OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

Size: px
Start display at page:

Download "OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0"

Transcription

1 sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 SM

2 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Assumptions... 5 SaaS Interoperability Usage Scenarios... 6 Business Driver Mapping... 6 Usage Scenarios... 7 Usage Scenario 1 Service Configuration... 7 Usage Scenario 2 Bulk Data Transfer... 8 Usage Scenario 3 Real Time Data Access... 9 Usage Scenario 4 Service Aggregation...10 Usage Scenario 5 Service Transfer...11 Usage Requirements...12 RFP Requirements Service Providers...13 Summary of Industry Actions Required

3 Legal Notice This Open Data Center Alliance SM Usage Model: Software as a Service Interoperability is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT OPEN DATA CENTER ALLIANCE PARTICIPANTS: Non-Open Data Center Alliance Participants only have the right to review, and make reference or cite, this document. Any such references or citations to this document must give the Open Data Center Alliance, Inc. full attribution and must acknowledge the Open Data Center Alliance, Inc. s copyright in this document. Such users are not permitted to revise, alter, modify, make any derivatives of, or otherwise amend this document in any way. NOTICE TO USERS WHO ARE OPEN DATA CENTER ALLIANCE PARTICIPANTS: Use of this document by Open Data Center Alliance Participants is subject to the Open Data Center Alliance s bylaws and its other policies and procedures. OPEN CENTER DATA ALLIANCE SM, ODCA SM, and the OPEN DATA CENTER ALLIANCE logo SM are service marks owned by Open Data Center Alliance, Inc. and all rights are reserved therein. Unauthorized use is strictly prohibited. This document and its contents are provided AS IS and are to be used subject to all of the limitation set forth herein. Users of this document should not reference any initial or recommended methodology, metric, requirements, or other criteria that may be contained in this document or in any other document distributed by the Alliance ( Initial Models ) in any way that implies the user and/or its products or services are in compliance with, or have undergone any testing or certification to demonstrate compliance with, any of these Initial Models. Any proposals or recommendations contained in this document including, without limitation, the scope and content of any proposed methodology, metric, requirements, or other criteria does not mean the Alliance will necessarily be required in the future to develop any certification or compliance or testing programs to verify any future implementation or compliance with such proposals or recommendations. This document does not grant any user of this document any rights to use any of the Alliance s trademarks. All other service marks, trademarks and trade names referenced herein are those of their respective owners. Published August

4 SM sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 Executive Summary Software as a Service (SaaS) is a-model for service delivery based on on-demand software applications that offer an alternative to purchasing applications and providing local provisioning, integration, support, and maintenance. Characteristics of SaaS include multitenancy, pay-as-you-go subscriptions, central application management and infrastructure, frequent upgrades, and little to no custom code. With the growing availability of many new SaaS solutions, organizations desire common integration methods and services to support agility and the rapid proliferation of new capabilities. This usage model outlines five usage scenarios based on two perspectives of interoperability, along with success and failure scenarios for each. In addition, service provider requirements and an industry call to action are presented. This document serves a variety of audiences. Solution providers and technology vendors will benefit from its content to better understand customer needs, and tailor service and product offerings. SaaS customers will be able to benefit from the ability to interact with a common solution across multiple providers for the same SaaS application. Standards organizations will find the information helpful in defining end-user relevant and open standards. 4

