Cloud-based data acquisition system, or secure private network? You CAN have your Cloud and eat it too.
|
|
- Cleopatra Skinner
- 7 years ago
- Views:
Transcription
1 Cloud-based data acquisition system, or secure private network? You CAN have your Cloud and eat it too. Jon Tandy Elecsys Corporation
2 The Cloud It s Everywhere We live in a Cloud-connected world, with everything from cell phones to coffee makers being connected to the Cloud. Data delivery system = pizza delivery system
3 The Cloud It s Everywhere We live in a Cloud-connected world, with everything from It s Here! cell phones to coffee makers being connected to the Cloud. Data delivery system = pizza delivery system
4 Benefits of Cloud Solutions Everyone seems to want everything connected to the Internet of Things or Industrial Internet of Things (IIoT). Although in some cases this may be more hype than reality, Cloud solutions can provide meaningful value to consumers, manufacturers, and service providers.
5 Benefits of Cloud Solutions The IoT and IIoT promise compelling benefits to the way we work and live, and will change the way companies do business in the 21 st century. Microsoft Azure Many PaaS and SaaS providers offer full-featured and rapid application development platforms.
6 Benefits of Cloud Solutions Some of the benefits of Cloud solutions include: Rapid application development Mature applications and tools Integration of data new business logic, better visibility of company processes
7 Benefits of Cloud Solutions Better informed decision-making Cost savings Increased efficiency Greater productivity, human and business Regulatory compliance and more
8 Challenges More volume and types of data Legacy protocols, diverse communication requirements. Network bandwidth, communication costs, and latency concerns.
9 Challenges Configure, update, program, and manage remote devices. Security Corporate network Cloud platform Devices Data or control capabilities on the remote devices.
10 Example from Oil & Gas Pipelines Transformation from isolated data silos to integrated network infrastructure: Traditional SCADA maintained real-time control and monitoring of operational data. Many isolated pieces of equipment weren t monitored in real-time or at all.
11 Example from Oil & Gas Pipelines SCADA Host
12 Example from Oil & Gas Pipelines Over time, departments within the enterprise recognized needs for data acquisition & analysis. Billing Measurement Maintenance ERP CRM Chart recorder replacement, calibration of sensors, responsive gas quality calculations, etc., etc.
13 Example from Oil & Gas Pipelines They came to the operations department to ask for more data. Often, SCADA said... Sorry, we have a pipeline to operate. Go get your own data. Other business units had to establish their own dedicated poll-response networks to the same sites and devices, communication networks, etc.
14 Example from Oil & Gas Pipelines Analytics ERP SCADA Host Historian Measurement Billing
15 Publish/Subscribe Architecture SCADA used poll-response method to acquire data device reports to one host request. Architectural problem one to one relationship between a device ( thing ) and a host ( app ). Enter the MQTT protocol.
16 Publish/Subscribe Architecture MQTT was invented for oil and gas pipelines... Breaks the 1-to-1 link between device and host. Accommodates a more flexible architecture. Device can publish data so that multiple host systems ( subscribers ) can easily access. Doesn t burden the real-time operations (SCADA) with other enterprise-related data.
17 Publish/Subscribe Architecture MQTT was IoT before IoT was cool! MQTT is now one of the leading protocols for Cloud/IoT/IIoT solutions uses publish/subscribe model, connects multiple devices to multiple applications.
18 Publish/Subscribe Architecture Subscriber Application Subscriber Application Subscriber Application Subscriber Application MQTT Server Publisher Publisher Publisher
19 Publish/Subscribe Architecture MQTT = Message Queue Telemetry Transport Extremely lightweight protocol, designed for low-bandwidth systems Can be used with small, low-power embedded computers. Used by Facebook Messenger for push messaging, ideal for report-by-exception. Can be combined with TLS or VPN encryption, access control lists, etc.
20 Publish/Subscribe Architecture MQTT = Message Queue Telemetry Transport Designed for low latency systems, assured or unassured messaging, efficient delivery. Open standard, built into many different enterprise middleware and Cloud solutions. Highly flexible data payload and architecture.
21 Securing the Cloud But what about security? Can Cloud-based solutions be considered truly secure and reliable for critical systems?
22 Securing the Cloud At the 2014 API Cybersecurity Conference, a panel of three oil and gas industry executives was asked whether their companies were investigating Cloud/IoT solutions. Not in my lifetime. Concern over security is evident.
