Nutzung der BSI SOA Security Platform secrt

Size: px
Start display at page:

Download "Nutzung der BSI SOA Security Platform secrt"

Transcription

1 Nutzung der BSI SOA Platform secrt Dr. Bruno Quint CORISECIO GmbH. Uhlandstr. 9. D Darmstadt. Germany.

2 Company CORISECIO Headquarter Darmstadt Germany Corporate Information CORISECIO provides Open Source secrt the securityruntime Published 2010 by BSI Eclipse Runtime Project - SSF secrt -> pronounce it { \ˈsē-krət\ } Platform for Solutions: SOA Mobile Portal Data

3 secrt The Open Platform for Solutions Portal Mobile Data Data Mobile Portal SOA SOA secrt secrtthe Open Source securityruntime

4 secrt The Open Platform secrt- The Open Source securityruntime from BSI Services Key Management Modeling download: secrt.corisecio.com

5 SOA Solutions SOA Automation BPEL Modeling Easy Implementation Of Services

6 Mobile Solutions PKI based for BlackBerry Mobile PKI For Smartphones OTA Key Rollout

7 Portal Solutions Certified for SAP Authentication & SSO AntiVirus WAF DLP

8 Data Solutions DBMS Encryption for Data in the Cloud Control Access for DBMS

9 secrt - THE SECURITY PLATFORM

10 secrt - Services Entity Management Administration of identities, rights and roles. Integration with existing IMS, LDAP etc.. Key Management Services Cryptograpy Cryptographic functions. Exchangeable libraries (Open Source and commercial solutions) Public Key Infrastructure (PKI) Roll-Out and Key Management and CA functions.

11 secrt - Automation Services BPEL Engine Usage of BPEL for dynamice security processes Workflow Editor Workflow Editor, Workflow definition of security processes Automation Services Policy Service Interpretation of Rules Workflow Engine Automation for linear security processes

12 secrt - Infrastructure Services Logging Logging infrastructure on transaction level. WSDL API Communication API for external connections Admin Console Console for basic administration Infrastructure Services Adapter Loader Interface for OSGI-Framework CORcore CORISECIO basic components Basic Infrastructure Abstraction Layer for DB and File access OSGI Framework Infrastructure for the RunTime Entity Import Simple Entity Management

13 secrt - Management Services Rules Distribution of Models and Infrastructure Administration Administrator management Check Check on Adapter Load Management Services RCP / Webfrontend Administrator GUI Repository Secure repository for persistent data Configuration Manager Configuration and settings

14 secrt Platform Administration Management Repository Rules Generator Adapter Manager Modelling Bouncy Castle Wrapper Cryptography Entity Management Key Management Logging Service Bus Automation Workflow Editor Workflow Engine Policy Service BPEL Engine CORcore OSGi - Framework Admin Console Infrastructure Configuration Manager Adapter Loader Network Communucation Basic Infrastructure secrt Broker mrt Enterprise Package Check WSDL API Extended SOA Solutions Enterprise Solutions SOA WebFrontEnd RCP Data Solutions Portal Solutions Mobile Solutions

15 secrt the basis for Automation Connector SOA secrt Local Services: secrt Proxy or Service (Applications stay unmodified Policy Enforcement Point Virtual Directory Services Broker LDAP SOA mrt secrt Central Services: Administration Policy Decision Point Modeling Orchestration Integration in existing security solutions

16 Data Solutions DBMS Encryption for Data in the Cloud Control Access for DBMS

17 Leer Runtime Data Portal SOA Mobile Data DB-RT Encryption DB-Offline Encryption Document- Encryption DB-Access Control PI-DB secrt CORISECIO Data Solutions

18 DATA SECURITY IN THE CLOUD DB-ACCESS CONTROL

19 DBMS in Private /Public Clouds Data Center/Private Cloud today Off- and Near-Shoring of database administration Cloud Computing Managed Administration Challenge Who has access to which data? Which data are underlying export restrictions? Which sensitive data are accessible?