5 Purpose The ODCA SaaS Interoperability Usage Model was written to encourage consistent mechanisms to enable cloud subscribers to quickly and efficiently consume SaaS by standardizing interactions between cloud subscribers and cloud providers. With the primary benefit of cloud computing freeing up an organization from proprietary infrastructure, it follows that open standards are desired for interoperability. The business drivers for SaaS interoperability follow: On-boarding and Administration: Enables subscribers to quickly establish and scale new service capabilities for their organization. Reduces the overhead associated with ongoing SaaS synchronization. Value Add Business Processes: Fosters the ability to address market opportunities and business problems by dynamically constructing business processes that use SaaS-based components and data. Business System Migration: The subscriber moves from one discrete SaaS solution to another from the same or a different provider. For example, moving from one customer relationship management solution to another. Business Continuity: Migrates or replicates SaaS-functional capabilities and data to address outages, security breaches, data corruption, or other disruptions, and encompasses both disaster recovery and disaster avoidance. Assumptions The following assumptions apply to all usage scenarios described in this document: 1. A properly executed service agreement is in place between the SaaS provider and the consumer that identifies capabilities, costs, operational level of agreements (OLAs) and service level of agreements (SLAs). This could be a document similar to the Commercial Services Framework from the ODCA. 2. SLAs and OLAs include items such as these: Availability Security, privacy and compliance Geographic hosting requirements Data owner, roles and responsibilities (e.g., backup, etc.) 3. SaaS is provisioned as part of a large scale solution used by many employees of an SaaS subscriber, though there is enough flexibility to include cases in which an individual department or end-user sources its own solution. 4. Interactions involve either a single application from a single provider or multiple SaaS solutions from one or more providers that are combined as part of a larger, end-to-end business process. 5. Automated provisioning of user identity and access management is in compliance with the practices described in ODCA Cloud Based Identity Provisioning 1. When user accounts are added, deleted, or modified, SaaS solutions are automatically updated with these changes. 6. Out of scope are the following: SaaS providers moving SaaS solutions among IaaS or PaaS clouds. Interconnectability among SaaS solutions on the backend, which are abstracted, and therefore not visible to the subscriber. 5

6 SaaS Interoperability Usage Scenarios Interoperability Perspectives Interoperability perspectives are the basic categories that define the scope into which the business usages fall. Interoperability perspectives follow: Interconnectability The parallel process in which two coexisting environments communicate and interact. Portability The serial process of moving a system from one cloud environment to another. In terms of SaaS, these perspectives can be applied at the data layer, the SaaS service layer, and the business layer. The data layer includes all SaaS data sources and sinks, as well as the protocols, services, and tools used to interact with that data. The SaaS service layer refers to all of the components that constitute the SaaS solution, which include runtime executables, libraries, mash-up components, and callable application programming interfaces (APIs). The business layer includes business context and composition where a SaaS solution is orchestrated with other services in a meaningful and productive format for specific business processes. Additional information on interoperability definition and scope can be found in ODCA Usage Model: Guide to Interoperability Across Clouds 2. Business Driver Mapping For each of the business drivers identified in the Purpose section, one or more corresponding usage scenarios are identified in the following table, aligning to the SaaS Interoperability perspectives. Business Driver Interconnectability Portability On-boarding & Administration Usage Scenario 1 Service Configuration Usage Scenario 2 Bulk Data Transfer Usage Scenario 3 Real Time Data Access Value Add Business Processes Business System Migration Business Continuity Usage Scenario 4 Service Aggregation Usage Scenario 3 Real Time Data Access Usage Scenario 1 Service Configuration Usage Scenario 3 Real Time Data Access Usage Scenario 1 Service Configuration Usage Scenario 3 Real Time Data Access (not applicable) Usage Scenario 5 Service Transfer Usage Scenario 2 Bulk Data Transfer Usage Scenario 5 Service Transfer Usage Scenario 2 Bulk Data Transfer 6

7 Usage Scenarios Usage Scenario 1 Service Configuration Business Drivers: On-boarding and Administration, Business System Migration, Business Continuity Interoperability Perspective: Interconnectability Goal: Interoperability between the cloud subscriber and the cloud provider to configure an SaaS solution in the context of initial provisioning and ongoing administration and maintenance. Assumption 1: The SaaS subscriber has signed up for the SaaS solution, and the provider has provisioned a set of resources according to the selected multi-tenancy model: single or multi-tenant. Success Scenario 1: The solution is fully configured and tested without requiring the development of custom code specifically designed to run in that SaaS environment. Steps: 1. SaaS provider establishes the admin account for the subscriber to use for confirming access and for controlling ongoing user administration, reporting, and customization. 2. SaaS provider provides online documentation and tools that define the scope of available configuration and customization features, in a clear and concise format, with step-by-step details. 3. Subscriber identifies business-specific configuration items. Items might include the following: a. Branding that may include co-branding or white-label support for the subscriber. b. System-level workflows that define how administrative and customization changes are made. c. Policies that define high-level rules for how administration and customization are performed. d. Role identification and mapping that define functionality within the enabled solution, based on end-user roles, such as super users. e. User personalization that defines how each subscriber s user can alter an online session with personal customization. 4. Subscriber effects the configuration and tests changes by using a self-service approach through an online portal or API. Changes take effect immediately. Failure Condition 1: Configuration does not work as expected, once the provider informs the subscriber that the solution is available. Failure Handling 1: Remediate according to support agreement. 7

