Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist

Size: px
Start display at page:

Download "Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell."

Transcription

1 Novell Cloud Security Service Reducing Risk by Securing the Cloud Stefan Stiehl Senior Sales Technology Specialist

2 Disclaimer for Product in Development Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. 2 General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

3 Pressures Facing Your Customers Security and Compliance Secure access to resources Track who did what when Simplify and control multiple username and passwords Cost Reduction Mandate Manage different web applications Reduce hardware and software costs Lower help desk costs Business Agility Add/remove applications Add/change/remove users Add/remove partners Integrate new businesses 3 Many of these concerns can be solved using an identity and access management solution (IAM)

4 What is Identity and Access Management (IAM)? IAM solutions address the fundamental problem of managing who has access to what, Benefits of IAM include Single sign on (SSO) to different internal and external applications Manage changes to user identities and access rights Reduce password-related calls to the help desk Ensure that users have the right access to right resources Manage access for partners, customers and other users outside the organization Keeps sensitive information behind the firewall 4

5 Creating IT Administration Nightmare User data/ permissions User data/ permissions User data/ permissions User data/ permissions Users User data/ permissions Enterprise Challenge Multiple usernames/passwords IT Department Multiple identity silos Disparate administration tools Directory User data/ permissions Apps Challenge in timely deprovisioning accounts of ex-employees Systems/ tools 5

6 Novell Cloud Security Service Novell Cloud Security Service is the only multi-tenant identity and access management solution that allows you to manage a multi- SaaS environment and also provide its customers with a secure gateway to SaaS applications. 6 Confidential material, not for distribution without permission

7 NCSS Key Features 7 Active security services for annexing cloud services into an enterprise, including federated authentication and provisioning, role mapping, audit event routing, workflow participation, and secure locality based storage Connectors to SaaS and PaaS providers enterprise Identity systems Deployment, configuration and monitoring tools for service management of NCS by cloud providers Per-enterprise view and management of their use of SaaS and PaaS, and the connections to their internal systems

8 Conceptional Use Cases

9 IdP in Cloud using Secure Bridge Use Case Secured Customer to Cloud User Store User Store NCS Secure Bridge Novell Cloud Security Services IdP AuthN Service 2 SAML1, SAML2, WS-Fed Relying Party Participant SaaS Application User Authentication 1 3 User Accesses SaaS Resources User 9

10 IdP in Cloud using Secure Bridge Use Case Secured Customer to Legacy System User Store Hosting Center User Store NCS Secure Bridge Novell Cloud Security Services IdP AuthN Service SSO Form Fill over SSL Legacy Application User Authentication 1 3 User Accesses Legacy Application User 10

11 Novell Cloud Security Services Use Case Customer to Cloud IdP Participant User Store IdP Service AuthN Service SSO via SAML1, SAML2, WS-Fed, InfoCard Novell Cloud Security Services 2 SAML2 Relying Party Participant SaaS Application User Authentication 1 3 User Accesses SaaS Resources User 11

12 Implementation Cases

13 Managed Service Provider View Single-Tenant Implementation Scenario 13

14 Managed Service Provider View Multi-Tenant Implementation Scenario 14

15 Enterprise Customer View Scoped Implementation Scenario 15

16 Implementation Scenarios

17 NCSS Small Deployment 1 Multi-tenant Director With configuration backup/restore services 1-10 Customers/Tenants, each with 1 Secure Bridge and 1-2 Security Brokers connecting to 1-20 SaaS applications Director Provider Console Customer Console Audit Collection/Reporting Billing Collection/Reporting Multi-tenant Operations Customer Connections Security Brokers SaaS Connections Tenant A... Tenant B Tenant C 17

18 NCSS Medium Deployment Multi-tenant Director Cluster** 1-8 Directors Director Cluster Provider Console Customer Console Audit Collection/Reporting 1-50 Tenants, each with 1 Secure Bridge and 1-5 Security Brokers connecting to 1-50 SaaS applications Billing Collection/Reporting Multi-tenant Operations Database Cluster Customer Connections Tenant A Security Brokers... SaaS Connections Tenant B Tenant C 18 **Requires clustered DB server deployment