23 Securing the Cloud Companies who manage critical infrastructure of the country (pipelines, telecommunications, electrical grid, etc.) are responsible for the safety and security of not only their operations, but the livelihood of the nation. To them, Cloud = the Wild West of the public Internet = spam, viruses, & Chinese hackers Or is it?
24 Securing the Cloud Operational Technology (OT) has relied on familiarity of private networks to ensure security and reliability unrealistic with current reality, fails to obtain benefit from Cloud-based solutions. OT can benefit from IT technologies, enable Cloud opportunities without compromising reliability and integrity of critical operations.
25 What is a private network? In the past, SCADA systems relied on dial-up and leased phone lines and privately managed radio networks for communication to field device. Security was assumed (?) based on inaccessibility. Now, dial-up and leased lines are going away, and private radio systems are often too difficult to manage with reduced staff of skilled technicians.
26 What is a private network? Now SCADA is increasingly turning to cellular modems through public carriers (AT&T, Verizon, Sprint), along with satellite in remote locations. Are these private networks? Are they secure, given that they use the same cell towers, satellite dishes, and back-end networks as commercial data traffic?
27 What is a private network? The carriers ensure safety of communication networks, through Dedicated router channels Encrypted MPLS and/or VPN connections End devices may also use encrypted protocols to ensure data integrity over the air
28 What is a private network? Host Application Public Internet Private MPLS VPN TLS encrypted tunnel Cellular Data Network
29 What is a private network? AT&T 5000 employees to monitor network for security incidents and threats (other carriers too). MPLS/VPN connections provide robust security to isolate critical systems from threats existing on the public side of the carriers networks. (But eternal vigilance is the price of security!)
30 What about the Cloud? Compare to Cloud-based solution same IT principles. Secure authentication/encryption from field device to Cloud Secure MPLS/VPN from Virtual Private Cloud to the corporate enterprise. All the benefits of a private network can be combined with the powerful features of Cloud-hosted solutions!
31 What about the Cloud? Host Application Host Application Private MPLS VPN Private MPLS VPN AWS US West Virtual Private Cloud AWS US East Virtual Private Cloud TLS encrypted tunnel TLS encrypted tunnel
32 What about the Cloud? Cloud solution providers (Amazon Web Services, etc.) also employ 1000 s to maintain their infrastructure and to protect the security of their networks. Compare this with the relatively limited IT staffing resources of even the large oil & gas or electric utility companies.
33 Toward a Better Solution Example: A liquids pipeline company wants to migrate old poll-response SCADA system to an MQTT multi-client architecture. First, add edge gateways to interface with legacy field equipment through redundant satellite and cellular modems. Gateways give pass-through access, so existing SCADA polling remains unchanged (100 s of sites, 12-second critical updates).
34 Toward a Better Solution Primary SCADA Host Secondary SCADA Host Legacy passthrough polling
35 Toward a Better Solution Next, implement Cloud-based MQTT server running in redundant Virtual Private Cloud instances. New SCADA is MQTT subscriber to field data (eliminating polling). Access Control Lists restrict remote connections. AWS instances set up or shut down rapidly (15 min.) for deploying test environment in parallel with current polling system.
36 Toward a Better Solution Primary SCADA Host Secondary SCADA Host AWS US West Virtual Private Cloud MQTT MQTT AWS US East Virtual Private Cloud Legacy passthrough polling
37 Toward a Better Solution Security from the Cloud to SCADA is assured through dedicated and secure MPLS/VPN circuits. Device security is assured by using MQTT through TLS-encrypted tunnels, and firewall on the gateway devices. Due to redundancy and high-availability AWS servers, system ran with 100% availability. Pass-through can be phased out.
38 Toward a Better Solution Primary SCADA Host Secondary SCADA Host MPLS VPNs TLS tunnels No more passthrough polling!
39 Toward a Better Solution Gateway device can be entirely blocked from in-bound connection, due to the clientoriginated nature of MQTT. Use permanent or on-demand VPN connection to Cloud for maintenance or realtime diagnostics...no compromise of device-level security.
40 Toward a Better Solution Primary SCADA Host Secondary SCADA Host All connections outbound firewall can prevent any unwanted incoming ports.
41 Toward a Better Solution Primary SCADA Host Secondary SCADA Host Maintenance console/ Programming terminal Host redundancy VPN VPN connection established by remote
42 And many more... Other Industry Examples Tank truck loading stations PLCs, flow computers, monitored at remote sites. ISO/RTO (electrical grid operators) managing solar, wind, battery storage, small generation resources, demand response, micro-grid, etc.
