OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0
|
|
- Daniel Robertson
- 8 years ago
- Views:
Transcription
1 sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 SM
2 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Assumptions... 5 SaaS Interoperability Usage Scenarios... 6 Business Driver Mapping... 6 Usage Scenarios... 7 Usage Scenario 1 Service Configuration... 7 Usage Scenario 2 Bulk Data Transfer... 8 Usage Scenario 3 Real Time Data Access... 9 Usage Scenario 4 Service Aggregation...10 Usage Scenario 5 Service Transfer...11 Usage Requirements...12 RFP Requirements Service Providers...13 Summary of Industry Actions Required
3 Legal Notice This Open Data Center Alliance SM Usage Model: Software as a Service Interoperability is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT OPEN DATA CENTER ALLIANCE PARTICIPANTS: Non-Open Data Center Alliance Participants only have the right to review, and make reference or cite, this document. Any such references or citations to this document must give the Open Data Center Alliance, Inc. full attribution and must acknowledge the Open Data Center Alliance, Inc. s copyright in this document. Such users are not permitted to revise, alter, modify, make any derivatives of, or otherwise amend this document in any way. NOTICE TO USERS WHO ARE OPEN DATA CENTER ALLIANCE PARTICIPANTS: Use of this document by Open Data Center Alliance Participants is subject to the Open Data Center Alliance s bylaws and its other policies and procedures. OPEN CENTER DATA ALLIANCE SM, ODCA SM, and the OPEN DATA CENTER ALLIANCE logo SM are service marks owned by Open Data Center Alliance, Inc. and all rights are reserved therein. Unauthorized use is strictly prohibited. This document and its contents are provided AS IS and are to be used subject to all of the limitation set forth herein. Users of this document should not reference any initial or recommended methodology, metric, requirements, or other criteria that may be contained in this document or in any other document distributed by the Alliance ( Initial Models ) in any way that implies the user and/or its products or services are in compliance with, or have undergone any testing or certification to demonstrate compliance with, any of these Initial Models. Any proposals or recommendations contained in this document including, without limitation, the scope and content of any proposed methodology, metric, requirements, or other criteria does not mean the Alliance will necessarily be required in the future to develop any certification or compliance or testing programs to verify any future implementation or compliance with such proposals or recommendations. This document does not grant any user of this document any rights to use any of the Alliance s trademarks. All other service marks, trademarks and trade names referenced herein are those of their respective owners. Published August
4 SM sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 Executive Summary Software as a Service (SaaS) is a-model for service delivery based on on-demand software applications that offer an alternative to purchasing applications and providing local provisioning, integration, support, and maintenance. Characteristics of SaaS include multitenancy, pay-as-you-go subscriptions, central application management and infrastructure, frequent upgrades, and little to no custom code. With the growing availability of many new SaaS solutions, organizations desire common integration methods and services to support agility and the rapid proliferation of new capabilities. This usage model outlines five usage scenarios based on two perspectives of interoperability, along with success and failure scenarios for each. In addition, service provider requirements and an industry call to action are presented. This document serves a variety of audiences. Solution providers and technology vendors will benefit from its content to better understand customer needs, and tailor service and product offerings. SaaS customers will be able to benefit from the ability to interact with a common solution across multiple providers for the same SaaS application. Standards organizations will find the information helpful in defining end-user relevant and open standards. 4
5 Purpose The ODCA SaaS Interoperability Usage Model was written to encourage consistent mechanisms to enable cloud subscribers to quickly and efficiently consume SaaS by standardizing interactions between cloud subscribers and cloud providers. With the primary benefit of cloud computing freeing up an organization from proprietary infrastructure, it follows that open standards are desired for interoperability. The business drivers for SaaS interoperability follow: On-boarding and Administration: Enables subscribers to quickly establish and scale new service capabilities for their organization. Reduces the overhead associated with ongoing SaaS synchronization. Value Add Business Processes: Fosters the ability to address market opportunities and business problems by dynamically constructing business processes that use SaaS-based components and data. Business System Migration: The subscriber moves from one discrete SaaS solution to another from the same or a different provider. For example, moving from one customer relationship management solution to another. Business Continuity: Migrates or replicates SaaS-functional capabilities and data to address outages, security breaches, data corruption, or other disruptions, and encompasses both disaster recovery and disaster avoidance. Assumptions The following assumptions apply to all usage scenarios described in this document: 1. A properly executed service agreement is in place between the SaaS provider and the consumer that identifies capabilities, costs, operational level of agreements (OLAs) and service level of agreements (SLAs). This could be a document similar to the Commercial Services Framework from the ODCA. 2. SLAs and OLAs include items such as these: Availability Security, privacy and compliance Geographic hosting requirements Data owner, roles and responsibilities (e.g., backup, etc.) 3. SaaS is provisioned as part of a large scale solution used by many employees of an SaaS subscriber, though there is enough flexibility to include cases in which an individual department or end-user sources its own solution. 