20 Basic Concept DB-Access CTRL User/ Application Domain ODBC / OCI SQL Parser Company Authentication Authorization Connector Rules Standard ODBC/ OCI Database Driver Administration Broker Database Repository Private/Public Cloud

21 Access Control for DBMS Content Solution to control the access for DB queries Transparent proxy for SQL Parsing ODBC/OCI Interfaces Support Oracle, MS SQL, MySQL and others Authentication Company LDAP, Metadirectory Authorization Whitelist Schemes, Tables, Fields Unauthorized access Empty result Replaced values

22 DB Access CTRL with Authentication User/ Application Company Authentication (Remote Auth) Authorization (RemoteDir) Active Directory Domain ODBC / OCI Authentication Authorization with named user Connector Rules Standard ODBC/ OCI Database Driver Administration Broker Database Repository Private/Public Cloud

23 Customer Scenario 1 DB ACCESS CONTENT BASED

24 Customer Scenario Content Admin- Meier HR- Mueller Owner = DWH_Secret DWH Gehalt Adresse MA ORACLE User: DWH_Secret

25 Customer Scenario Requested Process for Mueller Admin- Meier HR- Mueller DWH Gehalt Adresse MA ORACLE User:DWH_Secret

26 Customer Scenario Requested Process for Admin Admin- Meier HR- Mueller DWH Gehalt Adresse MA ORACLE User:DWH_Secret

27 Customer Scenario Admin- Meier SQL Plus HR- Mueller Run Policy: Authentication Authorisation Parsing SQL-Statements PI-ODBC Userid/PW DB_Secret/PW Connector Gehalt Adresse MA ORACLE User:DWH_Secret DWH

28 Customer Scenario Admin- Meier SQL Plus HR- Mueller Run Policy: Authentication Authorisation Parsing SQL-Statements PI-ODBC User: Meier Connector User: DB_Secret Gehalt Adresse MA ORACLE User:DWH_Secret DWH

29 Customer Scenario Admin- Meier SQL Plus HR- Mueller Run Policy: Authentication Authorisation Parsing SQL-Statements PI-ODBC User: Mueller Connector User: DB_Secret Gehalt Adresse MA ORACLE User:DWH_Secret DWH

30 Customer Secnario 2 AUDIT COMPLIANT TRANSACTIONS

31 Customer Scenario DB Transactions Logging Audit Compliant Admin- Meier SQL Plus HR- Mueller Run Policy: Authentication Authorisation Report Parsing SQL-Statements PI-ODBC User: Meier Connector User: DWH_Secret ORACLE Report signa ture Gehalt Adresse MA User Transactions

32 SUMMARY

33 secrt The Platform for Solutions Automation for security processes RunTime Automatic Roll-Out Modeling instead of programming Reduced administration effort Automatic workflows High flexibility Investment protection for existing solutions

34 Summary DB-Access CTRL Controlling access of DBMS content Administrators Application and User Support of standard DBMS Oracle, MS SQL, MySQL etc. for confidential data Preventing non-permitted access and manipulation Meeting legal requirements Audit compliant Minimum implementation effort Proxy function solution based on secrt

35 Thank You! CORISECIO GmbH. Uhlandstr. 9. D Darmstadt. Germany.

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Frequently Asked Questions

Frequently Asked Questions Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Avoiding Web Services Chaos with WebSphere Service Registry and Repository

Avoiding Web Services Chaos with WebSphere Service Registry and Repository IBM Software Group Avoiding Web s Chaos with WebSphere Registry and Repository David Buchanan David Ben Buchanan J Briden Consulting IT Specialist Consulting IT IT Specialist WebSphere Software WebSphere

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Oracle SOA Suite Then and Now:

Oracle SOA Suite Then and Now: Oracle SOA Suite Then and Now: The Evolution from 10g to 11g Shane Goss Impac Services Agenda SOA Suite 11g New Features Highlight new features of SOA 11g Some products have added features and functionality

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

SharePoint Security. Dr. Bruno Quint CORISECIO - Open Source Security Solutions CORISECIO

SharePoint Security. Dr. Bruno Quint CORISECIO - Open Source Security Solutions CORISECIO SharePoint Security Dr. Bruno Quint - Open Source Security Solutions Why Encryption of Documents? Market Requirements Sensitive information has to get secured against loss, theft, or unauthorised disclosure.