43 Summary Cloud/IoT solutions are ubiquitous and inevitable. Many valuable benefits: Rapid deployment of powerful applications Cost savings, efficiency, analytics Data archival and retrieval Robust and redundant networks architectures Ease burden on company IT resources
44 Challenges Summary Diverse data, protocol, and network requirements Latency, bandwidth, isolated data silos Tight coupling between device & host application Entrenched mindset of private SCADA
45 Summary OT tends to dismiss Cloud benefits in favor of perceived security of traditional networks. However, this perception is challenged in light of the fact that their companies are already turning to IT solutions (VPN, etc.) to utilize public carrier networks.
46 Summary MQTT protocol provides flexible architecture, next generation data acquisition, using low bandwidth publish/subscribe technology. Data gateways can acquire and publish field data for both real-time (SCADA) and other enterprise applications. Device security using authenticated/encrypted VPN and/or tunnels, access control lists, etc.
47 Summary Enterprise reliability and network integrity is secured using MPLS/VPN connections from high availability Cloud servers. Doesn t require large investment in hardware, software, and network management. The benefits of Cloud solutions can be achieved, without sacrificing the security of private networks, by combining IT with OT solutions. You can have your Cloud and eat it too!
48 Questions? Thank you for attending the presentation! Please feel free to visit our booth to discuss further.
Securely Connect, Network, Access, and Visualize Your Data
Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent
More informationNCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
More informationTowards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
More informationArlen Nipper - Cirrus Link
Operational Technology + Information Technology Applying Message Oriented Middleware to Operational Systems Arlen Nipper - Cirrus Link How can we apply technology to: Mitigate environmental risk? Detect
More informationEvolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
More informationThe Information Revolution for the Enterprise
Click Jon Butts to add IBM text Software Group Integration Manufacturing Industry jon.butts@uk.ibm.com The Information Revolution for the Enterprise 2013 IBM Corporation Disclaimer IBM s statements regarding
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationCloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
More informationGETTING THE MOST FROM THE CLOUD. A White Paper presented by
GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are
More informationSCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com
More informationSatellite REPRINTED FROM. John D. Prentice, Stratos Global Corp., USA, www.oilfieldtechnology.com
Satellite solutions John D. Prentice, Stratos Global Corp., USA, discusses how new satellite solutions impact offshore and land based exploration and production. REPRINTED FROM www.oilfieldtechnology.com
More informationIoT Solutions for Upstream Oil and Gas
Solution Brief Intel IoT Oil and Gas Industry IoT Solutions for Upstream Oil and Gas Intel products, solutions, and services are enabling secure and seamless Internet of Things (IoT) solutions for upstream
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationOptimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
More informationWHITE PAPER. 4G: The Distributed Intelligence Revolution
WHITE PAPER 4G: The Distributed Intelligence Revolution BACKGROUND Most machine-to-machine (M2M) connectivity is hosted on 2G networks today, including many SCADA and other remote monitoring and control
More informationHow To Use Inmarsat M2M On A Sim Card
One global 3G network. One global SIM. In today s always-on business environment can you afford to be in the dark? The use of machine-to-machine (M2M) technology is growing fast - and no wonder. The idea
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationAre You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat
Are You in Control of Your Cloud Data? Expanded options for keeping your enterprise in the driver s seat EXECUTIVE SUMMARY Hybrid IT is a fact of life in companies today. Increasingly, the way to deploy
More informationVoIP Deployment Options
AN ATLANTIC-IT.NET WHITEPAPER VoIP Deployment Options Whether cloud-based or on premises, IP-based voice platforms can deliver a wide range of significant business benefits. 2 VoIP Deployment Options EXECUTIVE
More informationOverlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO
Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO Agenda Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter
More informationDelivering secure, real-time business insights for the Industrial world
Delivering secure, real-time business insights for the Industrial world Arnaud Mathieu: Program Director, Internet of Things Dev., IBM amathieu@us.ibm.com @arnomath 1 We are on the threshold of massive
More informationV1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
More informationNetwork Enabled Cloud
Network Enabled Cloud Your company network is the company s vital circulatory system that quickly moves information to people so they can make informed decisions about ways to accelerate your business
More informationCUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com
` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and
More informationUsing Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
More informationCloud Express. Quick Guide 10/1/15. 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved.
