model Clauses</li>
<li>Privacy Shield</li>
<li>IBM ISO Management System Certifications</li>
</ul>
<p><span style="color: #800000;"><strong><em>Related Read:</em></strong></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">What is Cloud Computing?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection in Cloud</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><em><strong><span style="color: #800000;">Reference Links:</span></strong></em> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Cloud Computing?</title>
		<link>https://techyaz.com/cloud/what-is-cloud-computing/</link>
					<comments>https://techyaz.com/cloud/what-is-cloud-computing/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 04:32:54 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[Iaas]]></category>
		<category><![CDATA[Paas]]></category>
		<category><![CDATA[Saas]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1082</guid>

					<description><![CDATA[<p>In today’s digital world, all our data is travelling every second from one place to other electronically. Most of the data in today’s scenarios resides in cloud, whether we talk about personal or commercial data, it&#8217;s sitting in cloud so&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/what-is-cloud-computing/">What is Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s digital world, all our data is travelling every second from one place to other electronically. Most of the data in today’s scenarios resides in cloud, whether we talk about personal or commercial data, it&#8217;s sitting in cloud so that it can be made available anywhere anytime. We all perhaps using cloud computing right now, even if we don’t understand it like sending or receiving emails, watch movies or TV online, listen to music, play games, chatting social networking or store pictures and other files etc.</p>
<h5><span style="color: #000080;">Cloud Computing</span></h5>
<p>Cloud Computing atmosphere is all about getting compute for e.g. (Storage, Software, Platform, CPU, RAM, Processor, network, Cluster etc.) using Internet anywhere, anytime and in any size. Cloud provides unlimited compute services with pay as per use model. Cloud bring best in breed technologies mesh to provide high availability, high durability and high capacity with minimum time frame, in simple words your traditional data center (DC) would have flew down from on-premise to somewhere with big giants Cloud Service Providers DC like Google, AWS, Azure etc.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1086" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640.jpg" alt="cloud computing" width="640" height="360" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640.jpg 640w, https://techyaz.com/wp-content/uploads/2017/11/cloud-computing-2001090_640-300x169.jpg 300w" sizes="auto, (max-width: 640px) 100vw, 640px" /></p>
<h5><span style="color: #000080;">Benefits of Cloud Computing</span></h5>
<p>There are many benefits of Cloud Computing. It is a big shift from the traditional way businesses think about IT resources.</p>
<ol>
<li><strong>Time</strong> -Most cloud computing services are provided on demand, so even vast amounts of computing resources can be provisioned in minutes, certainly with just a few mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity planning</li>
<li><strong>Cost </strong>&#8211; Cloud Computing removes the investment expense of procurement of hardware and software and setting up and running onsite datacenters—the racks of servers, 24/7 electricity for power and cooling, the IT experts for managing the infrastructure, Hardware maintenance, Physical security etc.</li>
<li><strong>Scalability </strong>-The benefits of cloud computing services include the ability to scale elastically. In cloud speak, that means delivering the right amount of IT resources—for example, computing power, storage, bandwidth—right when it&#8217;s needed and from the right geographic location.</li>
<li><strong>Productivity</strong>-On-site data centers typically requires high maintenance, technology upgrade and heavy investment as it need lot of “racking and stacking”—hardware setup, software patching and other time-consuming IT management tasks. Cloud removes the need for many of these tasks, so IT teams can spend time on achieving business goals. Moving to the cloud gives access to enterprise-class technology, for everyone anywhere anytime.</li>
<li><strong>High Performance</strong>-The biggest cloud computing services run on a worldwide network of secure datacenters, which are regularly upgraded to the latest generation of fast and efficient computing hardware. This offers several benefits over a single corporate datacenter, including reduced network latency for applications and greater economies of scale. You can increase any amount of storage and processing capacity with pay per use model.</li>