8 Usage Scenario 2 Bulk Data Transfer Business Drivers: On-boarding and Administration, Business System Migration, Business Continuity Interoperability Perspective: Portability Goal: Securely and reliably exchanging asynchronous data on a singular or regular basis. Assumption 1: Data referred to in the interchange process originates from a data store at either the subscriber or SaaS provider site. Assumption 2: Automated data exchange process has been designed, implemented, and tested, as part of service provisioning. Assumption 3: Exchange can be single or bi-directional. Assumption 4: Data can be exchanged through a third party. Assumption 5: There is a method of providing a transactionally consistent copy of the data. Success Scenario 1: Data is successfully and securely exchanged between the subscriber and the SaaS provider. No application downtime will occur during data transmission and upload into the application data store, although there might be an impact on performance. A copy of the data is transmitted to the other party. Steps: 1. Subscriber defines or refines metadata, transformation mapping, and schedule for data exchange at the source and destination. 2. Prepare source data for exchange in the correct machine-readable format in an industry standard, self-descriptive format, as specified in the provider s documentation. 3. Establish a secure connection between subscriber and provider via an automated transfer. 4. Send and receive data with orchestration, such as handshaking, timeouts, and retries, as appropriate. 5. Perform data quality check. 6. Close connection. 7. Acknowledge receipt. Failure Condition 1: Failed to establish a connection. Failure Handling 1: Retry specified number of times and log errors. Alert subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. Failure Condition 2: Error in send and receive process. Failure Handling 2: Retry specified number of times and log errors. Alert if the maximum number of retries is exceeded. Execute remediation or manual intervention defined for the alert. Failure Condition 3: Quality check failure. 8

9 Failure Handling 3: Discard and re-exchange data or take other appropriate remediation steps, as defined in the SaaS application documentation. Usage Scenario 3 Real Time Data Access Business Drivers: On-boarding and Administration, Value Add Business Processes, Business System Migration, Business Continuity Interoperability Perspective: Interconnectability Goal: Synchronous access to data at application runtime through provided standard interfaces. Assumption 1: Data is located in a data store at either the subscriber or provider site. Assumption 2: Access can be as read only or read/write, according to the source provider policies. Assumption 3: Access can be facilitated through a third party. Assumption 4: No direct data access to data stores; the data consumer uses a controlled, scalable services interface. Note: Real Time Data Access is a special purpose usage scenario of Service Aggregation, which is described in the next section. Success Scenario 1: Data is successfully and securely accessed with the ability to audit who accessed the data. Steps: 1. Subscriber defines or refines metadata and transformation mapping at the source and destination. 2. API is consumed at the subscriber destination application. 3. Subscriber uses SaaS capability that requires data access. 4. Establish a secure connection. 5. Read, write, insert, and delete data through an API with access logging, as appropriate. 6. Close the connection. Failure Condition 1: Failed to establish connection. Failure Handling 1: Retry specified number of times and log errors. Alert the subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. Failure Condition 2: Error in create, read, update, delete (CRUD) process. Failure Handling 2: Retry specified number of times and log errors. Alert the subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. 9