Cloud Express Quick Guide 10/1/15 2015 EarthLink. Trademarks are property of their respective owners. All rights reserved. 2 Cloud Express Customers Business Opportunity Leveraging Cloud providers for
More informationDIY Device Cloud Documentation
DIY Device Cloud Documentation Release 1.0 Tony DiCola May 11, 2014 Contents 1 Overview 3 1.1 What is a device cloud?......................................... 3 1.2 Why do you want a device cloud?....................................
More informationMaster the Might of the Hybrid Cloud
Reach for the Sky Master the Might of the Hybrid Cloud WHITE PAPER As an IT decision maker at a global enterprise, you face unique challenges in managing a complex infrastructure with varied resources
More informationOptimizing Energy Operations with Machine-to-Machine Communications
Optimizing Energy Operations with Machine-to-Machine Communications Contents Executive Summary... 3 The Role of M2M in Energy Companies... 3 Leveraging a M2M Platform... 5 Key Requirements for M2M Application
More informationCF & IoT Protocol Support
CF & IoT Protocol Support Atul Kshirsagar Senior Engineer, GE Software Dedicated Committer, CF Diego Project May 11, 2015 Imagination at work Agenda Protocol landscape in Industrial application Multi protocol
More informationSCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
More informationCloud Services. More agility. More freedom. More choice.
Cloud Services More agility. More freedom. More choice. What is cloud computing? No longer on the horizon: the cloud has come to business computing. Why consider moving to a cloud model? Why now? Cloud
More informationThe Value of Bringing Analytics to the Edge
Daniel Kirsch Principal Analyst and Vice President Sponsored by Dell Introduction The Internet of Things (IoT) has quickly gained traction and captured the attention of organizations because of the profound
More informationCLOUD BASED SCADA. Removing Implementation and Deployment Barriers. Liam Kearns Open Systems International, Inc.
CLOUD BASED SCADA Removing Implementation and Deployment Barriers Liam Kearns Open Systems International, Inc. SCADA Traditional definition and application. SCADA DEFINITION Definition Supervisory Control
More informationCloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
More informationRadware Cloud Solutions for Enterprises. How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper
Radware Cloud Solutions for Enterprises How to Capitalize on Cloud-based Services in an Enterprise Environment - White Paper Table of Content Executive Summary...3 Introduction...3 The Range of Cloud Service
More informationCARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
More informationCloud Computing Concept, Technology & Architecture
Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助 Contents Technology mechanisms foundational to cloud platforms are covered,
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
More information1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
More informationTENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
More informationPLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION. An introduction to delivering applications faster
PLATFORM-AS-A-SERVICE, DEVOPS, AND APPLICATION INTEGRATION An introduction to delivering applications faster CONTENTS 2 Introduction to PaaS 4 Private, public, and hybrid PaaS 6 Who uses PaaS? 8 DevOps
More informationHIGH-SPEED BRIDGE TO CLOUD STORAGE
HIGH-SPEED BRIDGE TO CLOUD STORAGE Addressing throughput bottlenecks with Signiant s SkyDrop 2 The heart of the Internet is a pulsing movement of data circulating among billions of devices worldwide between
More informationBuilding Cloud-Connected Solutions with Exosite and Texas Instruments
Building Cloud-Connected Solutions with Exosite and Texas Instruments IoT Development Kits Exosite and Texas Instruments (TI) are working together to provide development kits that include an out-of-box
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More information1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
More informationAttacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
More informationSecurely Deliver Remote Monitoring and Service to Critical Systems. A White Paper from the Experts in Business-Critical Continuity TM
Securely Deliver Remote Monitoring and Service to Critical Systems A White Paper from the Experts in Business-Critical Continuity TM Executive Summary As a leading equipment manufacturer of critical infrastructure
More informationNetwork Design Best Practices for Deploying WLAN Switches
Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone
More informationHow cloud computing can transform your business landscape.
How cloud computing can transform your business landscape. This whitepaper will help you understand the ways cloud computing can benefit your business. Introduction It seems like everyone is talking about
More informationBEDIFFERENT ACE G E R M A N Y. aras.com. Copyright 2012 Aras. All Rights Reserved.
Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT ACE G E R M A N Y Copyright 2012 Aras. All Rights Reserved. ACE Germany Leveraging the Cloud Rob McAveney Director of Product Management Aras Corp
More informationUNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify
More informationDemystifying the Cloud Computing 02.22.2012
Demystifying the Cloud Computing 02.22.2012 Speaker Introduction Victor Lang Enterprise Technology Consulting Services Victor Lang joined Smartbridge in early 2003 as the company s third employee and currently
More informationFirm Uses Internet Service Bus to Enable Smart Grid for Dynamic Energy Savings
Windows Azure Customer Solution Case Study Firm Uses Internet Service Bus to Enable Smart Grid for Dynamic Energy Savings Overview Country or Region: United States Industry: Utilities Customer Profile
More informationHow cloud computing can transform your business landscape
How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not
More informationSmarter wireless networks
IBM Software Telecommunications Thought Leadership White Paper Smarter wireless networks Add intelligence to the mobile network edge 2 Smarter wireless networks Contents 2 Introduction 3 Intelligent base
More informationA New Approach to IoT Security
A New Approach to IoT Security 5 Key Requirements to Securing IoT Communications The Internet of Things promises to bring everything from microwaves to pacemakers and shipping fleets online, leverage enormous
More informationVerizon Managed SD WAN with Cisco IWAN. October 28, 2015
Verizon Managed SD WAN with Cisco IWAN. October 28, 2015 Agenda Evolution of the WAN SD WAN delivers business outcomes Verizon s Managed IWAN solution Challenges for SD WAN adoption Deployment guidelines
More informationSolving Your Big Data Problems with Fast Data (Better Decisions and Instant Action)
Solving Your Big Data Problems with Fast Data (Better Decisions and Instant Action) Does your company s integration strategy support your mobility, big data, and loyalty projects today and are you prepared
More informationProduction in the Cloud
2/18/2013 Production in the Cloud Presentation by: Rick Dmytryshyn, Program Manager Ph. (303) 882-1282, E-mail. rick.dmytryshyn@willbros.com Presentation Overview DEFINITION: What is the Cloud? SECURITY:
More informationThe digital future for energy and utilities.
Digital transformation has changed the way you do business. The digital future for energy and utilities. Digital is reshaping the landscape in every industry, and the energy and utilities sectors are no
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationSCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationDatabase Security, Virtualization and Cloud Computing
Whitepaper Database Security, Virtualization and Cloud Computing The three key technology challenges in protecting sensitive data in modern IT architectures Including: Limitations of existing database
More informationBuilding Remote Access VPNs
Building Remote Access VPNs 124 Grove Street, Suite 309 Franklin, MA 02038 877-4-ALTIGA www.altiga.com Building Remote Access VPNs: Harnessing the Power of the Internet to Reduce Costs and Boost Performance
More informationThe Case For A Cloud Access Security Broker
The Case For A Cloud Access Security Broker 1 Executive summary The SaaS era is here. According to Gartner, SaaS and cloud-based business application services revenue will grow from $13.5 billion in 2011
More informationCLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER
CLOUD CLOUT WITH OPEN APIS WHAT YOU SHOULD ASK OF YOUR CLOUD PROVIDER STRATEGIC WHITE PAPER As cloud services become increasingly popular, more questions arise about the capabilities of cloud solutions.
More informationHedge Funds & the Cloud: The Pros, Cons and Considerations
Hedge Funds & the Cloud: The Pros, Cons and Considerations By Mary Beth Hamilton, Director of Marketing, Eze Castle Integration The increased use of cloud-based services is undeniable. Analyst firm Forrester
More informationCloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
More informationBEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L
Copyright 2012 Aras. All Rights Reserved. BEDIFFERENT A C E 2 0 1 2 I N T E R N A T I O N A L Copyright 2012 Aras. All Rights Reserved. ACE 2012 I N TERNATIONAL Leveraging the Cloud Rob McAveney Director
More informationIndustrial Internet of Things Bears Fruit with Connected Services for Plant Assets and Fleet Migration
Industrial Internet of Things Bears Fruit with Connected Services for Plant Assets and Fleet Migration Peter Reynolds Director of Consulting ARC Advisory Group PReynolds@ARCweb.com Twitter @PeterDReynolds
More informationSwiftStack Global Cluster Deployment Guide
OpenStack Swift SwiftStack Global Cluster Deployment Guide Table of Contents Planning Creating Regions Regions Connectivity Requirements Private Connectivity Bandwidth Sizing VPN Connectivity Proxy Read
More informationThe Advantages of Security as a Service versus On-Premise Security
The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred
More informationWIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
More informationCloud? Should. My Business Be in the. What you need to know about cloud-based computing for your business. By Bill Natalie
Should My Business Be in the Cloud? By Bill Natalie T HE CLOUD. IT S BEEN A MAJOR topic of conversation for a few years now, and most of us are already leveraging it on a regular basis both at home and
More informationAlfresco Enterprise on Azure: Reference Architecture. September 2014
Alfresco Enterprise on Azure: Reference Architecture Page 1 of 14 Abstract Microsoft Azure provides a set of services for deploying critical enterprise workloads on its highly reliable cloud platform.
