Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden

Size: px
Start display at page:

Download "Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden"

Transcription

1 Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden Pascal Oetiker Security Management Solutions Novell EMEA poetiker@novell.com

2 Privacy- en compliance-druk PCI-DSS NEN 7510 Basel II Sarbanes-Oxley Privacywetgeving NEN 7513 Solvency II 2

3 Balans tussen flexibiliteit en veiligheid Flexibiliteit ICT houdt snel veranderende behoeften bij Lage kosten en moeite Veiligheid Data beschermd Compliancy behaald Controls en Processen beinvloedt beschikbaarheid, integriteit en vertrouwelijkheid van gegevens 3

4 ICT beveiliging en compliance vraagstukken Garanderen dat de juiste personen autorisaties voor gebruik van gevoelige gegevens hebben Het herleiden van wie gebruik maakt van accounts met administrator-privileges Het herleiden van de activiteiten van personen die toegang hebben tot deze accounts 4

5 Logging belangrijke component Herleiden van Wie doet wat? Toegang verschaffen tot gegevens Gebruik van gegevens Welke gegevens? Persoonsgegevens Bedrijfsgegevens Autorisaties? Mag dit? Hoe effectief werkt het ICT beveiligingsbeleid in de praktijk? Monitoring 5

6 Voorbeeld: NEN zorg Een norm voor het vastleggen van gegevens en kenmerken van de acties die feitelijk hebben plaatsgevonden op een patiëntdossier Betreft alle systemen die gegevens bevatten die deel uitmaken van een patiëntdossier Achteraf onweerlegbaar vast te stellen welke gebeurtenissen hebben plaatsgevonden op een patiëntdossier Doel: Een betrouwbaar overzicht te kunnen leveren van de gebeurtenissen waarbij zorggegevens over een persoon zijn verwerkt. 6

7 Voorbeeld: Italiaanse privacywet Regelgeving m.b.t. bedrijfsmatig gebruik van persoonsgegevens Organisaties dienen een compleet overzicht bij te houden van alle interactie met systemen die persoonsgegevens opslaan of verwerken Monitoren van de business user en de beheerders (systemen, databases, etc..) 7 Concreet: rapportage over logins/logouts/failed logins via interne en externe toegang

8 Sony Italia Sony Corporation is one of the world's leading electronics companies Producing a vast array of advanced Consumer and Professional technologies Across computing, audio-visual devices, semiconductors and electronic components. The corporation operates on a global basis, employing approximately 147,000 people in total. Sony Italia, headquartered in Milan, employs approximately 250 people. Source: Paolo Barna, Manager, Operations & Security Systems at Sony Italia 8

9 Challenge The government passed new legislation aimed at regulating the corporate use of personal data Requirements Keep a complete record of all interactions with computer systems that contain data on employees, customers, suppliers and so on. Monitor not only business users who might access such data as part of their job function but also systems administrators and database managers. Show a record of logins and logouts to all relevant systems, as well as a record of failed logins, both from internal and external sources. Source: Paolo Barna, Manager, Operations & Security Systems at Sony Italia 9

10 10 Solution Requirement: low cost of acquisition, simplicity, ease-of-use, and scalability and flexibility of deployment and management Requirement: solution based on existing hardware all we needed to do was install a virtual Linux appliance. Sony Italia worked with its regular Partner H4T to deploy the new solution, which took just one week from start to finish. "We really wanted to have a smooth implementation process that wouldn't distract us from core business issues. H4T took care of everything, and did an excellent job as usual. Sony Italia is using the solution to monitor multiple heterogeneous servers, running a mixture of UNIX, Sun Solaris, SUSE Linux Enterprise Server and Windows Server It also monitors a variety of Cisco routers and switches, pulling all relevant data into a single database for easy reporting. Source: Paolo Barna, Manager, Operations & Security Systems at Sony Italia

11 Results A single tool for monitoring activities to all the different types of servers and routers on its network. The solution enables the company to comply with the new Italian privacy legislation with minimal effort. Sony Italia can rapidly create new custom reports to meet the requirements of any internal or external audits, and can be confident that it is in complete compliance with the new privacy legislation. "We currently use the solution simply to meet our legal requirements, but if we ever need to log other types of activity, there will be no need to upgrade or change the solution. Also, we can easily add new servers into the monitoring regime as we add them to our network." Source: Paolo Barna, Manager, Operations & Security Systems at Sony Italia 11

