A server certificate service
|
|
- Ginger Hester Haynes
- 7 years ago
- Views:
Transcription
1 A server certificate service Towards large-scale use of affordable popup-free server certificates for the European Research & Educational community Amsterdam, 16 Februari 2005 Jan Meijer
2 A What? A service (NOT a PKI, NOT a CA) to provide popup free x.509 server certificates for a flat rate for the NREN (and the site?) to the servers' admins with as little hassle as possible 2
3 European NREN PKI history There for ~6 years Uptake not that large (unfortunately) Usually PCA with CAs at each site 3
4 Current real certificate usage On a larger scale: Grids (closed community) Webservers (popup-free and popup) 4
5 Current certificate usage On a (much) smaller scale VPNs s/mime Middleware AAI services 5
6 Anticipated increase in use AAI middleware services A-select, Feida, Papi, Shib, radius Eduroam Webservers Webbased/accessed e-learning apps Webmail Webservices 6
7 Why server certificates? To enable ubiquitous encrypted SSL/TLS channels towards the end user without harassing that that end user with the nitty gritty details: PKI as an enabler for these ubiquitous encrypted channels Because these are what sites are willing to implement, at this point in time Solve half the problem space today and create goodwill for solving the other tomorrow 7
8 Vision thing To make it normal to use a server certificate, as normal and easy as it is to setup a webserver Read: to make it lame to not use encrypted channels where you should To make it normal to use this security tool it needs to be easy and readily available 8
9 Problem one: The dreaded popup 9
10 Problem2: cost Large scale use of server certificates quickly runs into large sums Cheapest server-cert currently EUR 40 without special certificate attributes 10
11 Possible ways to get where we want Ubiquitous popup-free encrypted (and/or authenticated) channels against reasonable cost NREN PKI (popup problem bad, cost good) Own CA (popup problem bad, cost good) Commercial CA provider (popup problem good, cost bad) 11
12 NREN PKI Cost good (is it?) Popup problem bad Fix by getting root certificate in root repositories Requires webtrust audit Expensive for an individual NREN PKI (~ first time, annual ~ for the audits, plus all the costs to do things exactly according to guidelines) --> CA hierarchy adds to cost! Is running our own CA that interesting? Own CA for smaller communities: same problem 12
13 Solution: Commercial CA provider Outsourcing the 'get in root repository problem' Outsourcing the 'stay webtrust audited problem' Outsourcing the keeping the CA private key private problem Outsourcing running the CA Cost! 13
14 Enter the server certificate service Consortium of consolidators (NRENs) Don't do your own CA, focus on the RA and make it easy on your community Buy the server certificate service from a commercial provider ('corporate SSL') The consolidator 'issues certificates' The NREN takes care of its local RA subdelegation Combine buying power to get a good rate: as flat-rate a fee as we can get One technological platform branded multiple times (SURFnet cert service, Switch cert service) 14
15 Server certificate service How to get flexibility in certificate profiles LCS, VPN, 802.1x Build the flexibility in the contract but let it evolve in practice First use the already available commercial services and infra, improve in partnership Maybe...we'll get a good deal :) 15
16 Technical Architecture 16
17 Financial model Fixed annual fee per participating NREN One-time fee for joining the service is acceptable setting up things, training people etc. Start with equal shares, differentiate when the need arises, or not -> How NREN recovers cost is up to the NREN We would probably make it a one-time joining fee for admin overhead and no per certificate fee 17
18 Organization of consortium Under the TERENA umbrella In the consortium for 20K each: ACOnet CARnet CRU CESnet DFN RedIRIS SURFnet Switch 18
19 Timelines Februari/March: finalize consortium Februari/March: start procurement process June/July: award contract August: start service So where are we now? 19
SCS: the new Server Certificate Service offering from SWITCH/TERENA
SCS: the new Server Certificate Service offering from SWITCH/TERENA Kaspar Brand SWITCH 2006 SWITCH A very brief SCS project history Discussions with other European NRENs started in 2004, within TERENA
More informationLicia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
More informationPublic Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
More informationOverview of DFN`s Certificate Services - Regular, Grid and short-lived -
Overview of DFN`s Certificate Services - Regular, Grid and short-lived - Marcus Pattloch (DFN-Verein) DESY Computing Seminar 13. July 2009, Hamburg Overview Certificates what are they good for (and what
More informationForth TF- Mobility meeting. Minutes
Forth TF- Mobility meeting Date: 30th January 2004 Venue: TERENA, Amsterdam Minutes Attendees Hansruedi Born (HB) Tim Chown (TC) (streaming) Licia Florio (LC) Carles Fragoso (CF) Jan Furman (JF) Luis Guido
More informationPilot Projects Coordination Workshop Date: 18. February 2003 Time: 09:30 12:30 Place: University of Bern, Gesellschaftsstrasse 6