10 Usage Scenario 4 Service Aggregation Business Drivers: Value Add Business Processes Interoperability Perspective: Interconnectability Goal: Self-service, heterogeneous service composition and orchestration (mash-up) across cloud provider and subscriber sites. Assumption 1: New compositions are constructed from one or more APIs or components, from single or multiple providers, where at least one component is SaaS-based. Assumption 2: SaaS subscriber is signed up for SaaS; SLAs are in place for SaaS APIs. Assumption 3: Content aggregation can take place either on the server or on the client. Assumption 4: Support is provided for open, standardized protocols (Widgets, RESTful web APIs), data formats (JSON), and standards (OAuth). Assumption 4: APIs are versioned. Success Scenario 1: SaaS subscriber manages the composition of various services to achieve a new set of end-to-end functionalities through simple, open, easily-adopted APIs that are supported, documented, and have code examples. Success Scenario 2: SaaS mash-up consumption from a diverse set of platforms, including operating systems, programming languages, and applications. Steps: 1. SaaS provider component developer develops and publishes mash-up components and descriptions. 2. SaaS subscriber mash-up composer discovers SaaS mash-up component. 3. SaaS subscriber mash-up composer uses mash-up tool or manual composition to build a mash-up and debug it using client-side diagnostics. 4. SaaS subscriber makes mash-up available as part of the service catalog. 5. SaaS subscriber end user invokes mash-up application by using enterprise credentials. Failure Condition 1: HTTP 400 or 500 errors returned by an operation. Failure Handling 1: Specific action is taken by the subscriber, based on the returned error code. 10

11 Usage Scenario 5 Service Transfer Business Drivers: Business System Migration, Business Continuity Interoperability Perspective: Portability Goal: Migrate a particular capability from one SaaS solution to another from the same or different SaaS provider. Assumption 1: Porting from one SaaS solution to another involves end of life from one source solution, and establishing a new service with another destination solution. Assumption 2: There can be overlap in the services while cutting over from one application to another. Assumption 3: Service configuration and data transfer are covered in detail as part of other usage scenarios, and are mentioned only briefly in this scenario. Success Scenario 1: The SaaS subscriber has exported all data from the source application and has established new service in the destination application. The source application is no longer available to subscriber end users. Steps: 1. SaaS subscriber identifies destination SaaS solution and determines level and scope of transition. 2. SaaS subscriber formally notifies SaaS providers and sets transition timeline. 3. SaaS provider establishes service for the destination SaaS solution, including data and configuration. 4. SaaS subscriber decommissions any regular data exchanges with the source SaaS solution. 5. SaaS subscriber communicates changes to end users, and provides notification of any downtime. 6. SaaS provider of source application terminates end-user access. 7. SaaS subscriber directs end users to the destination SaaS solution. 8. SaaS subscriber recovers final data from the source SaaS solution. Failure Condition 1: Lock-In to the source SaaS solution such that it is expensive and disruptive to migrate from one solution to another. Failure Handling 1: Lock-In avoidance measures such as configuration through metadata, and ownership over data and format, and no custom code. Failure Condition 2: Unintended disruption to mash-ups. Failure Handling 2: Clear and timely communications within the SaaS subscriber. 11

12 Usage Requirements The features in the following table are derived from the usage scenarios in the previous section, and are aligned with the ODCA Standard Units of Measure 3.For this usage model, it is not intended that all of the features in a given column must be supported as a group. In practice, a given service provider solution will combine different service levels for different elements. For example, all Bronze Performance feature requirements must first be met before combining features from any other performance level. For instance, Gold Security features can be combined with Bronze. Bronze Silver Gold Platinum Application Basic Enterprise equivalent Critical market or business sector equivalent Military or safety-critical equivalent Security As per ODCA Provider Assurance Usage Model 4 Formal Documentation Online documentation for all service interfaces, GUIs, and command lines Self-Service Configuration Online portal and command line interface Online portal, command line and callable APIs Online portal, command line and callable APIs Online portal, command line and callable APIs Metadata Online metadata catalog; Definitions in cloud provider s choice of standard Online metadata catalog with search; Definitions in cloud provider s choice of standard Metadata discovery with automated tools; Definitions in recognized industry standard consistent with ODCA Metadata discovery and mapping with automated tools; Definitions in recognized industry standard consistent with ODCA Data Import/Export Format Specified File Format APIs APIs Versioned APIs Asynchronous Data Exchange Process Semi-automated, scheduled batch exchange, which may include manual steps and stages of data transformation Semi-automated, scheduled batch exchange with hook-up and reconnection, and orchestration Fully-automated service interface hookup and reconnection, orchestration and interconnection at large scale, with auditability and reporting Fully-automated service interface hook-up and reconnection, orchestration and interconnection at large scale, with auditability and reporting Synchronous Data Access Level Read-only Read-only with audit capabilities Read/Write with audit and reporting capabilities Read/Write with audit, reporting and analytics Synchronous Data Access Format Programmatic web-service interface in cloud provider s choice of standard Programmatic webservice interface in cloud provider s choice of standard, with auditability Programmatic web-service interface in recognized industry standard, consistent with ODCA concepts, with auditability and reporting Versioned programmatic web-service interface in recognized industry standard, consistent with ODCA concepts, with auditability, reporting and analytics 12