4. Interactions involve either a single application from a single provider or multiple SaaS solutions from one or more providers that are combined as part of a larger, end-to-end business process. 5. Automated provisioning of user identity and access management is in compliance with the practices described in ODCA Cloud Based Identity Provisioning 1. When user accounts are added, deleted, or modified, SaaS solutions are automatically updated with these changes. 6. Out of scope are the following: SaaS providers moving SaaS solutions among IaaS or PaaS clouds. Interconnectability among SaaS solutions on the backend, which are abstracted, and therefore not visible to the subscriber. 5
6 SaaS Interoperability Usage Scenarios Interoperability Perspectives Interoperability perspectives are the basic categories that define the scope into which the business usages fall. Interoperability perspectives follow: Interconnectability The parallel process in which two coexisting environments communicate and interact. Portability The serial process of moving a system from one cloud environment to another. In terms of SaaS, these perspectives can be applied at the data layer, the SaaS service layer, and the business layer. The data layer includes all SaaS data sources and sinks, as well as the protocols, services, and tools used to interact with that data. The SaaS service layer refers to all of the components that constitute the SaaS solution, which include runtime executables, libraries, mash-up components, and callable application programming interfaces (APIs). The business layer includes business context and composition where a SaaS solution is orchestrated with other services in a meaningful and productive format for specific business processes. Additional information on interoperability definition and scope can be found in ODCA Usage Model: Guide to Interoperability Across Clouds 2. Business Driver Mapping For each of the business drivers identified in the Purpose section, one or more corresponding usage scenarios are identified in the following table, aligning to the SaaS Interoperability perspectives. Business Driver Interconnectability Portability On-boarding & Administration Usage Scenario 1 Service Configuration Usage Scenario 2 Bulk Data Transfer Usage Scenario 3 Real Time Data Access Value Add Business Processes Business System Migration Business Continuity Usage Scenario 4 Service Aggregation Usage Scenario 3 Real Time Data Access Usage Scenario 1 Service Configuration Usage Scenario 3 Real Time Data Access Usage Scenario 1 Service Configuration Usage Scenario 3 Real Time Data Access (not applicable) Usage Scenario 5 Service Transfer Usage Scenario 2 Bulk Data Transfer Usage Scenario 5 Service Transfer Usage Scenario 2 Bulk Data Transfer 6
7 Usage Scenarios Usage Scenario 1 Service Configuration Business Drivers: On-boarding and Administration, Business System Migration, Business Continuity Interoperability Perspective: Interconnectability Goal: Interoperability between the cloud subscriber and the cloud provider to configure an SaaS solution in the context of initial provisioning and ongoing administration and maintenance. Assumption 1: The SaaS subscriber has signed up for the SaaS solution, and the provider has provisioned a set of resources according to the selected multi-tenancy model: single or multi-tenant. Success Scenario 1: The solution is fully configured and tested without requiring the development of custom code specifically designed to run in that SaaS environment. Steps: 1. SaaS provider establishes the admin account for the subscriber to use for confirming access and for controlling ongoing user administration, reporting, and customization. 2. SaaS provider provides online documentation and tools that define the scope of available configuration and customization features, in a clear and concise format, with step-by-step details. 3. Subscriber identifies business-specific configuration items. Items might include the following: a. Branding that may include co-branding or white-label support for the subscriber. b. System-level workflows that define how administrative and customization changes are made. c. Policies that define high-level rules for how administration and customization are performed. d. Role identification and mapping that define functionality within the enabled solution, based on end-user roles, such as super users. e. User personalization that defines how each subscriber s user can alter an online session with personal customization. 4. Subscriber effects the configuration and tests changes by using a self-service approach through an online portal or API. Changes take effect immediately. Failure Condition 1: Configuration does not work as expected, once the provider informs the subscriber that the solution is available. Failure Handling 1: Remediate according to support agreement. 7