<li><strong>High Reliability</strong>&#8211; Cloud computing makes data backup, disaster recovery and business continuity easier and less expensive, because data can be replicated at multiple redundant locations on the cloud provider’s network.</li>
<li><strong>Security </strong>&#8211; Cloud computing gives you greater security when your hardware like laptop, mobile, tablet etc. are lost, damage or stolen this occurs as your data is stored in the cloud, you can access it no matter what happens to your machine. And you can even remotely wipe data from lost devices so it doesn’t get into the wrong hands. Cloud Ensures minimum disruption to Business.</li>
<li><strong>Disaster Recovery –</strong> Cloud provides best DR solution for any businesses, cloud-based backup and recovery solutions save time, reduce large upfront investment due to global presence and economies of scale. Cloud service provider features like tiered storage, multiple Availability zones, Data replication etc. can be leveraged to design optimum DR and BCP solutions.</li>
</ol>
<h5><span style="color: #000080;">Types of Cloud Offerings</span></h5>
<p>Cloud Computing services majorly  falls into three categories:</p>
<ul>
<li><strong>Infrastructure as a Service (IaaS), </strong></li>
<li><strong>Platform as a Service (PaaS) </strong></li>
<li><strong>Software as a Service (SaaS). </strong></li>
</ul>
<p><strong>IaaS &#8211; Infrastructure as a Service</strong></p>
<p>Infrastructure as a service (IaaS) is a form of <a href="http://searchcloudcomputing.techtarget.com/definition/cloud-computing">cloud computing</a> that provides virtualized computing resources over the internet following pay per use model . Or we can say traditional on-prem data center services on rent for e.g. IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems.</p>
<p><strong>Platform as a Service (PaaS)</strong></p>
<p>Platform-as-a-service (PaaS) represents cloud services that provide platform or environment for developing, run, manage testing, delivering and managing applications on-demand online anytime. PaaS ensure ready to use development &amp; testing platform without the complexity of building and maintaining the infrastructure. PaaS is designed to make developers and clients life easy by leveraging pre-configured systems, templates, software’s ready to build mobile or web applications  and with no hassle of setting up or managing the underlying infrastructure of servers, storage, network and databases needed for development.</p>
<p><strong>Software as a Service (SaaS)</strong></p>
<p>Software-as-a-service (SaaS) is a process for delivering software applications over the Internet, on demand and typically on a subscription basis. With SaaS, cloud providers host and manage the software application and underlying infrastructure and handle any maintenance, like software upgrades and security patching. Users connect to the application over the Internet, usually with a web browser on their phone, tablet or PC. To see more on SaaS, refer to <a href="https://azure.microsoft.com/en-in/overview/what-is-iaas/">Azure</a></p>
<h5><span style="color: #000080;">Top Cloud Service Providers</span></h5>
<p>As per <a href="https://www.forbes.com/sites/bobevans1/2017/06/05/meet-the-cloud-wars-top-10-the-worlds-most-powerful-cloud-computing-vendors/#62169ad14e1e&quot; ">Forbes</a> below are the list of top 10 Cloud service providers</p>
<ol>
<li>Microsoft Azure</li>
<li>AWS</li>
<li>Salesforce</li>
<li>SAP</li>
<li>IBM</li>
<li>Google</li>
<li>Oracle</li>
<li>Workday</li>
<li>Service Now</li>
<li>VMware</li>
</ol>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/cloud/what-is-cloud-computing/">What is Cloud Computing?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/what-is-cloud-computing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is Presales a Good Career Opportunity in IT?</title>
		<link>https://techyaz.com/learning/is-presales-a-good-career-opportunity/</link>
					<comments>https://techyaz.com/learning/is-presales-a-good-career-opportunity/#comments</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Mon, 28 Aug 2017 13:07:28 +0000</pubDate>
				<category><![CDATA[Learning]]></category>
		<category><![CDATA[Presales]]></category>
		<category><![CDATA[career]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[presales]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=688</guid>