12 Voorbeeld: GCSX Code of Connection Regelgeving m.b.t. aansluiten op het Engelse e-government netwerk (GCSX) GCSX stands for Government Connect Secure Extranet. It is a secure, private, Wide Area Network (WAN) which enables secure interactions between connected local authorities and other GSi connected organisations. The GCSX Code of Connection (CoCo) is a list of security controls with which ALL local authorities must be compliant before their GCSX circuit can be activated. This applies to local authorities who are taking a direct connection, or who are connecting via an aggregated gateway. 12

13 London Lambeth Council One of London's most densely populated boroughs, with 275,000 people living in an area of just over ten square miles. Provides a wide range of online services to its citizens, and prides itself on being a leader in public sector IT adoption while also maximising value for money. As a result of its highly successful IT strategy, the Society of Information Technology Management has recognised Lambeth as having the lowest IT costs of any London council. Source: Mary Cotterell, Technology Programme Manager at Lambeth Council 13

14 Challenge Lambeth Council needed to be able to respond to a new policy from the UK Department of Work and Pensions (DWP): from 30th September 2009, the exchange of all restricted or sensitive personal data between the DWP and local government organisations would take place via a new secure IT channel, the Government Connect Secure Extranet (GCSX). To use GCSX, all local authorities would have to achieve compliance with a Code of Connection (CoCo) specifying 127 different security controls - including everything from site security and employee training through to IT monitoring and audit requirements. "GCSX CoCo compliance is only relevant for UK local authorities, so there weren't many solutions on the market that were specifically designed to meet its needs," Source: Mary Cotterell, Technology Programme Manager at Lambeth Council 14

15 15 Solution "We decided on a different approach: choosing a more generic solution that was flexible enough to adapt to our immediate needs. This would also have the advantage of giving us a platform for meeting other requirements in future: for example, the Council offers a number of payment card-related services, so we may need to consider PCI-DSS compliance in the near future. Within 30 days, we had designed the solution, installed the software, and rolled it out across the server estate. As a result, Lambeth achieved GCSX CoCo compliance ahead of the deadline, and is now able to communicate seamlessly and securely with key central government systems. The software is now being rolled out to the rest of the infrastructure, and will soon provide a comprehensive log management solution. Source: Mary Cotterell, Technology Programme Manager at Lambeth Council

16 Results From an operational perspective, the log management solution will transform the way Lambeth Council handles IT security issues such as virus infections and tracking file access. The solution gives us a single point of control where all logs are collected and analysed, providing a much more efficient way to handle security-related incidents, "Currently, the potential time-savings are only to be guessed at - but I would be surprised if our next significant malware/hacking event isn't identified, traced and triaged within hours. Source: Mary Cotterell, Technology Programme Manager at Lambeth Council 16

17 17

18

19 Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner

Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner Senior Product Manager, Security Management rwagner@novell.com University of Dayton Recognized by US News and World

More information

Building Images for the Cloud and Data Center with SUSE Studio

Building Images for the Cloud and Data Center with SUSE Studio Building Images for the Cloud and Data Center with SUSE Studio Michal Svec James Tan Senior Product Manager msvec@suse.com Engineering Manager jatan@suse.com Agenda From Software to Service SUSE Studio

More information

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management

Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management sstiehl@novell.com

More information

Operating System Security Hardening for SAP HANA

Operating System Security Hardening for SAP HANA Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance peters@suse.com Markus Gürtler Architect & Technical Manager SAP Linux Lab mguertler@suse.com Corporate

More information

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell. Novell Cloud Security Service Reducing Risk by Securing the Cloud Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.com Disclaimer for Product in Development Unpublished Work of Novell, Inc.