8 Usage Scenario 2 Bulk Data Transfer Business Drivers: On-boarding and Administration, Business System Migration, Business Continuity Interoperability Perspective: Portability Goal: Securely and reliably exchanging asynchronous data on a singular or regular basis. Assumption 1: Data referred to in the interchange process originates from a data store at either the subscriber or SaaS provider site. Assumption 2: Automated data exchange process has been designed, implemented, and tested, as part of service provisioning. Assumption 3: Exchange can be single or bi-directional. Assumption 4: Data can be exchanged through a third party. Assumption 5: There is a method of providing a transactionally consistent copy of the data. Success Scenario 1: Data is successfully and securely exchanged between the subscriber and the SaaS provider. No application downtime will occur during data transmission and upload into the application data store, although there might be an impact on performance. A copy of the data is transmitted to the other party. Steps: 1. Subscriber defines or refines metadata, transformation mapping, and schedule for data exchange at the source and destination. 2. Prepare source data for exchange in the correct machine-readable format in an industry standard, self-descriptive format, as specified in the provider s documentation. 3. Establish a secure connection between subscriber and provider via an automated transfer. 4. Send and receive data with orchestration, such as handshaking, timeouts, and retries, as appropriate. 5. Perform data quality check. 6. Close connection. 7. Acknowledge receipt. Failure Condition 1: Failed to establish a connection. Failure Handling 1: Retry specified number of times and log errors. Alert subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. Failure Condition 2: Error in send and receive process. Failure Handling 2: Retry specified number of times and log errors. Alert if the maximum number of retries is exceeded. Execute remediation or manual intervention defined for the alert. Failure Condition 3: Quality check failure. 8
9 Failure Handling 3: Discard and re-exchange data or take other appropriate remediation steps, as defined in the SaaS application documentation. Usage Scenario 3 Real Time Data Access Business Drivers: On-boarding and Administration, Value Add Business Processes, Business System Migration, Business Continuity Interoperability Perspective: Interconnectability Goal: Synchronous access to data at application runtime through provided standard interfaces. Assumption 1: Data is located in a data store at either the subscriber or provider site. Assumption 2: Access can be as read only or read/write, according to the source provider policies. Assumption 3: Access can be facilitated through a third party. Assumption 4: No direct data access to data stores; the data consumer uses a controlled, scalable services interface. Note: Real Time Data Access is a special purpose usage scenario of Service Aggregation, which is described in the next section. Success Scenario 1: Data is successfully and securely accessed with the ability to audit who accessed the data. Steps: 1. Subscriber defines or refines metadata and transformation mapping at the source and destination. 2. API is consumed at the subscriber destination application. 3. Subscriber uses SaaS capability that requires data access. 4. Establish a secure connection. 5. Read, write, insert, and delete data through an API with access logging, as appropriate. 6. Close the connection. Failure Condition 1: Failed to establish connection. Failure Handling 1: Retry specified number of times and log errors. Alert the subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. Failure Condition 2: Error in create, read, update, delete (CRUD) process. Failure Handling 2: Retry specified number of times and log errors. Alert the subscriber if the maximum number of retries is exceeded. Both parties execute remediation or manual intervention defined for the alert. 9
10 Usage Scenario 4 Service Aggregation Business Drivers: Value Add Business Processes Interoperability Perspective: Interconnectability Goal: Self-service, heterogeneous service composition and orchestration (mash-up) across cloud provider and subscriber sites. Assumption 1: New compositions are constructed from one or more APIs or components, from single or multiple providers, where at least one component is SaaS-based. Assumption 2: SaaS subscriber is signed up for SaaS; SLAs are in place for SaaS APIs. Assumption 3: Content aggregation can take place either on the server or on the client. Assumption 4: Support is provided for open, standardized protocols (Widgets, RESTful web APIs), data formats (JSON), and standards (OAuth). Assumption 4: APIs are versioned. Success Scenario 1: SaaS subscriber manages the composition of various services to achieve a new set of end-to-end functionalities through simple, open, easily-adopted APIs that are supported, documented, and have code examples. Success Scenario 2: SaaS mash-up consumption from a diverse set of platforms, including operating systems, programming languages, and applications. Steps: 1. SaaS provider component developer develops and publishes mash-up components and descriptions. 2. SaaS subscriber mash-up composer discovers SaaS mash-up component. 3. SaaS subscriber mash-up composer uses mash-up tool or manual composition to build a mash-up and debug it using client-side diagnostics. 4. SaaS subscriber makes mash-up available as part of the service catalog. 5. SaaS subscriber end user invokes mash-up application by using enterprise credentials. Failure Condition 1: HTTP 400 or 500 errors returned by an operation. Failure Handling 1: Specific action is taken by the subscriber, based on the returned error code. 10