19 NCSS Large Deployment Database Cluster Multi-tenant Director Cluster** 1-5 Directors Console hosting Multi-tenant Operations 1-5 Audit Servers 1-5 Billing Servers Director Cluster Audit Cluster Billing Cluster Tenants, each with 1 Security Broker and 1-5 Security Brokers connecting to SaaS applications Customer Connections Security Brokers SaaS Connections Tenant A Tenant B Tenant C 19 **Requires clustered DB server deployment

20 Interfaces to Cloud Security

21 Novell Cloud Security Services Service Provider View Configuring Director 21

22 Novell Cloud Security Services Service Provider View Configuring Director 22

23 Novell Cloud Security Services Service Provider View Configuring Connectors 23

24 Novell Cloud Security Services Service Provider View Configuring Customers 24

25 Novell Cloud Security Services Service Provider View Cost Accounting 25

26 Novell Cloud Security Services Service Provider View Cost Accounting 26

27 Novell Cloud Security Services Service Provider View Single Tenant Home Panel 27

28 Novell Cloud Security Services Service Provider View Single Tenant Billing 28

29 Novell Cloud Security Services Customer View Home Panel 29

30 Making IT Work As One 30

31 Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management sstiehl@novell.com

More information

Building Images for the Cloud and Data Center with SUSE Studio

Building Images for the Cloud and Data Center with SUSE Studio Building Images for the Cloud and Data Center with SUSE Studio Michal Svec James Tan Senior Product Manager msvec@suse.com Engineering Manager jatan@suse.com Agenda From Software to Service SUSE Studio

More information

Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner

Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner Senior Product Manager, Security Management rwagner@novell.com University of Dayton Recognized by US News and World

More information

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad VP, Platform Evangelism WSO2 chris@wso2.com Section Break Text Here (32pt) Cloudy Goals Improve efficiency and

More information

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Brad DesAulniers Senior Software Engineer bradd@us.ibm.com @cb_brad Ryan Hodgin Senior IT Architect rhodgin@us.ibm.com

More information

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com Big Data, SAP HANA SUSE Linux Enterprise Server for SAP Applications Kim Aaltonen kim.aaltonen@suse.com 2 Agenda 3 Big Data SAP HANA Optimized Linux for SAP Why SUSE for SAP? Summary 4 5 Big Data What

More information

SUSE Customer Center Roadmap

SUSE Customer Center Roadmap SUSE Customer Center Roadmap Simona Arsene Product Manager Services Artem Chernikov Engineer Cloud & System Management Agenda SCC Today Live Demo of SCC Registration Process New features 2 1 Nov 2012 Alpha

More information

Advanced Systems Management with Machinery

Advanced Systems Management with Machinery Advanced Systems Management with Machinery Andreas Jaeger Thomas Göttlicher Senior Product Manager aj@suse.com Software Engineer tgoettlicher@suse.com Who Are We? Andreas Jaeger Product Manager Thomas

More information

Operating System Security Hardening for SAP HANA

Operating System Security Hardening for SAP HANA Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance peters@suse.com Markus Gürtler Architect & Technical Manager SAP Linux Lab mguertler@suse.com Corporate

More information

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP

More information

OpenStack Deep Dive Alan Clark

OpenStack Deep Dive Alan Clark OpenStack Deep Dive Alan Clark OpenStack, Chairman of the Board Director, SUSE aclark@suse.com Community Size Q2 2014 ECOSYSTEM SIZE (Members + Sponsors + Supporters) 390 Companies Members: 26 Sponsors:

More information

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Using SUSE Linux Enterprise to Focus In on Retail Optical Sales Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting pmullin@suse.com Point of Sale Manager National Vision, Inc. scott.steele@nationalvision.com

More information

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack

More information

Implementing Linux Authentication and Authorisation Using SSSD

Implementing Linux Authentication and Authorisation Using SSSD Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) lawrence.kearney@earthlink.net Mark Robinson

More information

Software Defined Everything

Software Defined Everything Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager pchadwick@suse.com Joachim Werner Senior Product Manager joe@suse.com Data Center History - 1970s One (big)