					<description><![CDATA[<p>Most of the industry folks think, every new deal/project won by any organization is result of their smart sales team. However, there are multiple teams who contribute behind the scene to bring in new projects/deals for your organization. Presales is&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/learning/is-presales-a-good-career-opportunity/">Is Presales a Good Career Opportunity in IT?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most of the industry folks think, every new deal/project won by any organization is result of their smart sales team. However, there are multiple teams who contribute behind the scene to bring in new projects/deals for your organization. <strong>Presales</strong> is one of those team who contribute significantly to win any deal. Here, I will describe presales basics and its<strong> <a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fcourses%2Fsearch%2F%3Fq%3Dit%2520presales%26src%3Dukw">online training courses</a> </strong>so you can have a better understanding about this domain.</p>
<p><em><strong><span style="color: #800000;">Related Article:</span></strong></em></p>
<ul>
<li><strong><a href="https://techyaz.com/learning/presales-interview-questions-answers/" target="_blank" rel="noopener">Presales Interview Questions &amp; Answers &#8211; Part 1</a></strong></li>
<li><strong><a href="https://techyaz.com/interview-questions/it-presales-interview-questions-answers-part-2/" target="_blank" rel="noopener">IT Presales Interview Questions &amp; Answers &#8211; Part 2</a></strong></li>
</ul>
<h3><span style="color: #003366;">What is Presales in IT?</span></h3>
<p>Pre-sales team work hard to accomplish the client requirement which includes Solutioning, Costing, Resourcing, Presentation etc. There are dedicated, passionate and Technical Presales resources behind every deal won by any organization.</p>
<p>These days Presales has been providing very fascinating and promising career prospects in IT/ITes. Maximum beginners are not aware of this career option. It’s not mandate to be an MBA for starting your career as presales consultant but it’s always an added advantage.</p>
<p>Presales resources are individual contributor and work closely with sales teams. The focus of Presales job profile is essentially in gathering requirement, running feasibility checks, design and build <strong>solutions</strong>.</p>
<p>Effective career as pre-sales consultant is a blend of technology and finance, as an Individual contributor this team is part of CoE (Center of excellence) in many organization.The basic job of pre-sales folks is to understand client requirement from a business standpoint is significant and then leveraging your writing, presenting and designing skills to stich the solution into a proposal.</p>
<p>The nature of the job is so dynamic that every <strong>Request for Information (RFI), Request for proposal (RFP</strong>) comes with new challenges and set of prerequisite, so need humans to analyze and manage the client requirement. Hence the presales job cannot be automated or done by robots but there is always a scope of automation that can be done at process or task level.</p>
<h3><span style="color: #003366;">Presales Job Responsibilities</span></h3>
<p>The benefits Pre-Sales resources get in front of client is that they can show actual expertise on the products or solutions they sell. Below are the list of responsibilities an organization expects from a Presales resource:</p>
<ul>
<li>Main responsibilities of Pre-Sales executives are to design a cost effective and competent solution that captures client requirement. Showcase your company achievements, experience and position in providing best quality service.</li>
<li>A Presales consultant need to present customer finest solution which covers their need and future aspects considering market trend and forecast.</li>
<li>Sales executives generally don’t have the forte in solution, hence Presales Team needs to be vigilant in designing solution which fulfill client requirement as well as  be cost effective and bring profit to their organization. It’s not just about winning deal it&#8217;s more about increasing company revenue.</li>
<li>Presales consultant mostly need to be assertive for a constructive conflict with sales and delivery team both, and at times in some exceptional cases with the customer as well.</li>
<li>The Pre-Sales must have good content writing skills.</li>
<li>Presales accountability should be taken very serious as final scope of work(SOW) gets documented by Presales guys that becomes Bible for delivery and customer teams.</li>
</ul>
<p>Read below article If you are preparing for a Presales Job Interview.</p>
<ul>
<li><strong><a href="http://techyaz.com/learning/presales-interview-questions-answers/" target="_blank" rel="noopener">Presales Interview Questions &amp; Answers</a></strong></li>