11 Usage Scenario 5 Service Transfer Business Drivers: Business System Migration, Business Continuity Interoperability Perspective: Portability Goal: Migrate a particular capability from one SaaS solution to another from the same or different SaaS provider. Assumption 1: Porting from one SaaS solution to another involves end of life from one source solution, and establishing a new service with another destination solution. Assumption 2: There can be overlap in the services while cutting over from one application to another. Assumption 3: Service configuration and data transfer are covered in detail as part of other usage scenarios, and are mentioned only briefly in this scenario. Success Scenario 1: The SaaS subscriber has exported all data from the source application and has established new service in the destination application. The source application is no longer available to subscriber end users. Steps: 1. SaaS subscriber identifies destination SaaS solution and determines level and scope of transition. 2. SaaS subscriber formally notifies SaaS providers and sets transition timeline. 3. SaaS provider establishes service for the destination SaaS solution, including data and configuration. 4. SaaS subscriber decommissions any regular data exchanges with the source SaaS solution. 5. SaaS subscriber communicates changes to end users, and provides notification of any downtime. 6. SaaS provider of source application terminates end-user access. 7. SaaS subscriber directs end users to the destination SaaS solution. 8. SaaS subscriber recovers final data from the source SaaS solution. Failure Condition 1: Lock-In to the source SaaS solution such that it is expensive and disruptive to migrate from one solution to another. Failure Handling 1: Lock-In avoidance measures such as configuration through metadata, and ownership over data and format, and no custom code. Failure Condition 2: Unintended disruption to mash-ups. Failure Handling 2: Clear and timely communications within the SaaS subscriber. 11
12 Usage Requirements The features in the following table are derived from the usage scenarios in the previous section, and are aligned with the ODCA Standard Units of Measure 3.For this usage model, it is not intended that all of the features in a given column must be supported as a group. In practice, a given service provider solution will combine different service levels for different elements. For example, all Bronze Performance feature requirements must first be met before combining features from any other performance level. For instance, Gold Security features can be combined with Bronze. Bronze Silver Gold Platinum Application Basic Enterprise equivalent Critical market or business sector equivalent Military or safety-critical equivalent Security As per ODCA Provider Assurance Usage Model 4 Formal Documentation Online documentation for all service interfaces, GUIs, and command lines Self-Service Configuration Online portal and command line interface Online portal, command line and callable APIs Online portal, command line and callable APIs Online portal, command line and callable APIs Metadata Online metadata catalog; Definitions in cloud provider s choice of standard Online metadata catalog with search; Definitions in cloud provider s choice of standard Metadata discovery with automated tools; Definitions in recognized industry standard consistent with ODCA Metadata discovery and mapping with automated tools; Definitions in recognized industry standard consistent with ODCA Data Import/Export Format Specified File Format APIs APIs Versioned APIs Asynchronous Data Exchange Process Semi-automated, scheduled batch exchange, which may include manual steps and stages of data transformation Semi-automated, scheduled batch exchange with hook-up and reconnection, and orchestration Fully-automated service interface hookup and reconnection, orchestration and interconnection at large scale, with auditability and reporting Fully-automated service interface hook-up and reconnection, orchestration and interconnection at large scale, with auditability and reporting Synchronous Data Access Level Read-only Read-only with audit capabilities Read/Write with audit and reporting capabilities Read/Write with audit, reporting and analytics Synchronous Data Access Format Programmatic web-service interface in cloud provider s choice of standard Programmatic webservice interface in cloud provider s choice of standard, with auditability Programmatic web-service interface in recognized industry standard, consistent with ODCA concepts, with auditability and reporting Versioned programmatic web-service interface in recognized industry standard, consistent with ODCA concepts, with auditability, reporting and analytics 12
13 Bronze Silver Gold Platinum Web Services Interface Standard Programmatic web services in cloud provider s choice of standard Programmatic web services in cloud provider s choice of standard Programmatic web services in recognized industry standard, consistent with ODCA concepts Programmatic web services in recognized industry standard, consistent with ODCA concepts Web Services Scope Available for one or two key userfacing capabilities Available for all key user-facing capabilities; all data exchange Available for all key user-facing capabilities; all data exchange; some administration Available for all keyuser capabilities, all data interactions and all administrative items RFP Requirements Service Providers Following are requirements that the Alliance believes should be included in requests for proposal to cloud providers to ensure that proposed services support SaaS interoperability. Additional recommended requirements are contained in