More information

Oracle SOA Suite: The Evaluation from 10g to 11g

Oracle SOA Suite: The Evaluation from 10g to 11g KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete

More information

Kovaion Data Masking Solution

Kovaion Data Masking Solution Kovaion Data Masking Solution Date Email Website : Apr-2016 : info@kovaion.com : www.kovaion.com Kovaion Consulting DATA MASKING SOLUTION OVERVIEW Obfuscation of Sensitive Data Prevent data theft from

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

Creating a Strong Security Infrastructure for Exposing JBoss Services

Creating a Strong Security Infrastructure for Exposing JBoss Services Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products

More information

ActiveVOS Server Architecture. March 2009

ActiveVOS Server Architecture. March 2009 ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...

More information

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options

More information

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05

NCP Secure Enterprise Management for Windows OS. New Features version 1.03 to 2.05 What s New NCP Secure Enterprise Management for Windows OS New Features version 1.03 to 2.05 Disclaimer Considerable care has been taken in the preparation and publication of this document, errors in content,

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight

Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal kramgopal@fiberlink.com psegal@fiberlink.com www.maas360.com Why Mobile Applications are a Must? Rising

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Sisense. Product Highlights. www.sisense.com

Sisense. Product Highlights. www.sisense.com Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology Centrally Managed VPN fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

JBoss Data Services. Enabling Data as a Service with. Gnanaguru Sattanathan Twitter:@gnanagurus Website: bushorn.com

JBoss Data Services. Enabling Data as a Service with. Gnanaguru Sattanathan Twitter:@gnanagurus Website: bushorn.com 1 Enabling Data as a Service with JBoss Data Services Prajod Vettiyattil Twitter: @prajods Gnanaguru Sattanathan Twitter:@gnanagurus Website: bushorn.com 2 What this session is about v The why and what

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Top. Reasons Federal Government Agencies Select kiteworks by Accellion Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government

More information

Data Sheet. NCP Secure Enterprise Management. General description. Highlights

Data Sheet. NCP Secure Enterprise Management. General description. Highlights Data Sheet NCP Secure Enterprise Management General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access technology with integrated RADIUS server

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

Ensuring the Security of Your Company s Data & Identities. a best practices guide

Ensuring the Security of Your Company s Data & Identities. a best practices guide a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management

More information

Vanilla44 New Features

Vanilla44 New Features Vanilla 4.4 New Features Author: Contact: Patrick Beaucamp patrick.beaucamp@bpm-conseil.com www.bpm-conseil.com www.freeanalysis.fr Date: October 2013 Document: Vanilla44 New Features Vanilla Version 4.4

More information

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director

Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

enterprise professional expertise distilled

enterprise professional expertise distilled Oracle Information Integration, Migration, and Consolidation The definitive guide to information integration and migration in a heterogeneous world Use Oracle technologies and best practices to manage,

More information

Apache Syncope OpenSource IdM

Apache Syncope OpenSource IdM Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

ITG Software Engineering

ITG Software Engineering IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

What is ODBC. What is ODBC. 16 November Peter Smyth UK Data Service

What is ODBC. What is ODBC. 16 November Peter Smyth UK Data Service What is ODBC What is ODBC 16 November 2016 Peter Smyth UK Data Service Overview of this webinar Definition and background Why would we want to use ODBC What ODBC drivers are available Installing an ODBC

More information

Oracle Business Activity Monitoring 11g New Features

Oracle Business Activity Monitoring 11g New Features Oracle Business Activity Monitoring 11g New Features Gert Schüßler Principal Sales Consultant Oracle Deutschland GmbH Agenda Overview Architecture Enterprise Integration Framework

More information

Oracle Fusion Middleware 11g Release 1 IDM Suite

Oracle Fusion Middleware 11g Release 1 IDM Suite Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes

More information

CA Process Automation

CA Process Automation Communications Release 04.1.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Denodo Data Virtualization Security Architecture & Protocols