More information

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com

Big Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com Big Data, SAP HANA SUSE Linux Enterprise Server for SAP Applications Kim Aaltonen kim.aaltonen@suse.com 2 Agenda 3 Big Data SAP HANA Optimized Linux for SAP Why SUSE for SAP? Summary 4 5 Big Data What

More information

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad

Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad VP, Platform Evangelism WSO2 chris@wso2.com Section Break Text Here (32pt) Cloudy Goals Improve efficiency and

More information

Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales

Using SUSE Linux Enterprise to Focus In on Retail Optical Sales Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting pmullin@suse.com Point of Sale Manager National Vision, Inc. scott.steele@nationalvision.com

More information

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256

Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Brad DesAulniers Senior Software Engineer bradd@us.ibm.com @cb_brad Ryan Hodgin Senior IT Architect rhodgin@us.ibm.com

More information

Faster Time to Market and Technology Innovation Integrated Systems with SUSE. Otto Smits OEM Account Executive EMEA July 9 th 2014

Faster Time to Market and Technology Innovation Integrated Systems with SUSE. Otto Smits OEM Account Executive EMEA July 9 th 2014 Faster Time to Market and Technology Innovation Integrated Systems with SUSE Otto Smits OEM Account Executive EMEA July 9 th 2014 About SUSE SUSE Part of the Attachmate Group Our Commitments Quality Products

More information

We are watching SUSE

We are watching SUSE We are watching SUSE Monitoring at SUSE and in SUSE Linux Enterprise Server 12 Martin Čaj Linux System Administrator Prague Czech Republic mcaj@suse.com Joachim Werner Senior Product Manager Nürnberg Germany

More information

Advanced Systems Management with Machinery

Advanced Systems Management with Machinery Advanced Systems Management with Machinery Andreas Jaeger Thomas Göttlicher Senior Product Manager aj@suse.com Software Engineer tgoettlicher@suse.com Who Are We? Andreas Jaeger Product Manager Thomas

More information

How To Make A Cloud Work For You

How To Make A Cloud Work For You OpenStack Deep Dive Alan Clark OpenStack, Chairman of the Board Director, SUSE aclark@suse.com Community Size Q2 2014 ECOSYSTEM SIZE (Members + Sponsors + Supporters) 390 Companies Members: 26 Sponsors:

More information

SUSE Customer Center Roadmap

SUSE Customer Center Roadmap SUSE Customer Center Roadmap Simona Arsene Product Manager Services Artem Chernikov Engineer Cloud & System Management Agenda SCC Today Live Demo of SCC Registration Process New features 2 1 Nov 2012 Alpha

More information

Software Defined Everything

Software Defined Everything Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager pchadwick@suse.com Joachim Werner Senior Product Manager joe@suse.com Data Center History - 1970s One (big)

More information

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com>

Relax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com> Relax-and-Recover on SUSE Linux Enterprise 12 Johannes Meixner Topics What is Relax-and-Recover? What means disaster recovery here? How does disaster recovery work? How does Relax-and-Recover

More information

Challenges Implementing a Generic Backup-Restore API for Linux

Challenges Implementing a Generic Backup-Restore API for Linux Challenges Implementing a Generic Backup-Restore API for Linux Matthias G. Eckermann Senior Product Manager mge@suse.com Vault, Boston, March 2015 2015-03-12 13:45 UTC Picture: "Escribano" by Jean Le Tavernier

More information

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris

SUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris SUSE FUT7537 Software Defined Introduction and Roadmap: Getting your tentacles around data growth Larry Morris Sr. Product Manager lmorris@suse.com AGENDA Enterprise Market SUSE Product SUSE Solutions

More information

SUSE Linux uutuudet - kuulumiset SUSECon:sta

SUSE Linux uutuudet - kuulumiset SUSECon:sta SUSE Linux uutuudet - kuulumiset SUSECon:sta Olli Tuominen Technology Specialist olli.tuominen@suse.com 2 SUSECon 13 4 days, 95 Sessions Keynotes, Breakout Sessions,Technology Showcase Case Studies, Technical

More information

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE Enterprise Storage Highly Scalable Software Defined Storage Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Setting the Stage Enterprise Data Capacity Utilization 1-3% 15-20% 20-25% Tier 0 Ultra

More information

Oracle Products on SUSE Linux Enterprise Server 11

Oracle Products on SUSE Linux Enterprise Server 11 Oracle Products on SUSE Linux Enterprise Server 11 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda Introduction SUSE Products Oracle Products Road Map Question and Answer

More information

DevOps and SUSE From check-in to deployment

DevOps and SUSE From check-in to deployment DevOps and SUSE From check-in to deployment Rodolfo Bejarano SUSE Systems Engineer rodolfo.bejarano@suse.com Rick Ashford SUSE Systems Engineer rick.ashford@suse.com 2 Agenda 3 Introductions Development