the ODCA Cloud Based Identity Provisioning 1 and ODCA Security Provider Assurance 4 usage models. ODCA Principle Requirement Service is open and standards-based. Describe how the service meets this principle and any limitations towards the ODCA principle. Configuration and Administration Requirements: ODCA SaaS Interoperability Usage Model 1.0 The environment can be customized by the subscriber for specific look and feel, workflow, and branding considerations. The subscriber s employees can personalize the environment for their individual preferences. ODCA SaaS Interoperability Usage Model 1.0 The system provides a means to view system health, availability, and subscriber usage. ODCA SaaS Interoperability Usage Model 1.0: The SaaS provider and subscriber will develop and maintain an agreed upon communication plan to advise the subscriber and any impacted subscriber employees of events impacting service or data. ODCA SaaS Interoperability Usage Model 1.0 Should an incident have potential legal implications, notice should be given to the subscriber that an event has taken place and that specific laws or regulations may have been violated. Every reasonable effort should be made by the SaaS provider to communicate all details as soon as possible. If the risk is valid, and continued operations would put subscriber at risk, the SaaS provider can suspend services. Data Exchange Requirements: ODCA SaaS Interoperability Usage Model 1.0 The subscriber maintains ownership of all raw and processed data that is provided by or originates from the subscriber. The provider may not copy or distribute any subscriber data without the permission of the subscriber. ODCA SaaS Interoperability Usage Model 1.0 Data exchange mechanisms are based on data-interchange standards, such as JSON and XML. ODCA SaaS Interoperability Usage Model 1.0 The frequency and size of all interfaced data to various systems will be defined in a documented design with the SaaS provider and subscriber. ODCA SaaS Interoperability Usage Model 1.0 Specific metadata fields and formats are defined in a documented design between the subscriber and SaaS provider in an agreed upon standard. ODCA SaaS Interoperability Usage Model 1.0 Data transmission via electronic medium, such as the Internet, dedicated link, and intercompany connection, will require encryption for all levels of information exchange. An acknowledge receipt will be provided for each asynchronous data exchange. 13
14 ODCA SaaS Interoperability Usage Model 1.0 The system provides diagnostic tools and testing mechanisms that the subscriber can use to validate data exchange mechanisms using test data. ODCA SaaS Interoperability Usage Model 1.0 Adequate logging is in place to detect unauthorized access, modification, or deletion of data in transit and data at rest. ODCA SaaS Interoperability Usage Model 1.0 Use of the subscriber s data is limited to the contracted SaaS service, and may not be used by the provider for other purposes, such as data mining or analytics, without permission from the subscriber. ODCA SaaS Interoperability Usage Model 1.0 Authorized subscriber employees may securely export a copy of all subscriber data from the SaaS provider for backup, migration, or other purposes. In the event of service termination, the SaaS provider is required to retain data for 90 days to allow the subscriber time to export all data. ODCA SaaS Interoperability Usage Model 1.0 When no longer required, data must be permanently removed in accordance with a mutually agreed upon data retention policy in order to prevent any possible unauthorized data recovery. Web Services Requirements: ODCA SaaS Interoperability Usage Model 1.0 Within the terms of the service agreement (i.e., service metering), the subscriber can utilize SaaS capabilities to build and deploy composite enterprise applications and mashups. ODCA SaaS Interoperability Usage Model 1.0 Application capability is based on service standards if the subscriber is consuming SaaS as a web service (e.g., REST or SOAP). ODCA SaaS Interoperability Usage Model 1.0 The system provides diagnostic tools and testing mechanisms that the subscriber can use to check connectivity, as well as the compatibility of web services used in a business process composition. Click here for an online assistant, Proposed Engine Assistant Tool (PEAT) 5, to help you detail your RFP requirements. Summary of Industry Actions Required In the interest of giving guidance on how to create and deploy solutions that are open, multi-vendor and interoperable, we have identified specific areas where the Alliance believes there should be open specifications, formal or de facto standards, or common intellectual propertyfree (i.e., IP-free) implementations. Where the Alliance has a specific recommendation on the specification, standard, or open implementation, it is called out in this usage model. In other cases, we will be working with the industry to evaluate and recommend specifications in future releases of this document. 1 Cloud Based Identity Provisioning: 2 Guide to Interoperability Across Clouds: 3 ODCA Usage Model: Standard Units of Measure for IaaS: docs?download=458:standard_units_of_measure 4 Provider Assurance Usage Model: 5 Proposed Engine Assistant Tool: 14
OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds
sm OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Overview... 5 Interoperability... 6 Service
More informationOpen Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1 Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud
More informationOpen Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0
sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...