Denodo Data Virtualization Security Architecture & Protocols Denodo Data Virtualization Security Architecture & Protocols XLS Security Architecture & Protocols We include hereinafter a description of the security support in the Denodo Platform. The following diagram

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

MAM - Mobile Application Management

MAM - Mobile Application Management Page 1 About 1Mobility 1Mobility has successfully established itself as a global company, offering cloud based, internationalized and scalable Enterprise Mobility Management (EMM) solution that monitors,

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Description. Benefits. Requirements. Selection process. Duration

Description. Benefits. Requirements. Selection process. Duration PHP development Be part of a team that implements a web application displaying products from different affiliate platforms using their available API s. The application is developed using PhalconPHP framework

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

Pacific Gas and Electric Company. Ishaq Mohammed / Anil Saka Online and Middleware Application Operations

Pacific Gas and Electric Company. Ishaq Mohammed / Anil Saka Online and Middleware Application Operations Pacific Gas and Electric Company Ishaq Mohammed / Anil Saka Online and Middleware Application Operations Agenda Overview Challenges Solution Middleware Provisioning Use Cases PG&E s Provisioning Portal

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

WebSphere Training Outline

WebSphere Training Outline WEBSPHERE TRAINING WebSphere Training Outline WebSphere Platform Overview o WebSphere Product Categories o WebSphere Development, Presentation, Integration and Deployment Tools o WebSphere Application

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

Federated Identity- and Access Management for the Max-Planck Society

Federated Identity- and Access Management for the Max-Planck Society Federated Identity- and Access Management for the Max-Planck Society Organisational Aspects & Funding Prof. Dr. Ramin Yahyapour Christof Pohl, Andreas Ißleiber GWDG Gesellschaft für wissenschaftliche Datenverarbeitung

More information

The Netskope Active Platform

The Netskope Active Platform The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology

Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration

More information

CloudCERT (Testbed framework to exercise critical infrastructure protection)

CloudCERT (Testbed framework to exercise critical infrastructure protection) WP2. CONCEPTUAL MODELLING AND ARCHITECTURE CloudCERT (Testbed framework to exercise critical infrastructure protection) With the financial support of the Prevention, Preparedness and Consequence Management

More information

XpoLog Center Log Management Solution For ANY type of Network system, Security devices, Business applications

XpoLog Center Log Management Solution For ANY type of Network system, Security devices, Business applications XpoLog Center Log Management Solution For ANY type of Network system, Security devices, Business applications XpoLog Center is an Enterprise Log Analysis and Management Solution Analyst "Most enterprises

More information

Jitterbit Technical Overview : Microsoft Dynamics CRM

Jitterbit Technical Overview : Microsoft Dynamics CRM Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations

More information

G Cloud 6 CDG Service Definition for Forgerock Software Services

G Cloud 6 CDG Service Definition for Forgerock Software Services G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform

More information

Managed Encryption Service

Managed Encryption Service Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011 Encryption and Cryptography The use of encryption/decryption is as old as the art of communication.

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

Ikasan ESB Reference Architecture Review

Ikasan ESB Reference Architecture Review Ikasan ESB Reference Architecture Review EXECUTIVE SUMMARY This paper reviews the Ikasan Enterprise Integration Platform within the construct of a typical ESB Reference Architecture model showing Ikasan

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Deploying to WebSphere Process Server and WebSphere Enterprise Service Bus

Deploying to WebSphere Process Server and WebSphere Enterprise Service Bus Deploying to WebSphere Process Server and WebSphere Enterprise Service Bus Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 Unit objectives

More information

Intellicyber s Enterprise Integration and Application Tools

Intellicyber s Enterprise Integration and Application Tools Intellicyber s Enterprise Integration and Application Tools The IDX product suite provides Intellicyber s customers with cost effective, flexible and functional products that provide integration and visibility

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

Market Challenges Business Drivers

Market Challenges Business Drivers VeriCentre 3.0 Market Challenges Business Drivers Inability to efficiently or effectively manage mass updates to install base High support costs associated with application rollouts Incomplete download