Pilot Projects Coordination Workshop Date: 18. February 2003 Time: 09:30 12:30 Place: University of Bern, Gesellschaftsstrasse 6 2003 SWITCH Agenda Agenda 09:30-09:45 Introduction Christoph Graf 09:45
More informationSchlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector
Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components
More informationCloud Computing. What we should be auditing
Cloud Computing What we should be auditing What is cloud computing? Model Description What it does Examples SAAS Software as a service Applications often available through a browser Workday, Salesforce.com
More informationA Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de
More informationGÉANT IaaS suppliers meeting Towards Pan-European Cloud Services. Utrecht October 14 2015
GÉANT IaaS suppliers meeting Towards Pan-European Cloud Services Utrecht October 14 2015 Why and what TODAY More information about IaaS delivery through GÉANT Tender Provider GÉANT interaction Opportunity
More informationSecuring Service Access with Digital Certificates
Securing Service Access with Digital Certificates Jovana Palibrk, AMRES NA3 T2, Tbilisi, December 2013. Agenda Theory Cryptographic Protocols and Techniques Public Key Infrastructure TERENA Certificate
More informationProtect Identities for people, workstations, mobiles, networks
ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of
More informationDeploying and Managing a Public Key Infrastructure
Deploying and Managing a Public Key Infrastructure 2821: Deploying and Managing a Public Key Infrastructure (4 Days) About this Course This four-day, instructor-led course provides students with the knowledge
More informationTF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================
More informationGÉANT edupki in 6 Slides Servicing GÉANT Services
GÉANT edupki in 6 Slides Servicing GÉANT Services Reimer Karlsen-Masur, DFN-CERT Services GmbH Slides & Related Materials @ https://www.edupki.org GN3plus Symposium 24 25 February 2015 Athens Outline The
More informationFive Steps Towards Effective Fraud Management
Five Steps Towards Effective Fraud Management Merchants doing business in a card-not-present environment are exposed to significantly higher fraud risk, costly chargebacks and the challenge of securing
More informationCertificates in a Nutshell. Jens Jensen, STFC Leader of EUDAT AAI TF
Certificates in a Nutshell Jens Jensen, STFC Leader of EUDAT AAI TF In a nutshell... Mature, Robust, Ubiquitous Have been around for decades Interoperable supported by every OS, every language Used everywhere
More informationWhy a single source for assets should be. the backbone of all your digital activities
Why a single source for assets should be the backbone of all your digital activities Navigating in the digital landscape The old era of traditional marketing has long passed. Today, customers expect to
More informationQlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
More informationComodo Certificate Manager. Comodo Enterprise
Comodo Certificate Manager Comodo Enterprise Challenges Enterprises lose track of the SSL certificates on their websites Expired SSL certificates go unnoticed, which leads to customers seeing browser error
More informationCLOUD POWER. NREN collaboration in GÉANT @ STF
CLOUD POWER NREN collaboration in GÉANT to enable and facilitate the Research and Education community to use online services on a large scale, with the right conditions @ STF MARCH 24 Andres Steijaert
More informationSSL Overview for Resellers
Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an
More informationInternet2 middleware initiative: past, present and future
Internet2 middleware initiative: past, present and future Heather Boyles, Internet2 heather@internet2.edu APAN Meeting 22 January 2006 Akihabara, Tokyo, Japan Credit: thanks to Ken Klingenstein and the
More informationThai Digital ID Co.,Ltd.
Thai Digital ID Co.,Ltd. Building Trusted National Root CA - Thailand s Experience ISO27001 Enabling Trust and Security for Reliability of your Business TDID & CA Service Standard PKI Environment CA Hosting
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationThe Evolution of Traditional Telecoms to IP Communications
Telecoms Enterprise Day 2014 The Evolution of Traditional Telecoms to IP Communications Presented by Andy Openshaw 28 March 2014 Hot topics The shift from TDM to IP communication platforms The growth in
More informationРазработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
More informationOAuth2lib Based Groups Management Tool for Authorization and Services Aggregation
Thursday 16th June 2011 Poster Session OAuth2lib Based Groups Management Tool for Authorization and Services Aggregation 1. INTRODUCTION Over recent years we have witnessed the emergence and consolidation
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationOvercoming the PKI hierarchy problem. PMAs and TACAR. Diego R. Lopez RedIRIS
Overcoming the PKI hierarchy problem. Diego R. Lopez RedIRIS PKIs and their growth problems The original X509 concept implicitly asumed a common global root for certificates At least, so it was perceived
More informationWhite paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Management Challenges of Software
More informationFrequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
More informationSafe payments on the Net. Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.