More informationOpen Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
More informationOpen Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY
sm Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY 1 Legal Notice This Open Data Center Alliance SM Usage: VM Interoperability is proprietary to the Open Data Center Alliance, Inc.
More informationOpen Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
More informationOpen Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
More informationOpen Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0
sm Open Data Center Alliance Usage: Cloud Based Identity Provisioning Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Applicability... 6 Related
More informationOPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann
More informationCLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
More informationOpen Data Center Alliance Usage: SERVICE CATALOG
sm Open Data Center Alliance Usage: SERVICE CATALOG Legal Notice This Open Data Center Alliance SM Usage: Service Catalog is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT
More informationOpen Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
More informationCloud Tech Solution at T-Systems International Cloud Integration Center
Cloud Tech Solution at T-Systems International Cloud Integration Center Executive Overview In 2009 T-Systems identified that in order for the organizational processes/products/services incorporating use
More informationOPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY
OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY 2014 TABLE OF CONTENTS 3 Legal Notice 5 Executive Summary 5 ODCA Members Respond to Survey on Data Center Practices and Plans 6 Methodology 6 Growth in
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationOpen Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0
sm Open Data Center Alliance Usage Model: Long Distance Workload Migration REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Taxonomy... 5 Assumptions... 6 Long Distance
More informationCA API Management SaaS
SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationOPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0
OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Taxonomy...6 Usage Model Diagram...6 Usage Model Details...6 Usage
More informationLeverage Your EMC Storage Investment with User Provisioning for Syncplicity:
Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Automate and simplify Syncplicity user/group management tasks EMC Global Solutions Abstract Make the most of your existing EMC
More informationOPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0
OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Reference Framework...5 Taxonomy...5 Usage Scenarios...6 Usage Scenario Transfer
More informationagility made possible
SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center
More informationIntel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
More informationHP Cloud Services Enablement portfolio for communications service providers: Compute Services. Solution brief
SCALEnow. HP Cloud Services Enablement portfolio for communications service providers: Compute Services Solution brief HP Cloud Services Enablement (HP CSE) for infrastructure as a service (IaaS) enables
More informationOPEN DATA CENTER ALLIANCE Sm Master Usage Model: Commercial framework REV 1.0
OPEN DATA CENTER ALLIANCE Sm Master Usage Model: Commercial framework REV 1.0 Table of Contents Proprietary Notice And Other Notifications... 5 Legal Notice... 6 Acknowledgments... 6 Terminology And Provenance...