More information

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW

Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Andreas Pöschl, BMW Senior Solutions Architect andreas.poeschl@bmw.de Michael Vonderbecke, BMW Solutions Architect michael.vonderbecke@bmwmc.com

More information

Implementing Linux Authentication and Authorisation Using SSSD

Implementing Linux Authentication and Authorisation Using SSSD Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) lawrence.kearney@earthlink.net Mark Robinson

More information

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com

SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack

More information

Configuration Management in SUSE Manager 3

Configuration Management in SUSE Manager 3 Configuration Management in SUSE Manager 3 TUT20515 Klaus Kämpf Product Owner, SUSE Manager kkaempf@suse.com Agenda 2 SUSE Manager 3 themes About Configuration Management Choosing the right stack Getting

More information

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com

Public Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Robert Schweikert Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Introduction About me Disclaimers Build vs. Ready made What do I... Now what?

More information

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open

How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist simon@suse.com Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions

More information

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.

File Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell. File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides Sophia.germanides@novell.com David Condrey dcondrey@novell.comcom Agenda Customer Challenges

More information

Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console

Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console Dariusz Puchalak SUSE Certified Instructor Dariusz@Puchalak.net Dariusz Puchalak since november 2014 at OSEC.pl

More information

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project

Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Ralf Bueker DSE Bundesagentur für Arbeit rbueker@suse.com What is a DSE? DSE means

More information

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Māris Smilga

SUSE Enterprise Storage Highly Scalable Software Defined Storage. Māris Smilga SUSE Enterprise Storage Highly Scalable Software Defined Storage āris Smilga Storage Today Traditional Storage Arrays of disks with RAID for redundancy SANs based on Fibre Channel connectivity Total System

More information

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP

Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP

More information

High Availability Storage

High Availability Storage High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated

More information

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse.

HO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse. HO15982 Deploy OpenStack The SUSE OpenStack Cloud Experience Alejandro Bonilla Sales Engineer abonilla@suse.com Michael Echavarria Sales Engineer mechavarria@suse.com Cameron Seader Sales Engineer cs@suse.com

More information

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com

HO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com HO5604 Deploying MongoDB A Scalable, Distributed Database with SUSE Cloud Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda SUSE Cloud Overview What is MongoDB? 2 Getting familiar with the Cloud

More information

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla

TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop

More information

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction

Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda 2 Introduction SUSE Components Oracle

More information

kgraft Live patching of the Linux kernel

kgraft Live patching of the Linux kernel kgraft Live patching of the Linux kernel Vojtěch Pavlík Director SUSE Labs vojtech@suse.com Why live patching? Common tiers of change management: 1. Incident response (we're down, actively exploited )

More information

Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0

Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0 coursemonstercom/uk Citrix Access Gateway: Implementing Enterprise Edition Feature 90 View training dates» Overview Nederlands Deze cursus behandelt informatie die beheerders en andere IT-professionals

More information

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services

Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Max Walker Manager, Novell Services max.walker@novell.com 30 May 2008 Agenda SCP at Novell Services Global Documentation

More information

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School

CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School Don Vosburg Systems Engineer dvosburg@suse.com don.vosburg@libertyonline.org Who is

More information

SUSE Linux Enterprise 12 Security Certifications

SUSE Linux Enterprise 12 Security Certifications SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security thomas@suse.com 2 Evaluation Validation

More information

Wicked A Network Manager Olaf Kirch

Wicked A Network Manager Olaf Kirch Wicked A Network Manager Olaf Kirch Director SUSE Linux Enterprise okir@suse.com 2 Agenda Why Wicked!? What we want to achieve What Wicked can do today/tomorrow Architecture Wicked little intro Why Wicked!?

More information

Is Identity Governance as exciting as buying car Insurance?