Safe payments on the Net Chris Mitchell Information Security Group Royal Holloway, University of London http://www.isg.rhul.ac.uk/~cjm Internet e-commerce Focus of this talk is security issues for e-commerce
More informationReady for cloud service delivery?
Ready for cloud service delivery? Status and next steps TF-MSP Berlin, 11 January GN4-1, SA7 Andres Steijaert NREN collaboration on service delivery Agenda & topics Which services are - available - incoming
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationCONTINUOUS DEPLOYMENT EBOOK SERIES: Chapter 1. Why Continuous Deployment Is Critical to Your Digital Transformation Strategy
CONTINUOUS DEPLOYMENT EBOOK SERIES: Chapter 1 Why Continuous Deployment Is Critical to Your Digital Transformation Strategy In the Application Economy, the User Is King In today s application economy,
More informationState of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope
State of Alaska Enterprise Messaging and Directory Services Strategy Vision and Scope State of Alaska Document ID: Title: Supersedes: Status: 1010 Enterprise Messaging and Directory Services Strategy Vision
More informationSecure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
More informationSophos Certified Architect Course overview
Sophos Certified Architect Course overview UTM This course provides an in-depth study of UTM, designed for experienced technical professionals who will be planning, installing, configuring and supporting
More informationSMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
More informationL@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
More informationTOP 10. Strategies for Modernizing Workforce Optimization. ebook
TOP 10 Strategies for Modernizing Workforce Optimization ebook CONTACT CENTER OPERATIONAL CHALLENGES All over the world, contact center managers and operations teams face a number of challenges that can
More informationSWITCHpki long lived grid user certificates
SWITCHpki long lived grid user certificates PKI meeting in Bern Bern, 15 June 2010 Alessandro Usai alessandro.usai@switch.ch Trust Link Interface! Long lived grid user certificates are now handled by the
More informationAn LDAP/X.500 based distributed PGP Keyserver
An LDAP/X.500 based distributed PGP Keyserver First PGP Keyserver Manager Symposium 22.-23. May 2000, Utrecht Peter Gietz Peter.gietz@directory.dfn.de Agenda PKI and Directory X.500 LDAP PGP Keyserver
More informationExpert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
More informationCentralize it Secure it Simplify IT!
Centralize it Secure it Simplify IT! Dedicated to helping network administrators and IT executives securely manage remote connections, network accesses, passwords and credentials. Remote Desktop Manager
More informationMobility Task Force. Deliverable F. Inventory of web-based solution for inter-nren roaming
Mobility Task Force Deliverable F Inventory of web-based solution for inter-nren roaming Version 1.1 Authors: Sami Keski-Kasari , Harri Huhtanen Contributions: James
More informationCampus Best Practices What s that?
Campus Best Practices What s that? Vidar Faltinsen GÉANT3 Task Leader CTO UNINETT Wireless workshop, Stockholm March 13 2013 The GÉANT projects GN3: 2009-2013 GN3+: 2013-2015! Enable research communities
More informationSimplify SSL Certificate Management Across the Enterprise
Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Introduction The need for SSL certificates has moved well beyond the Buy page to core
More informationLecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
More informationWhite Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
More informationBlue Cross Blue Shield of Michigan
EDI Real Time SOAP/HTTPS Services: Trading Partner Guide (ANSI 270/271, ANSI 276/277,. Revision History Date Version Description Author 07/20/2012 1.0 Initial doc BCBSM 02/22/2013 1.1 Added SSL Client
More informationLesson Plans Administering Security in a Server 2003 Network
Lesson Plans Administering Security in a Server 2003 Network (Exam 70-299) Version 2.0 Table of Contents Table of Contents... 1 Course Overview... 2 Section 1.1: Course Introduction... 4 Section 1.2: Active
More informationEnterprise SSL FEATURES & BENEFITS
Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal
More informationPaperCut Payment Gateway Module - Heartland Quick Start Guide
PaperCut Payment Gateway Module - Heartland Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up and testing the
More informationSA3: Support for Multi-Domain Services Plenary
SA3: Support for Multi-Domain Services Plenary Toby Rodwell, DANTE 3 rd GÉANT2 Technical Workshop Cambridge, 9 January 2007 Overview SA3 Reminder Achievements Current Work Tech Workshop sessions What SA3