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

MS 10978A Introduction to Azure for Developers

MS 10978A Introduction to Azure for Developers MS 10978A Introduction to Azure for Developers Description: Days: 5 Prerequisites: This course offers students the opportunity to learn about Microsoft Azure development by taking an existing ASP.NET MVC

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial

More information

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,

More information

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime

GO!es MOBILE. YOUR Enterprise. The Challenge. The Solution. Mobilise Your Services Reach Anybody, Anywhere, Anytime YOUR Enterprise GO!es MOBILE The Challenge Mobile devices are the latest and hottest channel for m- services delivery and mobile marketing campaigns. Today s enterprises are deploying consumer-oriented

More information

Acknowledgments. p. 55

Acknowledgments. p. 55 Preface Acknowledgments About the Author Introduction p. 1 IBM SOA Foundation p. 2 Service Design and Service Creation p. 2 Service Integration p. 3 Service Connectivity p. 5 Service Security and Management

More information

Simplify Identity Management with the CA Identity Suite

Simplify Identity Management with the CA Identity Suite SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical

More information

Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer

Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer Automated Data Ingestion Bernhard Disselhoff Enterprise Sales Engineer Agenda Pentaho Overview Templated dynamic ETL workflows Pentaho Data Integration (PDI) Use Cases Pentaho Overview Overview What we

More information

LSC @ LDAPCON. 2011. Sébastien Bahloul

LSC @ LDAPCON. 2011. Sébastien Bahloul LSC @ LDAPCON. 2011 Sébastien Bahloul About me Developer and software architect 10 years experience in IAM Recently hired as product manager by a French security editor, Dictao, providing : personal and

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

ENT104: Uncovered! Lotus Domino Connector for PeopleSoft

ENT104: Uncovered! Lotus Domino Connector for PeopleSoft ENT104: Uncovered! Lotus Domino Connector for PeopleSoft Lauren Wendel, Product Manager, Lotus Jim Shea, Solutions Specialist, Transaction Information Systems Agenda Lotus Domino and ERP Integration Lotus

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

POTENTIAL DHH TECHNICAL ARCHITECTURE

POTENTIAL DHH TECHNICAL ARCHITECTURE POTENTIAL DHH TECHNICAL ARCHITECTURE SPECIFICALLY FOR CONSIDERATION REGARDING IMPLEMENTATIONS OF MEDS AND MMIS.NET, Java, Dynamics, SharePoint, ColdFusion, etc. BUSINESS APPLICATIONS PLATFORM GOVERNANCE

More information

IBM Cloud Manager with OpenStack

IBM Cloud Manager with OpenStack IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta cloudbta@us.ibm.com Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

Quick start. A project with SpagoBI 3.x

Quick start. A project with SpagoBI 3.x Quick start. A project with SpagoBI 3.x Summary: 1 SPAGOBI...2 2 SOFTWARE DOWNLOAD...4 3 SOFTWARE INSTALLATION AND CONFIGURATION...5 3.1 Installing SpagoBI Server...5 3.2Installing SpagoBI Studio and Meta...6

More information

CA Service Desk Manager Release 12.5 Certification Matrix

CA Service Desk Manager Release 12.5 Certification Matrix CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating

More information

ActiveVOS Clustering with JBoss

ActiveVOS Clustering with JBoss Clustering with JBoss Technical Note Version 1.2 29 December 2011 2011 Active Endpoints Inc. is a trademark of Active Endpoints, Inc. All other company and product names are the property of their respective

More information

Cloud Services Catalog with Epsilon

Cloud Services Catalog with Epsilon Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these

More information

MS 20487A Developing Windows Azure and Web Services

MS 20487A Developing Windows Azure and Web Services MS 20487A Developing Windows Azure and Web Services Description: Days: 5 Prerequisites: In this course, students will learn how to design and develop services that access local and remote data from various

More information

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration Websense Data Security Suite and Cyber-Ark Inter-Business Vault The Power of Integration Websense Data Security Suite Websense Data Security Suite is a leading solution to prevent information leaks; be

More information