13 Bronze Silver Gold Platinum Web Services Interface Standard Programmatic web services in cloud provider s choice of standard Programmatic web services in cloud provider s choice of standard Programmatic web services in recognized industry standard, consistent with ODCA concepts Programmatic web services in recognized industry standard, consistent with ODCA concepts Web Services Scope Available for one or two key userfacing capabilities Available for all key user-facing capabilities; all data exchange Available for all key user-facing capabilities; all data exchange; some administration Available for all keyuser capabilities, all data interactions and all administrative items RFP Requirements Service Providers Following are requirements that the Alliance believes should be included in requests for proposal to cloud providers to ensure that proposed services support SaaS interoperability. Additional recommended requirements are contained in the ODCA Cloud Based Identity Provisioning 1 and ODCA Security Provider Assurance 4 usage models. ODCA Principle Requirement Service is open and standards-based. Describe how the service meets this principle and any limitations towards the ODCA principle. Configuration and Administration Requirements: ODCA SaaS Interoperability Usage Model 1.0 The environment can be customized by the subscriber for specific look and feel, workflow, and branding considerations. The subscriber s employees can personalize the environment for their individual preferences. ODCA SaaS Interoperability Usage Model 1.0 The system provides a means to view system health, availability, and subscriber usage. ODCA SaaS Interoperability Usage Model 1.0: The SaaS provider and subscriber will develop and maintain an agreed upon communication plan to advise the subscriber and any impacted subscriber employees of events impacting service or data. ODCA SaaS Interoperability Usage Model 1.0 Should an incident have potential legal implications, notice should be given to the subscriber that an event has taken place and that specific laws or regulations may have been violated. Every reasonable effort should be made by the SaaS provider to communicate all details as soon as possible. If the risk is valid, and continued operations would put subscriber at risk, the SaaS provider can suspend services. Data Exchange Requirements: ODCA SaaS Interoperability Usage Model 1.0 The subscriber maintains ownership of all raw and processed data that is provided by or originates from the subscriber. The provider may not copy or distribute any subscriber data without the permission of the subscriber. ODCA SaaS Interoperability Usage Model 1.0 Data exchange mechanisms are based on data-interchange standards, such as JSON and XML. ODCA SaaS Interoperability Usage Model 1.0 The frequency and size of all interfaced data to various systems will be defined in a documented design with the SaaS provider and subscriber. ODCA SaaS Interoperability Usage Model 1.0 Specific metadata fields and formats are defined in a documented design between the subscriber and SaaS provider in an agreed upon standard. ODCA SaaS Interoperability Usage Model 1.0 Data transmission via electronic medium, such as the Internet, dedicated link, and intercompany connection, will require encryption for all levels of information exchange. An acknowledge receipt will be provided for each asynchronous data exchange. 13