</ul>
<h3><span style="color: #003366;">Understanding Terminology used in Pre-Sales</span></h3>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-700" src="http://techyaz.com/wp-content/uploads/2017/08/presales_working_process-1024x576.jpg" alt="Presales" width="738" height="415" srcset="https://techyaz.com/wp-content/uploads/2017/08/presales_working_process-1024x576.jpg 1024w, https://techyaz.com/wp-content/uploads/2017/08/presales_working_process-300x169.jpg 300w, https://techyaz.com/wp-content/uploads/2017/08/presales_working_process-768x432.jpg 768w, https://techyaz.com/wp-content/uploads/2017/08/presales_working_process.jpg 1280w" sizes="auto, (max-width: 738px) 100vw, 738px" /></p>
<p><strong>Request for Information (RFI)</strong></p>
<p>This is the first stage of any deal. Many Organization release RFI to understand their vendor eligibility to fulfill their project/deal/job requirement. In RFI documents client/customer may ask any of the following information to decide the eligibility criteria:</p>
<ol>
<li>Technical expertise</li>
<li>Financial history</li>
<li>Overall User base</li>
<li>Credentials</li>
<li>Artefacts</li>
<li>Certifications</li>
<li>Technical Questionnaire</li>
<li>Legalities</li>
<li>Regional constraints</li>
<li>Strategy</li>
<li>Best possible Recommendation based on client requirement</li>
</ol>
<p>It&#8217;s Presales Team who respond to RFI’s and make your organization eligible to bid for RFP’s. RFI’s response need to be <strong>crisp</strong> and <strong>to the point</strong> so that customer shortlist your company for next stage of bidding which is called Request for proposal (RFP)</p>
<p><strong>Request for Proposal (RFP)</strong></p>
<p>Once client will shortlist your organization during RFI process, you will be qualified for this stage known as <strong>Request for Proposal (RFP). </strong>Any company who wishes to hire/outsource/contract any piece of job/activity/project leveraging different vendors in market release their requirement in the form of RFP. The RFP contain all information related to client requirement such as:</p>
<ol>
<li>Eligibility criteria for vendors</li>
<li>Submission dates</li>
<li>Client Requirements</li>
<li>Selection procedure</li>
<li>Confidentiality, Legal Terms and Conditions</li>
<li>Regional constraint</li>
<li>Quotations request details</li>
<li>Presentation request</li>
<li>Submission doc type in word document or Powerpoint presentation</li>
</ol>
<p>Post successful bidding client will declare the deal Winner and as a final stage of process SOW needs to be signed between the customer and the successful Vendor who had won the deal.</p>
<p><strong>Solutioning </strong></p>
<p>Analyzing client requirement for a deal/job/project/contract to enhance client business so that they can meet market demands, equipped with latest trend &amp; technology. The IT/third party/vendors /outsourcings firms provide optimal, cost effective resolution/ products/services to solve the concerns/hurdles of client. Presales resources analyze client requirements and convert that requirement in to best possible solution. They plan, design and build a layout document or powerpoint presentation to showcase the solution. Solutioning comes under RFP stage.</p>
<p><strong>Costing</strong></p>
<p>Every Deal/project/RFP have some budget. As per the type of deal client ask for quotes to deliver project in certain duration. The outsourcing company will provide cost for the job/activity in which the project would be completed. This includes complete budget plus margin to recover company expenses. Costing is part of RFP stage.</p>
<p>Costing includes the following:</p>
<ul>
<li>Travel expenses</li>
<li>Asset procurement</li>
<li>Software License cost</li>
<li>Resources</li>
<li>Any Trainings</li>
<li>Governance</li>
</ul>
<p><strong>Sizing</strong></p>
<p>Sizing means number of resources required to finish the project/job/activity. Sizing is the most crucial part of Pre-Sales, you must identify number of FTE (Full Time Employees) needed for respective technology, their tenure, total numbers and their Trainings need to finish the project on deadlines. In some cases, it also includes additional time for KT (Knowledge Transfer) and Reverse KT if needed.</p>
<p><strong>Governance </strong></p>
<p>For any deal/project/job there is a need of governance layer, who can manage any client escalation, communication along with entire project delivery management. The Governance layers will always be shared resources as they can manage multiple projects at one time. There could be some dedicated project managers depending upon the deal size and complexity.</p>
<p><strong>Scope of Work (SOW) </strong></p>