Is Identity Governance as exciting as buying car Insurance? Is Identity Governance as exciting as buying car Insurance? History, myths, facts and lessons learned Andrea Rossi Co-founder & EVP Sales, CrossIdeas Andrea.rossi@crossideas.com +39 335 1435578 European

More information

Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters

Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters Storage in Microsoft Azure Wat moet ik daarmee? Bert Wolters @bertwolters Welk deel van het platform hebben we nu behandeld? Agenda Recap: Storage Account Nieuw! Premium Storage Nieuw! Native backup voor

More information

Linux w chmurze publicznej SUSE na platformie Microsoft Azure

Linux w chmurze publicznej SUSE na platformie Microsoft Azure Linux w chmurze publicznej SUSE na platformie Microsoft Azure Grzegorz Piotrowski Solution Architect C2O C EH, ISO27001-2, ITIL SM, PMI P2, MCT CCEE Virtualization MCSE Private Cloud VCA Cloud Grzegorz.Piotrowski@Alethos.eu

More information

Using btrfs Snapshots for Full System Rollback

Using btrfs Snapshots for Full System Rollback Using btrfs Snapshots for Full System Rollback Matthias G. Eckermann Senior Product Manager mge@suse.com Enterprise End User Summit, New York, June 2014 2014-06-20 15:44 UTC Why this? Minimizing Downtime

More information

Information Security Governance

Information Security Governance Information Security Governance Aart Bitter Aart.Bitter@information-security-governance.com Agenda Governance & Compliance Information Security Governance Aanpak om information security governance in organisaties

More information

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension

Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension CAS7318 A Geo Redundant Cloud VoIP Service Based on Geo Clustering for SUSE Linux Enterprise Server High Availability Extension Brett Buckingham Managing Director, silhouette Research and Development Broadview

More information

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com Agenda Evaluation

More information

SUSE Cloud 5 Private Cloud based on OpenStack

SUSE Cloud 5 Private Cloud based on OpenStack SUSE Cloud 5 Private Cloud based on OpenStack Michał Jura Senior Software Engineer Linux HA/Cloud Developer mjura@suse.com 2 New solutions emerge: Infrastructure-as-Service Cloud = 3 SUSE Cloud Why OpenStack?

More information

Btrfs and Rollback How It Works and How to Avoid Pitfalls

Btrfs and Rollback How It Works and How to Avoid Pitfalls Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server kukuk@suse.com rm -rf /? I will be discussing what is needed for rollback: Btrfs /

More information

Assuring the Cloud. Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182

Assuring the Cloud. Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182 Assuring the Cloud Hans Bootsma Deloitte Risk Services hbootsma@deloitte.nl +31 (0)6 1098 0182 Need for Assurance in Cloud Computing Demand Fast go to market Support innovation Lower costs Access everywhere

More information

Novell Collaboration Vibe OnPrem

Novell Collaboration Vibe OnPrem Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager trsmith@novell.com Collaboration Solutions Collaboration solutions from Novell help enterprise

More information

CLOUD COMPUTING LESSONS LEARNED. Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015

CLOUD COMPUTING LESSONS LEARNED. Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015 CLOUD COMPUTING LESSONS LEARNED Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015 WHEN WAS THE TERM USED FOR THE FIRST TIME? 26 th of October 1997 WHO HYPED ALL THIS? What's

More information

What can Office 365 do for your organization? Cor Kroon

What can Office 365 do for your organization? Cor Kroon What can Office 365 do for your organization? Cor Kroon Ciber Knowledge Carrousel 2013 What can Office 365 do for your Organization? Cor Kroon Business Analyst / Senior Microsoft Professional cor.kroon@ciber.nl

More information

Deploying Hadoop with Manager

Deploying Hadoop with Manager Deploying Hadoop with Manager SUSE Big Data Made Easier Peter Linnell / Sales Engineer plinnell@suse.com Alejandro Bonilla / Sales Engineer abonilla@suse.com 2 Hadoop Core Components 3 Typical Hadoop Distribution

More information

Met je hoofd in de wolken. Ard-Jan Glas

Met je hoofd in de wolken. Ard-Jan Glas Met je hoofd in de wolken Ard-Jan Glas Trend Hogere availability 24 uur per dag global customers Van mainframe naar distributed Omzet verlies door downtime Klanten stellen hogere eisen De volgende IT

More information

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows

Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Gábor Nyers Systems Engineer @SUSE gnyers@suse.com Agenda 14:00 Kangaroot Update SUSE Update Data Center Interoperability the

More information

Wicked Trip into Wicked Network Management

Wicked Trip into Wicked Network Management Wicked Trip into Wicked Network Management Matthias G. Eckermann Senior Product Manager mge@suse.com LinuxCon 2013 NA 2013-09-12 15:40 UTC Some Words of Encouragement There is a theory which states, that