14 ODCA SaaS Interoperability Usage Model 1.0 The system provides diagnostic tools and testing mechanisms that the subscriber can use to validate data exchange mechanisms using test data. ODCA SaaS Interoperability Usage Model 1.0 Adequate logging is in place to detect unauthorized access, modification, or deletion of data in transit and data at rest. ODCA SaaS Interoperability Usage Model 1.0 Use of the subscriber s data is limited to the contracted SaaS service, and may not be used by the provider for other purposes, such as data mining or analytics, without permission from the subscriber. ODCA SaaS Interoperability Usage Model 1.0 Authorized subscriber employees may securely export a copy of all subscriber data from the SaaS provider for backup, migration, or other purposes. In the event of service termination, the SaaS provider is required to retain data for 90 days to allow the subscriber time to export all data. ODCA SaaS Interoperability Usage Model 1.0 When no longer required, data must be permanently removed in accordance with a mutually agreed upon data retention policy in order to prevent any possible unauthorized data recovery. Web Services Requirements: ODCA SaaS Interoperability Usage Model 1.0 Within the terms of the service agreement (i.e., service metering), the subscriber can utilize SaaS capabilities to build and deploy composite enterprise applications and mashups. ODCA SaaS Interoperability Usage Model 1.0 Application capability is based on service standards if the subscriber is consuming SaaS as a web service (e.g., REST or SOAP). ODCA SaaS Interoperability Usage Model 1.0 The system provides diagnostic tools and testing mechanisms that the subscriber can use to check connectivity, as well as the compatibility of web services used in a business process composition. Click here for an online assistant, Proposed Engine Assistant Tool (PEAT) 5, to help you detail your RFP requirements. Summary of Industry Actions Required In the interest of giving guidance on how to create and deploy solutions that are open, multi-vendor and interoperable, we have identified specific areas where the Alliance believes there should be open specifications, formal or de facto standards, or common intellectual propertyfree (i.e., IP-free) implementations. Where the Alliance has a specific recommendation on the specification, standard, or open implementation, it is called out in this usage model. In other cases, we will be working with the industry to evaluate and recommend specifications in future releases of this document. 1 Cloud Based Identity Provisioning: 2 Guide to Interoperability Across Clouds: 3 ODCA Usage Model: Standard Units of Measure for IaaS: docs?download=458:standard_units_of_measure 4 Provider Assurance Usage Model: 5 Proposed Engine Assistant Tool: 14

OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds

OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service

More information

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud

More information

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...

More information

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...

More information

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY 1 Legal Notice This Open Data Center Alliance SM Usage: VM Interoperability is proprietary to the Open Data Center Alliance, Inc.

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...

More information

Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0

Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0 sm Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Applicability... 6 Related

More information

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann

More information

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:

More information

Open Data Center Alliance Usage: SERVICE CATALOG

Open Data Center Alliance Usage: SERVICE CATALOG sm Open Data Center Alliance Usage: SERVICE CATALOG Legal Notice This Open Data Center Alliance SM Usage: Service Catalog is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT

More information

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0 sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...

More information

Cloud Tech Solution at T-Systems International Cloud Integration Center

Cloud Tech Solution at T-Systems International Cloud Integration Center Cloud Tech Solution at T-Systems International Cloud Integration Center Executive Overview In 2009 T-Systems identified that in order for the organizational processes/products/services incorporating use

More information

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0

Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0 sm Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Taxonomy... 5 Assumptions... 6 Long Distance

More information

CA API Management SaaS

CA API Management SaaS SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0

OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Taxonomy...6 Usage Model Diagram...6 Usage Model Details...6 Usage

More information

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Automate and simplify Syncplicity user/group management tasks EMC Global Solutions Abstract Make the most of your existing EMC

More information

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Reference Framework...5 Taxonomy...5 Usage Scenarios...6 Usage Scenario Transfer

More information

agility made possible

agility made possible SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center

More information

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013

Intel IT Cloud 2013 and Beyond. Name Title Month, Day 2013 Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the

More information

HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief

HP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief SCALEnow. HP Cloud Services Enablement portfolio for communications service providers: Compute Services Solution brief HP Cloud Services Enablement (HP CSE) for infrastructure as a service (IaaS) enables

More information

OPEN DATA CENTER ALLIANCE Sm Master Usage Model: Commercial framework REV 1.0

OPEN DATA CENTER ALLIANCE Sm Master Usage Model: Commercial framework REV 1.0 OPEN DATA CENTER ALLIANCE Sm Master Usage Model: Commercial framework REV 1.0 Table of Contents Proprietary Notice And Other Notifications... 5 Legal Notice... 6 Acknowledgments... 6 Terminology And Provenance...