More information

Faster Time to Market and Technology Innovation Integrated Systems with SUSE. Otto Smits OEM Account Executive EMEA July 9 th 2014

Faster Time to Market and Technology Innovation Integrated Systems with SUSE. Otto Smits OEM Account Executive EMEA July 9 th 2014 Faster Time to Market and Technology Innovation Integrated Systems with SUSE Otto Smits OEM Account Executive EMEA July 9 th 2014 About SUSE SUSE Part of the Attachmate Group Our Commitments Quality Products

More information

We are watching SUSE

We are watching SUSE We are watching SUSE Monitoring at SUSE and in SUSE Linux Enterprise Server 12 Martin Čaj Linux System Administrator Prague Czech Republic mcaj@suse.com Joachim Werner Senior Product Manager Nürnberg Germany

More information

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist simon@suse.com Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions

More information

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris SUSE FUT7537 Software Defined Introduction and Roadmap: Getting your tentacles around data growth Larry Morris Sr. Product Manager lmorris@suse.com AGENDA Enterprise Market SUSE Product SUSE Solutions

More information

Challenges Implementing a Generic Backup-Restore API for Linux

Challenges Implementing a Generic Backup-Restore API for Linux Challenges Implementing a Generic Backup-Restore API for Linux Matthias G. Eckermann Senior Product Manager mge@suse.com Vault, Boston, March 2015 2015-03-12 13:45 UTC Picture: "Escribano" by Jean Le Tavernier

More information

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com>

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com> Relax-and-Recover on SUSE Linux Enterprise 12 Johannes Meixner Topics What is Relax-and-Recover? What means disaster recovery here? How does disaster recovery work? How does Relax-and-Recover

More information

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Andreas Pöschl, BMW Senior Solutions Architect andreas.poeschl@bmw.de Michael Vonderbecke, BMW Solutions Architect michael.vonderbecke@bmwmc.com

More information

Novell Collaboration Vibe OnPrem

Novell Collaboration Vibe OnPrem Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager trsmith@novell.com Collaboration Solutions Collaboration solutions from Novell help enterprise

More information

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Robert Schweikert Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Introduction About me Disclaimers Build vs. Ready made What do I... Now what?

More information

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop

More information

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse.

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse. HO15982 Deploy OpenStack The SUSE OpenStack Cloud Experience Alejandro Bonilla Sales Engineer abonilla@suse.com Michael Echavarria Sales Engineer mechavarria@suse.com Cameron Seader Sales Engineer cs@suse.com

More information

Oracle Products on SUSE Linux Enterprise Server 11

Oracle Products on SUSE Linux Enterprise Server 11 Oracle Products on SUSE Linux Enterprise Server 11 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda Introduction SUSE Products Oracle Products Road Map Question and Answer

More information

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell. File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides Sophia.germanides@novell.com David Condrey dcondrey@novell.comcom Agenda Customer Challenges

More information

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda 2 Introduction SUSE Components Oracle

More information

High Availability Storage

High Availability Storage High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated

More information

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Max Walker Manager, Novell Services max.walker@novell.com 30 May 2008 Agenda SCP at Novell Services Global Documentation

More information

DevOps and SUSE From check-in to deployment

DevOps and SUSE From check-in to deployment DevOps and SUSE From check-in to deployment Rodolfo Bejarano SUSE Systems Engineer rodolfo.bejarano@suse.com Rick Ashford SUSE Systems Engineer rick.ashford@suse.com 2 Agenda 3 Introductions Development

More information

Configuration Management in SUSE Manager 3

Configuration Management in SUSE Manager 3 Configuration Management in SUSE Manager 3 TUT20515 Klaus Kämpf Product Owner, SUSE Manager kkaempf@suse.com Agenda 2 SUSE Manager 3 themes About Configuration Management Choosing the right stack Getting

More information

Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console

Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console Dariusz Puchalak SUSE Certified Instructor Dariusz@Puchalak.net Dariusz Puchalak since november 2014 at OSEC.pl

More information

SUSE Cloud 5 Private Cloud based on OpenStack

SUSE Cloud 5 Private Cloud based on OpenStack SUSE Cloud 5 Private Cloud based on OpenStack Michał Jura Senior Software Engineer Linux HA/Cloud Developer mjura@suse.com 2 New solutions emerge: Infrastructure-as-Service Cloud = 3 SUSE Cloud Why OpenStack?