More informationA presentation on. CCIS Northeastern University
A presentation on Guided by Riccardo Pucella Assistant Prof. University Presented by Harsha Suleballe Jagadish Introduction The Certificate Components of a PKI PKI examples Ten risks of the PKI Sep 2009-Dec
More informationGlobalSign Integration Guide
GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and AirWatch Enterprise MDM 1 v.1.1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3 Partner
More informationIdentity and Access Management for Federated Resource Sharing: Shibboleth Stories
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton (hazelton@doit.wisc.edu) Sr. IT Architect,
More informationRicoh Consulting. IT Service. Affordable, smart solutions from Ricoh Consulting. Contact RicohITServices@ricoh.co.nz
Ricoh Consulting IT Service Affordable, smart solutions from Ricoh Consulting Contact RicohITServices@ricoh.co.nz Finally. An IT Service that s guaranteed to stay in budget Are you tired of grappling with
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationSecureGRC TM - Cloud based SaaS
- Cloud based SaaS Single repository for regulations and standards Centralized repository for compliance related organizational data Electronic workflow to speed up communications between various entries
More informationOverview. Comodo Certificate Manager
Overview Comodo Certificate Manager SSL CERTIFICATE MANAGEMENT Streamlined Tracking and Management of Enterprise Certificate Lifecycles, Security and Compliance Loss of control over SSL certificate inventory
More informationDeliverable DS5.1.1: eduroam Service Definition and Implementation Plan
07.01.08 Deliverable DS5.1.1: eduroam Service Definition and Implementation Plan Deliverable DS5.1.1 Contractual Date: 31/10/07 Actual Date: 07/01/08 Contract Number: 511082 Instrument type: Integrated
More informationSecurity in Grid Computing
Security in Grid Computing Tak-Lon Wu B534 project 3 Computer Science Dept. Indiana University Bloomington, IN 47405 taklwu@indiana.edu 1. Introduction Abstract Over last 10 years, security one of the
More informationBuilding Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
More informationPKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240
PKI Uncovered Andre Karamanian Srinivas Tenneti Francois Dessart Cisco Press 800 East 96th Street Indianapolis, IN 46240 Contents Introduction XIII Part I Core Concepts Chapter 1 Crypto Refresh 1 Confidentiality,
More informationPKI: Public Key Infrastructure
PKI: Public Key Infrastructure What is it, and why should I care? Conference on Higher Education Computing in Kansas June 3, 2004 Wes Hubert Information Services The University of Kansas Why? PKI adoption
More informationIntranet Buyers Workbook
Intranet Buyers Workbook A clear path to a new intranet Trying to select a new intranet? This easy guide leads you through the 10 key steps in a straightforward but thorough evaluation and purchase process.
More informationHow Managed Services Has Changed Remote Infrastructure Management. Presented by: Bill Whitney March 26, 2008
How Managed Services Has Changed Remote Infrastructure Management Presented by: Bill Whitney March 26, 2008 Why are businesses looking to partners such as Managed Service Providers (MSPs) for remote infrastructure
More informationEVALUATION AND MEASUREMENT IN MARKETING: TRENDS AND CHALLENGES
EVALUATION AND MEASUREMENT IN MARKETING: TRENDS AND CHALLENGES Georgine Fogel, Salem International University INTRODUCTION Measurement, evaluation, and effectiveness have become increasingly important
More informationWhy SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationBusiness ByDesign. The SAP Business ByDesign solution helps you optimize project management
SAP Functions in Detail SAP Solutions for Small Businesses and Midsize Companies Efficient Project Management Drive Project Success with SAP Business ByDesign The SAP Business ByDesign solution helps you
More informationCloud Managed Printing
Cloud Managed Printing Driverless Printing ezeep for desktop is a virtual print driver for Mac and Windows. It enables users to print to any printer right from their desktop applications without the need
More informationEntrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
More informationThe InCommon Certificate Service FAQ This document subject to change as elements of the program are refined.
The InCommon Certificate Service FAQ InCommon is an LLC of Internet2 October 13, 2010 This document subject to change as elements of the program are refined. 1. What is the InCommon Certificate Program?