More information

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de

Open Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)

More information

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server

Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE

More information

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications

High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications Uwe Heinz Product Manager SAP Uwe.Heinz@sap.com Fabian Herschel Senior Architect SAP LinuxLab

More information

Uw partner in system management oplossingen

Uw partner in system management oplossingen Uw partner in system management oplossingen User Centric IT Bring your Own - Corporate Owned Onderzoek Forrester Welke applicatie gebruik je het meest op mobiele devices? Email 76% SMS 67% IM / Chat 48%

More information

Data Driven Strategy. BlinkLane Consul.ng Amsterdam, 10 december 2013. Ralph Hofman Arent van t Spijker

Data Driven Strategy. BlinkLane Consul.ng Amsterdam, 10 december 2013. Ralph Hofman Arent van t Spijker Data Driven Strategy BlinkLane Consul.ng Amsterdam, 10 december 2013 Ralph Hofman Arent van t Spijker 1 Data Driven Strategy 08.00 08.05 Welkom 08:05 08.20 Data Driven Strategy 08.20 08.30 Het Business

More information

OGH: : 11g in de praktijk

OGH: : 11g in de praktijk OGH: : 11g in de praktijk Real Application Testing SPREKER : E-MAIL : PATRICK MUNNE PMUNNE@TRANSFER-SOLUTIONS.COM DATUM : 14-09-2010 WWW.TRANSFER-SOLUTIONS.COM Real Application Testing Uitleg Real Application

More information

Advanced Metering Infrastructure

Advanced Metering Infrastructure Advanced Metering Infrastructure Research Project 2 Vic Ding SNE, UvA February 8th 2012 Agenda Background Research motivation and questions Research methods Research findings Stakeholders Legislation Smart

More information

IPv6 CPE Device Development and Deployment. APNIC 32 Busan, South Korea Aug. 30 th 2011

IPv6 CPE Device Development and Deployment. APNIC 32 Busan, South Korea Aug. 30 th 2011 IPv6 CPE Device Development and Deployment APNIC 32 Busan, South Korea Aug. 30 th 2011 IPv4/IPv6 Transition IPv6 will not take over overnight. Different ISP might have a different strategy in offering

More information

Hoe kies je de juiste Microsoft Hosted Exchange Service Provider?

Hoe kies je de juiste Microsoft Hosted Exchange Service Provider? White Paper Cloud diensten zijn populairder dan ooit. Veel bedrijven zien nu dan ook de voordelen van het uitbesteden van bepaalde ICT onderdelen. Voordelen als: Beschikbaarheid van data, Snelle Implementatietijd

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

Spambrella SaaS Support Terms & Conditions

Spambrella SaaS Support Terms & Conditions April 29, 2014 Spambrella SaaS Support Terms & Conditions Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or its affiliates

More information

Performance Monitoring in the Linux Kernel Davidlohr Bueso

Performance Monitoring in the Linux Kernel Davidlohr Bueso Performance Monitoring in the Linux Kernel Davidlohr Bueso SUSE Labs Setting Expectations This is not a kernel topic per-se. Most of this can also be applied to userland. Lots to cover, not enough time

More information

Platform voor Informatiebeveiliging IB Governance en management dashboards

Platform voor Informatiebeveiliging IB Governance en management dashboards Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor

More information

Het Secure Datacenter

Het Secure Datacenter Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

Network Assessment Client Risk Report Demo

Network Assessment Client Risk Report Demo Network Assessment Client Risk Report Demo Prepared by: Henry Knoop Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke

More information

How SUSE Is Helping You Rock The Public Cloud

How SUSE Is Helping You Rock The Public Cloud How SUSE Is Helping You Rock The Public Cloud James Mason Robert Schweikert Technical Architect, Public Cloud jmason@suse.com Public Cloud Architect rjschwei@suse.com Topics 2 A very quick and brief Public

More information

Secure Web Gateway 11.7 Upgrade Release Notes

Secure Web Gateway 11.7 Upgrade Release Notes Secure Web Gateway 11.7 Upgrade Release Notes August 2015 Trustwave is pleased to announce that the upgrade path for Secure Web Gateway to version 11.7 is now available. For more information on SWG 11.7,

More information

Symantec Critical System Protection Configuration Monitoring Edition Release Notes

Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes Symantec Critical System Protection Configuration Monitoring Edition Release Notes The software described in this book

More information

IT-waardeketen management op basis van eeuwenoude supply chain kennis

IT-waardeketen management op basis van eeuwenoude supply chain kennis IT-waardeketen management op basis van eeuwenoude supply chain kennis Hans van Aken / November 28, 2012 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Ons privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16

Ons privacybier. Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 21/01/16 21/01/16 Derde privacycafé Data Protection Institute 13 januari 2016 Thomas More Mechelen 1 Privacycafé copyright 2016 Data Protec7on Ins7tute BVBA Ons privacybier 2 Privacycafé copyright 2016 Data Protec7on

More information

UvA college Governance and Portfolio Management

UvA college Governance and Portfolio Management UvA college Han Verniers Principal Consultant Han.Verniers@LogicaCMG.com Programma Governance IT Governance, wat is dat? Governance: structuren, processen, instrumenten Portfolio Management Portfolio Management,

More information

Informatiebeveiliging volgens ISO/IEC 27001:2013

Informatiebeveiliging volgens ISO/IEC 27001:2013 Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie

More information

HTTP Client Installation Guide Version 9

HTTP Client Installation Guide Version 9 HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but

More information

QRadar SIEM 6.3 Datasheet

QRadar SIEM 6.3 Datasheet QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar

More information

Introducing Director 11

Introducing Director 11 Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-

More information

Boundary Encryption.cloud Deployment Process Overview

Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Boundary Encryption.cloud Deployment Process Overview Documentation version: 1.0 Legal Notice Legal Notice Copyright 2011 Symantec Corporation. All

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Risk-Based Monitoring

Risk-Based Monitoring Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1 wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan?

More information

Corporate Affairs Overview and Scrutiny Committee

Corporate Affairs Overview and Scrutiny Committee Agenda item: 4 Committee: Corporate Affairs Overview and Scrutiny Committee Date of meeting: 29 January 2009 Subject: Lead Officer: Portfolio Holder: Link to Council Priorities: Exempt information: Delegated

More information

what can we do with botnet data?

what can we do with botnet data? what can we do with botnet data? prof.dr. Ronald Leenes r.e.leenes@uvt.nl TILT - Tilburg Institute for Law, Technology, and Society background SURFnet (Dutch NREN) was offered 700 GB of data obtained from

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Customers and Shareholders Benefit as Global Manufacturer Deploys Management Solution

Customers and Shareholders Benefit as Global Manufacturer Deploys Management Solution Microsoft Dynamics Customer Case Study Customers and Shareholders Benefit as Global Manufacturer Deploys Management Overview Country: United Kingdom Industry: Manufacturing Customer Profile Sevcon is at

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

ISACA Roundtable. Cobit and Grab@Pizza 7 september 2015

ISACA Roundtable. Cobit and Grab@Pizza 7 september 2015 1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association

More information

Practical implementation of ISO 27001 / 27002

Practical implementation of ISO 27001 / 27002 Practical implementation of ISO 27001 / 27002 Lecture #2 Security in Organizations 2011 Eric Verheul 1 Main literature for this lecture: 1. ISO 27001 and ISO 27002 Literature 2. How to Achieve 27001 Certification,

More information

KVM, OpenStack and the Open Cloud SUSECon November 2015

KVM, OpenStack and the Open Cloud SUSECon November 2015 KVM, OpenStack and the Open Cloud SUSECon November 2015 Adam Jollans Program Director, Linux & Open Virtualization Strategy IBM Agenda A Brief History of Virtualization KVM Architecture OpenStack Architecture

More information

Oversight Management: een zinvolle aanvulling!

Oversight Management: een zinvolle aanvulling! Oversight Management: een zinvolle aanvulling! Houfhoff Pension Fund Academy Christiaan Tromp info@fiduciaryservices.eu April 2012 1 Agenda The Fiduciary Management promise The evolution of Pension Fund

More information

How to manage Business Apps - Case for a Mobile Access Strategy -

How to manage Business Apps - Case for a Mobile Access Strategy - How to manage Business Apps - Case for a Mobile Access Strategy - Hans Heising, Product Manager Gábor Vida, Manager Software Development RAM Mobile Data 2011 Content Introduction 2 Bring your own device

More information