More information

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com HO5604 Deploying MongoDB A Scalable, Distributed Database with SUSE Cloud Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda SUSE Cloud Overview What is MongoDB? 2 Getting familiar with the Cloud

More information

SUSE Linux uutuudet - kuulumiset SUSECon:sta

SUSE Linux uutuudet - kuulumiset SUSECon:sta SUSE Linux uutuudet - kuulumiset SUSECon:sta Olli Tuominen Technology Specialist olli.tuominen@suse.com 2 SUSECon 13 4 days, 95 Sessions Keynotes, Breakout Sessions,Technology Showcase Case Studies, Technical

More information

Deploying Hadoop with Manager

Deploying Hadoop with Manager Deploying Hadoop with Manager SUSE Big Data Made Easier Peter Linnell / Sales Engineer plinnell@suse.com Alejandro Bonilla / Sales Engineer abonilla@suse.com 2 Hadoop Core Components 3 Typical Hadoop Distribution

More information

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE Enterprise Storage Highly Scalable Software Defined Storage Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Setting the Stage Enterprise Data Capacity Utilization 1-3% 15-20% 20-25% Tier 0 Ultra

More information

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Ralf Bueker DSE Bundesagentur für Arbeit rbueker@suse.com What is a DSE? DSE means

More information

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School Don Vosburg Systems Engineer dvosburg@suse.com don.vosburg@libertyonline.org Who is

More information

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Linux w chmurze publicznej SUSE na platformie Microsoft Azure Linux w chmurze publicznej SUSE na platformie Microsoft Azure Grzegorz Piotrowski Solution Architect C2O C EH, ISO27001-2, ITIL SM, PMI P2, MCT CCEE Virtualization MCSE Private Cloud VCA Cloud Grzegorz.Piotrowski@Alethos.eu

More information

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications Uwe Heinz Product Manager SAP Uwe.Heinz@sap.com Fabian Herschel Senior Architect SAP LinuxLab

More information

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Māris Smilga

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Māris Smilga SUSE Enterprise Storage Highly Scalable Software Defined Storage āris Smilga Storage Today Traditional Storage Arrays of disks with RAID for redundancy SANs based on Fibre Channel connectivity Total System

More information

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Gábor Nyers Systems Engineer @SUSE gnyers@suse.com Agenda 14:00 Kangaroot Update SUSE Update Data Center Interoperability the

More information

SUSE Linux Enterprise 12 Security Certifications

SUSE Linux Enterprise 12 Security Certifications SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security thomas@suse.com 2 Evaluation Validation

More information

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome 1 Novell Use Cases 1.1 Use Case: Per Tenant Identity Provider Configuration 1.1.1 Description/User Story Multi-tenant service providers, whether they are SaaS, PaaS, or IaaS vendors, benefit from quick

More information

kgraft Live patching of the Linux kernel

kgraft Live patching of the Linux kernel kgraft Live patching of the Linux kernel Vojtěch Pavlík Director SUSE Labs vojtech@suse.com Why live patching? Common tiers of change management: 1. Incident response (we're down, actively exploited )

More information

Btrfs and Rollback How It Works and How to Avoid Pitfalls

Btrfs and Rollback How It Works and How to Avoid Pitfalls Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server kukuk@suse.com rm -rf /? I will be discussing what is needed for rollback: Btrfs /

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Wicked Trip into Wicked Network Management

Wicked Trip into Wicked Network Management Wicked Trip into Wicked Network Management Matthias G. Eckermann Senior Product Manager mge@suse.com LinuxCon 2013 NA 2013-09-12 15:40 UTC Some Words of Encouragement There is a theory which states, that

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

Is Identity Governance as exciting as buying car Insurance?