<p>Final stage of bidding for any contract/outsourcing/project is signing SOW. SOW is detailed document that clearly defines the following</p>
<ol>
<li>Roles and Responsibility between the client and the Vendor</li>
<li>Details project plan</li>
<li>Project timelines</li>
<li>Terms and Condition (Legal)</li>
<li>Knowledge transfer plan</li>
<li>Project kick off dates</li>
<li>Travel plan If any</li>
<li>Governance</li>
<li>Contract signed as mutually agreed between partner and client</li>
</ol>
<h3><span style="color: #003366;">Presales Technical Skills Requirement</span></h3>
<p>Person should have very good knowledge about overall IT infrastructure architecture or about your vertical. Apart from this you should have:</p>
<ul>
<li>Domain knowledge</li>
<li>Ability to understand Client Requirement</li>
<li>Content writing</li>
<li>Good communication &amp; presentation skills</li>
<li>Good Knowledge of Microsoft Office (PowerPoint, Visio, Excel &amp; word)</li>
</ul>
<h3><span style="color: #003366;">Presales Training Courses</span></h3>
<p>We live in Internet age so we have lot of options to learn any technology on Internet. These days you don&#8217;t need to buy a physical book to learn anything. You can get lot of study materials available over internet that will be helpful to learn any subject.</p>
<p><strong><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2F">Udemy</a> </strong>is one of the website that promotes digital learning. They have more than 40000 online video courses that anybody can use to learn as per their interest. I have also found one of the very good Presales course on Udemy. You can click on below link to directly access this course.</p>
<ul>
<li><a href="https://click.linksynergy.com/deeplink?id=zmgXyFNz7Ck&amp;mid=39197&amp;murl=https%3A%2F%2Fwww.udemy.com%2Fpresales-management%2F" target="_blank" rel="noopener"><strong>Online Training Course on Presales Management &#8211; IT Solutions &amp; Service Providers</strong></a></li>
</ul>
<h3><span style="color: #003366;">Who should join Presales?</span></h3>
<p>Presales is very promising field with lucrative remuneration and appreciation from management. You will help generating new business for your organization which will give you all the attention needed. Considering the above-mentioned facts if you really decided to join presales it’s important to be focus on below mentioned points:</p>
<ul>
<li>Passionate about Technology to pursue presales as career</li>
<li>Good listener and reminisce it</li>
<li>Can work under pressure as mostly they had to deal with short fused deals</li>
<li>Can deal and manage communication with diverse workforce</li>
<li>Decent content writer is essential part of presales</li>
<li>Continuous Skill development and Sound knowledge of emerging trends and technology is must</li>
<li>Decent knowledge on Costing and Finances</li>
<li>An Assertive leader to deal with delivery teams</li>
<li>Positive Attitude to manage success and failure graciously.</li>
<li>Virtuous negotiator</li>
</ul>
<h3><span style="color: #003366;">Who should <strong><span style="color: #ff0000;">NOT</span></strong> join Presales?</span></h3>
<p>Presales job will come with lots of responsibility and challenges. If you don’t like new change every day than you may not like the dynamic presales filed. The nature of this job is high pressure on delivering right solution at right time. It’s very crucial how you deal with win and miss deals. So please consider below facts before thinking of presales as career option:</p>
<ol>
<li>Don’t like Dynamic job with multiple skills</li>
<li>Don’t enjoy working under pressure</li>
<li>Don’t enjoy Writing &amp; making Powerpoint presentations</li>
<li>Don’t like sudden change</li>
<li>Don’t like travel</li>
<li>Don’t enjoy long hours calls</li>
<li>Casual Attitude</li>
</ol>
<h3><span style="color: #003366;">Experience needed to become Solution Architect (SA) in IT?</span></h3>
<p>Generally, 5+ years in IT industry which includes domain knowledge of at least 2 years. Multi-skills and good learners’ folks can enjoy this challenging role that will give you lucrative salary and Bonus along with recognition among all teams and higher management.  You can consider Presales as your career option if you have all above mentioned skills and qualities.</p>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p>The post <a href="https://techyaz.com/learning/is-presales-a-good-career-opportunity/">Is Presales a Good Career Opportunity in IT?</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/learning/is-presales-a-good-career-opportunity/feed/</wfw:commentRss>
			<slash:comments>7</slash:comments>
		
		
			</item>
	</channel>
</rss>