More information

How To Build An Operating Software For The Enterprise

How To Build An Operating Software For The Enterprise Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - AEM 6.0 Sites: Managed Services Basic (2015v1) The Products and Services described in this Product Description and Metrics ( PDM ) document are subject to the

More information

IBM API Management Overview. 2014 IBM Corporation

IBM API Management Overview. 2014 IBM Corporation IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential

More information

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference

More information

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael

More information

VMware vcloud Air - Disaster Recovery User's Guide

VMware vcloud Air - Disaster Recovery User's Guide VMware vcloud Air - Disaster Recovery User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

6 Cloud computing overview

6 Cloud computing overview 6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable

More information

TA 15-21: Oracle Database Subscription Licenses

TA 15-21: Oracle Database Subscription Licenses TA 15-21: Oracle Database Subscription Licenses ATTENTION: Current and Future CalCloud Customers ACTION REQUESTED: Information Only DUE DATE: None Overview: The California Department of Technology (CDT)

More information

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)

More information

Axway API Portal. Putting APIs first for your developer ecosystem

Axway API Portal. Putting APIs first for your developer ecosystem Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management

More information

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory

SMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory SMART Considerations for Active Directory Migration A Strategic View and Best Practices for Migrating the Corporate Directory Table of Contents Introduction: The Strategic View of Active Directory Migrations...

More information

Planning the Migration of Enterprise Applications to the Cloud

Planning the Migration of Enterprise Applications to the Cloud Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction

More information

Siebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013

Siebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related

More information

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER

BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER Table of Contents Executive Summary............................................... 1 New Functionality...............................................

More information

Interoperability and Portability for Cloud Computing: A Guide

Interoperability and Portability for Cloud Computing: A Guide Interoperability and Portability for Cloud Computing: A Guide November, 2014 Contents Acknowledgements... 3 Motivation and Considerations... 4 Interoperability & Portability Overview... 5 Basic Definition

More information

Open Data Center Alliance Usage: STANDARD UNITS OF MEASURE FOR IAAS

Open Data Center Alliance Usage: STANDARD UNITS OF MEASURE FOR IAAS sm Open Data Center Alliance Usage: STANDARD UNITS OF MEASURE FOR IAAS Legal Notice This Open Data Center Alliance SM Usage: Standard Units of Measure for IaaS is proprietary to the Open Data Center Alliance,

More information

Moving beyond Virtualization as you make your Cloud journey. David Angradi

Moving beyond Virtualization as you make your Cloud journey. David Angradi Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network

More information

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models. Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,

More information

Open Source Sales Force Automation (SFA) in the Cloud SaaS

Open Source Sales Force Automation (SFA) in the Cloud SaaS Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi

More information

Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member

Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3

More information

Cisco Secure Network Container: Multi-Tenant Cloud Computing

Cisco Secure Network Container: Multi-Tenant Cloud Computing Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for

More information

Cisco Cloud Onboarding Solution

Cisco Cloud Onboarding Solution Cisco Cloud Onboarding Solution Paul Hamilton, Senior Director, Cloud & IT Transformation, Cisco Services Kiran Inampudi, Global SP Segment Lead, Cloud & IT Transformation, Cisco Services Alex Foster,

More information

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0

OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Overview of the Cloud Maturity Model...5 Description of the Cloud Maturity

More information

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery

More information

Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of

Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of the enterprise consumer Legal Notice This CIaaS: Recommendations

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

The role of standards in driving cloud computing adoption

The role of standards in driving cloud computing adoption The role of standards in driving cloud computing adoption The emerging era of cloud computing The world of computing is undergoing a radical shift, from a product focus to a service orientation, as companies

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Cloud Computing: Legal Risks and Best Practices