Is Identity Governance as exciting as buying car Insurance? Is Identity Governance as exciting as buying car Insurance? History, myths, facts and lessons learned Andrea Rossi Co-founder & EVP Sales, CrossIdeas Andrea.rossi@crossideas.com +39 335 1435578 European

More information

IPv6 CPE Device Development and Deployment. APNIC 32 Busan, South Korea Aug. 30 th 2011

IPv6 CPE Device Development and Deployment. APNIC 32 Busan, South Korea Aug. 30 th 2011 IPv6 CPE Device Development and Deployment APNIC 32 Busan, South Korea Aug. 30 th 2011 IPv4/IPv6 Transition IPv6 will not take over overnight. Different ISP might have a different strategy in offering

More information

Wicked A Network Manager Olaf Kirch

Wicked A Network Manager Olaf Kirch Wicked A Network Manager Olaf Kirch Director SUSE Linux Enterprise okir@suse.com 2 Agenda Why Wicked!? What we want to achieve What Wicked can do today/tomorrow Architecture Wicked little intro Why Wicked!?

More information

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com Agenda Evaluation

More information

Using btrfs Snapshots for Full System Rollback

Using btrfs Snapshots for Full System Rollback Using btrfs Snapshots for Full System Rollback Matthias G. Eckermann Senior Product Manager mge@suse.com Enterprise End User Summit, New York, June 2014 2014-06-20 15:44 UTC Why this? Minimizing Downtime

More information

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management

More information

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE

More information

Introducing Director 11

Introducing Director 11 Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-

More information

Front-Office Server 2.7

Front-Office Server 2.7 This release connector is deprecated. Use Kofax Capture and the appropriate Kofax Capture release script to release documents to a specific destination. KOFAX Front-Office Server 2.7 Configuration Guide

More information

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension CAS7318 A Geo Redundant Cloud VoIP Service Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension Brett Buckingham Managing Director, silhouette Research and Development Broadview

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

How Intel Cloud SSO Works

How Intel Cloud SSO Works TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

Of Pets and Cattle and Hearts

Of Pets and Cattle and Hearts Of Pets and Cattle and Hearts The SUSE Systems Management Story Joachim Werner Senior Product Manager, SUSE joe@suse.com Who am I? 2 SUSE and Linux Workloads in the Enterprise SUSE Studio Datacenter Private

More information

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Configuring user provisioning for Amazon Web Services (Amazon Specific) Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re

More information

How SUSE Is Helping You Rock The Public Cloud

How SUSE Is Helping You Rock The Public Cloud How SUSE Is Helping You Rock The Public Cloud James Mason Robert Schweikert Technical Architect, Public Cloud jmason@suse.com Public Cloud Architect rjschwei@suse.com Topics 2 A very quick and brief Public

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

Boundary Encryption.cloud Deployment Process Overview

Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)

More information

Mobile App Quick Start

Mobile App Quick Start www.novell.com/documentation Mobile App Quick Start Service Desk Mobile App 1.0 November 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service

An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

PingFederate. Identity Menu Builder. User Guide. Version 1.0

PingFederate. Identity Menu Builder. User Guide. Version 1.0 Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

HOL9449 Access Management: Secure web, mobile and cloud access

HOL9449 Access Management: Secure web, mobile and cloud access HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle

More information

Performance Monitoring in the Linux Kernel Davidlohr Bueso

Performance Monitoring in the Linux Kernel Davidlohr Bueso Performance Monitoring in the Linux Kernel Davidlohr Bueso SUSE Labs Setting Expectations This is not a kernel topic per-se. Most of this can also be applied to userland. Lots to cover, not enough time

More information

Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive

Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive Matthias Steiner, SAP SE @steinermatt May, 2015 Use this title slide only with an image Disclaimer This presentation

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

RSA Authentication Agents Security Best Practices Guide. Version 3

RSA Authentication Agents Security Best Practices Guide. Version 3 RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access

More information

TrustedX - PKI Authentication. Whitepaper

TrustedX - PKI Authentication. Whitepaper TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...

More information

Identity and Access Management for the Cloud

Identity and Access Management for the Cloud Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.

More information

Deliver Desktops as a Service! With VDI 2.0!

Deliver Desktops as a Service! With VDI 2.0! Deliver Desktops as a Service! With VDI 2.0! Me! About the Author! Two smart people I work with! Gartner does not endorse any vendor, product or service depicted in our research publications, and does

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5 This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information