More informationImproving the Microsoft enterprise. network for public cloud connectivity
Improving the Microsoft enterprise cloud network for public cloud connectivity Page 1 Improving network performance between Microsoft and the public Situation As Microsoft IT located more of its line-ofbusiness
More informationThe Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
More informationSIP Trunking with Microsoft Office Communication Server 2007 R2
SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
More informationMigrating SaaS Applications to Windows Azure
Migrating SaaS Applications to Windows Azure Lessons Learned 04.04.2012 Speaker Introduction Deepthi Raju Marketing Technology Services Deepthi joined Smartbridge in 2005 and has over twenty years of technology
More informationThe Cloud: A Force Multiplier for Your Business. Andy Brisley Vice President Solution Engineering
The Cloud: A Force Multiplier for Your Business Andy Brisley Vice President Solution Engineering SAFE HARBOR The forward-looking statements contained in this document represent an outline of our current
More informationSCADAvantage Network Topology System software products
Data sheet DS/2101193-EN Rev. AD SCADAvantage Network Topology System software products Basic elements of a SCADAvantage system SCADAvantage has three distinct parts: the, the RTRDB, and the Client. Diagram
More informationTHE FUTURE OF SMART GRID COMMUNICATIONS
THE FUTURE OF SMART GRID COMMUNICATIONS KENNETH C. BUDKA CTO STRATEGIC INDUSTRIES MAY 2014 THE GRID OF THE FUTURE WIDE-SCALE DEPLOYMENT OF RENEWABLES INCREASED ENERGY EFFICIENCY PEAK POWER REDUCTION, DEMAND
More informationThe Cisco Powered Network Cloud: An Exciting Managed Services Opportunity
. White Paper The Cisco Powered Network Cloud: An Exciting Managed Services Opportunity The cloud computing phenomenon is generating a lot of interest worldwide because of its potential to offer services
More informationOutline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages
Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the
More informationHow To Use Amazon.Com Service For Business
Overview of Amazon Web Services May 2010 Introduction Managing the unique and groundbreaking changes in both technology and business over the past decade has created an ongoing IT infrastructure challenge
More informationPractical Enterprise Mobility
Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business
More informationMoving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them
Moving Service Management to SaaS Key Challenges and How Nimsoft Service Desk Helps Address Them Table of Contents Executive Summary... 3 Introduction: Opportunities of SaaS... 3 Introducing Nimsoft Service
More informationSQLstream Blaze and Apache Storm A BENCHMARK COMPARISON
SQLstream Blaze and Apache Storm A BENCHMARK COMPARISON 2 The V of Big Data Velocity means both how fast data is being produced and how fast the data must be processed to meet demand. Gartner The emergence
More informationSaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
More informationIs Hyperconverged Cost-Competitive with the Cloud?
Economic Insight Paper Is Hyperconverged Cost-Competitive with the Cloud? An Evaluator Group TCO Analysis Comparing AWS and SimpliVity By Eric Slack, Sr. Analyst January 2016 Enabling you to make the best
More informationIntegrating Web Messaging into the Enterprise Middleware Layer
The increasing demand for real-time data has companies seeking to stream information to users at their desks via the web and on the go with mobile apps. Two trends are paving the way: o Internet push/streaming
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationKeyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
More informationEnterprise Cloud Solutions
IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationIndustrial VPN Cloud Services. Paul A. Mercier pmercier@phoenixcon.com Project Engineer PHOENIX CONTACT, USA
Industrial VPN Cloud Services Paul A. Mercier pmercier@phoenixcon.com Project Engineer PHOENIX CONTACT, USA What does Phoenix Contact do? Connectors? Terminal Blocks? 2 Plus a whole lot more 3 Networking
More informationCloud computing an insight
Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available
More informationCLOUD COMPUTING SECURITY ISSUES
CLOUD COMPUTING SECURITY ISSUES Florin OGIGAU-NEAMTIU IT Specialist The Regional Department of Defense Resources Management Studies, Brasov, Romania The term cloud computing has been in the spotlights
More information