More informationPortfolio & Relationship Management in the Cloud
Portfolio & Relationship Management in the Cloud Software without the technology headaches White Paper by David Wilson, Director, International Sales & Marketing 23 rd May 2013 Index Can you have your
More informationState of Wisconsin Division of Enterprise Technology (DET) SharePoint 2010 Service Offering Definition (SOD)
State of Wisconsin Division of Enterprise Technology (DET) SharePoint 2010 Service Offering Definition (SOD) 1 Document Revision History Date Version Creator Notes 07/15/2011 1.0 Lisa Jorgensen Initial
More informationThe Case for NRENs John DYER
The Case for NRENs John DYER TF- MSP Meeting, Espoo, Finland 9/10 September 2015 Networks Services People www.geant.org The Case for NRENs Published January 2009 This presentation is dedicated to continuing
More informationUnderstanding and simplifying brand, branding and marketing. www.knowthesign.in
Understanding and simplifying brand, branding and marketing What is a BRAND? Is it a name, logo, trademark, product or a package? NO. A BRAND is not...a logo...an identity...a product or a package So what
More information70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
More informationDringgg the ultimate VoIP dialer solution also available as white label product (PMP)
Dringgg the ultimate VoIP dialer solution also available as white label product () Pearlgates Holding PLC can provide you with a full independent OTT solution to start you own mobile operation. The solution
More informationBOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015
BOMGAR.COM BOMGAR VS. GOTOASSIST UPDATED: 9/8/2015 Bomgar VS. GoToAssist LICENSING & DEPLOYMENT The proliferation of solutions has undoubtedly provided certain advantages for organizations seeking alternatives
More informationHow to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950
How to Connect SSTP VPN from Windows Server 2008/Vista to Vigor2950 Requirements Windows Server 2008, or Windows Vista SP1 Local Certificate (a online CA server on the Internet is required for some situation
More informationRational Asset Manager 7.2 Editions and Licensing
Rational Asset Manager 7.2 Editions and Licensing Derek D. Baron, ddbaron@us.ibm.com Product Manager, Rational Asset Manager 2009 IBM Corporation IBM Corporation 200 The information contained in this presentation
More informationSiemens PKI Certificate Authority (CA) Hierarchy
Siemens PKI Certificate Authority (CA) Hierarchy Status July 2011 Siemens PKI CA Hierarchy Overview (1) Public Root (available in common OS / Browsers) Baltimore CyberTrust Root (Verizon) Siemens Trust
More informationMake your day a sales day
Make your day a sales day Axivas Group Axivas IT Solutions I C T M a n a g e m e n t S a l e s P o r t a l S o f t w a r e Your technology partner for Sales and Marketing S y s t e m I n t e g r a t i
More informationThe Role of TERENA in Modern Business
Questions and Answers Call for Proposals TSec(08)061 Introduction The following questions with regards to the SCS Call for Proposals (CFP) (TSec(08)061) have been received by TERENA. In order to ensure
More informationA MATTER MANAGEMENT/e-BILLING BUYING GUIDE
A MATTER MANAGEMENT/e-BILLING BUYING GUIDE Finding the perfect, scalable solution for the corporate legal department TABLE OF CONTENTS Introduction...3 What Is Matter Management?...5 Managing the Legal
More informationDepartment of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO dmmitc3@missi.ncsc.mil UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
More informationREDUCE YOUR OPEN SOURCE SECURITY RISK: STRATEGIES, TACTICS, AND TOOLS
REDUCE YOUR OPEN SOURCE SECURITY RISK: STRATEGIES, TACTICS, AND TOOLS Open source security must be a priority While there s no doubt that open source software (OSS) is here to stay, that doesn t mean that
More informationPKI Deployment Business Issues
An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured
More informationThe NREN cloud strategy should be aligned with the European and national policies, but also with the strategies of the member institutions.
4 External influences PESTLE Analysis A PESTLE analysis is a useful tool to support the investigation and decision process relating to cloud services. PESTLE in general covers Political, Economic, Social,
More informationCommercially Proven Trusted Computing Solutions RSA 2010
Commercially Proven Trusted Computing Solutions RSA 2010 Hardware Self-Encrypting Drives (SEDs) Unique Security Features Encryption below the file system Hardware root-of-trust for encryption Tamper resistant
More information1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
More informationStrategic Management of Learning Assets
C a s e S t u d y Strategic Management of Learning Assets Implementing an Enterprise-wide Learning Content Management System Chris Howard October 2005 Bersin & Associates Strategic Management of Learning
More informationVeriSign Trust Network Certificate Policies
VeriSign Trust Network Certificate Policies Version 1.3 Effective Date: March 31, 2004 VeriSign, Inc. 487 E. Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com VeriSign
More informationOMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics
More informationSecure Enterprise Applications enabled by SETECS Security Infrastructure Products
Secure Enterprise Applications enabled by Security Infrastructure 1. Secure E mail/secure Web (SSL) 2. Secure Web Services: Identity Management, Single Sign On, and Web Authorization 3. Public Key Infrastructure
More information