More informationHow To Build An Operating Software For The Enterprise
Intel Information Technology Cloud Computing October 2009 Architecting Software as a for the Enterprise Executive Overview The reference architecture provides a proven template solution that Intel SaaS
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationPRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - AEM 6.0 Sites: Managed Services Basic (2015v1) The Products and Services described in this Product Description and Metrics ( PDM ) document are subject to the
More informationIBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
More informationExpert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II
Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference
More informationMANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS
VCE Word Template Table of Contents www.vce.com MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS January 2012 VCE Authors: Changbin Gong: Lead Solution Architect Michael
More informationVMware vcloud Air - Disaster Recovery User's Guide
VMware vcloud Air - Disaster Recovery User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationVistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationAPI Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
More information6 Cloud computing overview
6 Cloud computing overview 6.1 General ISO/IEC 17788:2014 (E) Cloud Computing Overview Page 1 of 6 Cloud computing is a paradigm for enabling network access to a scalable and elastic pool of shareable
More informationTA 15-21: Oracle Database Subscription Licenses
TA 15-21: Oracle Database Subscription Licenses ATTENTION: Current and Future CalCloud Customers ACTION REQUESTED: Information Only DUE DATE: None Overview: The California Department of Technology (CDT)
More informationCisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows
Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)
More informationAxway API Portal. Putting APIs first for your developer ecosystem
Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management
More informationSMART Considerations for Active Directory Migration. A Strategic View and Best Practices for Migrating the Corporate Directory
SMART Considerations for Active Directory Migration A Strategic View and Best Practices for Migrating the Corporate Directory Table of Contents Introduction: The Strategic View of Active Directory Migrations...
More informationPlanning the Migration of Enterprise Applications to the Cloud
Planning the Migration of Enterprise Applications to the Cloud A Guide to Your Migration Options: Private and Public Clouds, Application Evaluation Criteria, and Application Migration Best Practices Introduction
More informationSiebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
More informationBMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER
BMC Cloud Management Functional Architecture Guide TECHNICAL WHITE PAPER Table of Contents Executive Summary............................................... 1 New Functionality...............................................
More informationInteroperability and Portability for Cloud Computing: A Guide
Interoperability and Portability for Cloud Computing: A Guide November, 2014 Contents Acknowledgements... 3 Motivation and Considerations... 4 Interoperability & Portability Overview... 5 Basic Definition
More informationOpen Data Center Alliance Usage: STANDARD UNITS OF MEASURE FOR IAAS
sm Open Data Center Alliance Usage: STANDARD UNITS OF MEASURE FOR IAAS Legal Notice This Open Data Center Alliance SM Usage: Standard Units of Measure for IaaS is proprietary to the Open Data Center Alliance,
More informationMoving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
More informationSee Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.
Cloud Strategy Information Systems and Technology Bruce Campbell What is the Cloud? From http://csrc.nist.gov/publications/nistpubs/800-145/sp800-145.pdf Cloud computing is a model for enabling ubiquitous,
More informationOpen Source Sales Force Automation (SFA) in the Cloud SaaS
Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi
More informationStorage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
More informationCisco Secure Network Container: Multi-Tenant Cloud Computing
Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for
More informationCisco Cloud Onboarding Solution
Cisco Cloud Onboarding Solution Paul Hamilton, Senior Director, Cloud & IT Transformation, Cisco Services Kiran Inampudi, Global SP Segment Lead, Cloud & IT Transformation, Cisco Services Alex Foster,
More informationOPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0
OPEN DATA CENTER ALLIANCE USAGE MODEL: Cloud Maturity Model Rev. 2.0 Table of Contents Legal Notice...3 Executive Summary...4 Overview of the Cloud Maturity Model...5 Description of the Cloud Maturity
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
More informationCompute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of
Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of the enterprise consumer Legal Notice This CIaaS: Recommendations
More informationVALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
More informationThe role of standards in driving cloud computing adoption
The role of standards in driving cloud computing adoption The emerging era of cloud computing The world of computing is undergoing a radical shift, from a product focus to a service orientation, as companies
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationCloud Computing: Legal Risks and Best Practices
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationVMware vcloud Powered Services
SOLUTION OVERVIEW VMware vcloud Powered Services VMware-Compatible Clouds for a Broad Array of Business Needs Caught between shrinking resources and growing business needs, organizations are looking to
More informationPublic Cloud Service Definition
Public Version 1.5 TECHNICAL WHITE PAPER Table Of Contents Introduction... 3 Enterprise Hybrid Cloud... 3 Public Cloud.... 4 VMware vcloud Datacenter Services.... 4 Target Markets and Use Cases.... 4 Challenges
More informationSoftware-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
More informationMayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation
Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup
More informationMcAfee Application Control / Change Control Administration Intel Security Education Services Administration Course
McAfee Application Control / Change Control Administration Intel Security Education Services Administration Course The McAfee University Application Control / Change Control Administration course enables
More informationAnnex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
More informationCopyright 2015 EMC Corporation. All rights reserved. 1
Copyright 2015 EMC Corporation. All rights reserved. 1 CLOUD READY DATA PROTECTION BUILT FOR SOFTWARE DEFINED DATACENTER YATIN PATIL Copyright 2015 EMC Corporation. All rights reserved. 2 TWEET US! Are
More informationCloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
More informationEXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationOWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
More informationManaging Cloud Computing Services in the Enterprise
WHITE PAPER Managing Cloud Computing Services in the Enterprise THE VALUE OF A SINGLE, INTEGRATED CLOUD MANAGEMENT PLATFORM Managing Cloud Computing Services in the Enterprise 2 How does your organization
More informationCloud Computing and HIPAA Privacy and Security
Cloud Computing and HIPAA Privacy and Security This is just one example of the many online resources Practical Law Company offers. Christine A. Williams, Perkins Coie LLP, with PLC Employee Benefits &
More informationOVERVIEW Cloud Deployment Services
OVERVIEW Cloud Deployment Services Audience This document is intended for those involved in planning, defining, designing, and providing cloud services to consumers. The intended audience includes the
More informationRS MDM. Integration Guide. Riversand
RS MDM 2009 Integration Guide This document provides the details about RS MDMCenter integration module and provides details about the overall architecture and principles of integration with the system.