Cloud Computing: Legal Risks and Best Practices Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent

More information

The Way to SOA Concept, Architectural Components and Organization

The Way to SOA Concept, Architectural Components and Organization The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

VMware vcloud Powered Services

VMware vcloud Powered Services SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to

More information

Public Cloud Service Definition

Public Cloud Service Definition Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course

McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables

More information

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred

More information

Copyright 2015 EMC Corporation. All rights reserved. 1

Copyright 2015 EMC Corporation. All rights reserved. 1 Copyright 2015 EMC Corporation. All rights reserved. 1 CLOUD READY DATA PROTECTION BUILT FOR SOFTWARE DEFINED DATACENTER YATIN PATIL Copyright 2015 EMC Corporation. All rights reserved. 2 TWEET US! Are

More information

Cloud Computing: Risks and Auditing

Cloud Computing: Risks and Auditing IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG

More information

EXIN Cloud Computing Foundation

EXIN Cloud Computing Foundation Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect

OWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud

More information

Managing Cloud Computing Services in the Enterprise

Managing Cloud Computing Services in the Enterprise WHITE PAPER Managing Cloud Computing Services in the Enterprise THE VALUE OF A SINGLE, INTEGRATED CLOUD MANAGEMENT PLATFORM Managing Cloud Computing Services in the Enterprise 2 How does your organization

More information

Cloud Computing and HIPAA Privacy and Security

Cloud Computing and HIPAA Privacy and Security Cloud Computing and HIPAA Privacy and Security This is just one example of the many online resources Practical Law Company offers. Christine A. Williams, Perkins Coie LLP, with PLC Employee Benefits &

More information

OVERVIEW Cloud Deployment Services

OVERVIEW Cloud Deployment Services OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the

More information

RS MDM. Integration Guide. Riversand

RS MDM. Integration Guide. Riversand RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture

SOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture SOLUTION WHITE PAPER BMC Manages the Full Service Stack on Secure Multi-tenant Architecture Table of Contents Introduction................................................... 1 Secure Multi-tenancy Architecture...................................

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

50x 2020 40 Zettabytes*

50x 2020 40 Zettabytes* IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency

More information

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there

A white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page

More information

Service Management-as-a-Service for Hybrid Cloud

Service Management-as-a-Service for Hybrid Cloud Sep 23 2015 Service Management-as-a-Service for Hybrid Cloud Rajesh Jaluka Distinguished Engineer Global Technology Services Agenda Service Management Integration Challenges in Hybrid Cloud Environment

More information

OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0

OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0 OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Understanding the Scale-Out Storage Model...6 Common Scale-Out

More information

Backup to the Cloud Service Definition

Backup to the Cloud Service Definition Backup to the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Backup to the Cloud service to enable organisations

More information

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information

More information

IBM Managed Security Services (Cloud Computing) hosted mobile device security management

IBM Managed Security Services (Cloud Computing) hosted mobile device security management IBM Managed Security Services (Cloud Computing) hosted mobile device security management Z125-8855-00 11-2011 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3. Services...

More information

LEGAL ISSUES IN CLOUD COMPUTING

LEGAL ISSUES IN CLOUD COMPUTING LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing

More information

HP Service Manager software

HP Service Manager software HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Disclosure Requirements of CloudCode Software

Disclosure Requirements of CloudCode Software DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Adopting Cloud Computing with a RISK Mitigation Strategy

Adopting Cloud Computing with a RISK Mitigation Strategy Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines

More information

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use

BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use Product Data Sheet BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use BEA AquaLogic Integrator delivers the best way for IT to integrate, deploy, connect and manage process-driven

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers

Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate

More information

Invitation to OASIS CAMP A Cirrus View (high level)

Invitation to OASIS CAMP A Cirrus View (high level) Invitation to OASIS CAMP A Cirrus View (high level) Charlie Tupitza, JumpSoft CAMP Technical Committee Member 10 October 2012 Charles.Tupitza@JumpSoft.net 703 989-8777 Cloud Application Management for

More information