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationCloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing
More informationSOLUTION WHITE PAPER. BMC Manages the Full Service Stack on Secure Multi-tenant Architecture
SOLUTION WHITE PAPER BMC Manages the Full Service Stack on Secure Multi-tenant Architecture Table of Contents Introduction................................................... 1 Secure Multi-tenancy Architecture...................................
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More information50x 2020 40 Zettabytes*
IBM Global Technology Services How to integrate cloud-based disaster recovery into your existing business continuity plans Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency
More informationA white paper from Fordway on CLOUD COMPUTING. Why private cloud should be your first step on the cloud computing journey - and how to get there
A white paper from Fordway on CLOUD COMPUTING Why private cloud should be your first step on the cloud computing journey - and how to get there PRIVATE CLOUD WHITE PAPER January 2012 www.fordway.com Page
More informationService Management-as-a-Service for Hybrid Cloud
Sep 23 2015 Service Management-as-a-Service for Hybrid Cloud Rajesh Jaluka Distinguished Engineer Global Technology Services Agenda Service Management Integration Challenges in Hybrid Cloud Environment
More informationOPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0
OPEN DATA CENTER ALLIANCE MASTER USAGE Model: Scale-Out Storage Rev. 1.0 Table of Contents Legal Notice...3 Executive Summary...4 Purpose...5 Understanding the Scale-Out Storage Model...6 Common Scale-Out
More informationBackup to the Cloud Service Definition
Backup to the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Backup to the Cloud service to enable organisations
More informationBecoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
More informationIBM Managed Security Services (Cloud Computing) hosted mobile device security management
IBM Managed Security Services (Cloud Computing) hosted mobile device security management Z125-8855-00 11-2011 Page 1 of 15 Table of Contents 1. Scope of Services... 3 2. Definitions... 3 3. Services...
More informationLEGAL ISSUES IN CLOUD COMPUTING
LEGAL ISSUES IN CLOUD COMPUTING RITAMBHARA AGRAWAL INTELLIGERE 1 CLOUD COMPUTING Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing
More informationHP Service Manager software
HP Service Manager software The HP next generation IT Service Management solution is the industry leading consolidated IT service desk. Brochure HP Service Manager: Setting the standard for IT Service
More informationData Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
More informationDisclosure Requirements of CloudCode Software
DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationAdopting Cloud Computing with a RISK Mitigation Strategy
Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines
More informationBEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use
Product Data Sheet BEA AquaLogic Integrator Agile integration for the Enterprise Build, Connect, Re-use BEA AquaLogic Integrator delivers the best way for IT to integrate, deploy, connect and manage process-driven
More informationSafeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
More informationManaging Cloud Services in the Enterprise The Value of Cloud Services Brokers
Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate
More informationInvitation to OASIS CAMP A Cirrus View (high level)
Invitation to OASIS CAMP A Cirrus View (high level) Charlie Tupitza, JumpSoft CAMP Technical Committee Member 10 October 2012 Charles.Tupitza@JumpSoft.net 703 989-8777 Cloud Application Management for
More information