Cloud Security Prac0ces and Principles
|
|
- Beatrix Stephens
- 8 years ago
- Views:
Transcription
1 Cloud Security Prac0ces and Principles Joan Pepin Director of Security
2 The Public Cloud Is:! An opportunity to simplify and increase security! Misunderstood! A vic0m of FUD Take 0me to examine it? Or DOOM?! Fearing what you do not understand is reasonable from an IT perspec9ve. But this is worth the 9me to understand. 2
3 The Old World! You have people on your staff who know way too much about wamage, and BTUs and rack density and how raised, exactly, the floor needs to be! So you think in certain ways: Hardware rotates and depreciates on a fixed 36- month cycle This is the mix of RAM, Disk, and CPU I have to work with This is how many wams we've got And this is the bandwidth capacity of the datacenter 3
4 Where Does This Leave You?! Trying to insert yourself in the process run by ping power and pipe guys! Dealing with span ports! Dealing with legacy compromises and legacy infrastructure that no longer matches your security requirements! And probably never did! We do lots of things in this business where we transit public space, and we take steps to secure that transit 4
5 A New World! Cloud compu0ng is truly a different paradigm with different rules and different logic The Old World Precise Control Scripts and Capacity Planning Spreadsheets 36- month Refresh Cycles Physical Control Cloud Compu9ng Sta0s0cs Feedback Loops/Auto- scaling Bids for Spot Instances Process, Automa0on, Design 5
6 But The FUD!! What security professionals are looking for is control! You can achieve control in the cloud, by playing a new game! The highest form of generalship is to thwart your enemies plans. Sun Tzu 6
7 What s In It For Me?! Not needing to regularly review firewall rule ordering as part of your opera0onal process, as one example! Instrument! Gather data! Design your rules! Iterate from the whiteboard! Not a live firewall console! For instance J 7
8 Design Design Design! In the cloud you have the tools to design, implement and refine your policies, controls and enforcement in a centralized fashion! Your code is your infrastructure! Your SDLC can now be brought to bear on areas tradi0onally out- of- sync with your security posture! Scale to massive sizes without having to worry about things like firewall rule ordering, op0miza0on or audit as part of your opera0onal cycle! Your security will become fractal, and embedded in every layer of your system. 8
9 The Primi0ves! What are your primi0ves?! I/O, Memory, Storage, Compute, and Code! Data At Rest, in Mo0on, and in Use! Access control Monitoring tools, third- party apps, troubleshoo0ng tools! Interfaces/APIs Clean, Minimal, Authen0cated, Validated 9
10 Minimalism! Each of those must be thought of on its own and in combina0on with the other components it interacts with! It is both that simple and that complicated. 10
11 Understand Everything! That simplicity gives you the power to understand everything! Every protocol! Every interface! If you want to achieve true and full Default Deny on everything, everywhere, this is where it starts! Understand your state changes! Bring that understanding to bear through development! And you can amain Emergent Security 11
12 With Automa0on, All Things are Possible! Your en0re infrastructure is your code- base! There is no gap between the opera0onal physical layer and the sojware that runs on top of it.! Machine and network failures are just excep0ons to be caught and handled! Your infrastructure can now evolve and support your system! because it is the system 12
13 Like What?! Register all of your VMs services, IPs, and ports! Automa0cally build firewall policies based on that! Re- build and distribute ssl/tls keys! Whenever you want! HIDS, HFW and File Integrity Checkers configured with instance tags! Unit test everything! Allowing security to keep up with your product 13
14 Encrypt It All! You know like we do on the Internet ;)! At rest and in mo0on.! Any data that is ephemeral can be kept on encrypted ephemeral storage with keys can simply be kept in memory. When the instance dies, the key dies with it.! Longer- lived data should be stored away from the keys that secure it If the data is par0cularly sensi0ve, Securely wipe the data before spinning down the disk and giving it back to the pool 14
15 Default Deny Nirvana! Allow only expected connec0ons! Front- end web- applica0ons need to accept connec0ons from anyone in the world (but it's more likely only your load balancer does)! As part of your infrastructure as sojware design Know what needs to talk to what on what port and under what circumstances, And only allow that, everything else is bit- bucketed and alerted on.! In sojware- driven cloud- based deployments, there is no longer any excuse for any other way of doing it 15
16 Conclusion! The public u0lity model of cloud compu0ng brings substan0al advantages of scalability and automa0on which can be leveraged by informa0on security professionals! As a result, a more secure service can be built on the public cloud for less investment than in a tradi0onal data center! Just remember your fundamentals! And always shoot the messenger 16
17 Q&A and Next Steps! Download our white paper, Building Secure Services in the Cloud: Register for Sumo Logic Free Contact or 17
Building Secure Services in the Cloud
Building Secure Services in the Cloud A Sumo Logic White Paper Many security professionals are skeptical about cloud-based services and infrastructure. But it s a skepticism we ve seen before, when a new
More informationA Sumo Logic White Paper. The New Mindset for Building Secure Services in the Cloud. By Joan Pepin, VP Security & CISO at Sumo Logic
A Sumo Logic White Paper The New Mindset for Building Secure Services in the Cloud By Joan Pepin, VP Security & CISO at Sumo Logic Cloud computing is reshaping not only the technology landscape, but the
More informationData Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
More informationEmail/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
More informationUptime Infrastructure Monitor. Installation Guide
Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationPCI-DSS Penetration Testing
PCI-DSS Penetration Testing Adam Goslin, Co-Founder High Bit Security May 10, 2011 About High Bit Security High Bit helps companies obtain or maintain their PCI compliance (Level 1 through Level 4 compliance)
More informationCSE/ISE 311: Systems Administra5on Network Firewalls
Network Firewalls Don Porter Firewalls: An Essen2al Tool Previous Lectures: Every service on a system visible to the outside world is a poten2al a>ack vector Observa2ons: It is really hard to police every
More informationbenefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al
1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationEverything You Need to Know about Cloud BI. Freek Kamst
Everything You Need to Know about Cloud BI Freek Kamst Business Analy2cs Insight, Bussum June 10th, 2014 What s it all about? Has anything changed in the world of BI? Is Cloud Compu2ng a Hype or here to
More informationKaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
More informationHow To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
More informationEnterprise Data Center Networks
Enterprise Data Center Networks Isabelle Guis Big Switch Networks Vice President of Outbound Marketing ONF Market Education Committee Chair 1 This Session Objectives Leave with an understanding of Data
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationDedicated or Cloud Servers
100TB.com Dedicated or Cloud Servers which should you choose? Dedicated or cloud servers which should you choose? Introduction For the past few years, the primary focus for much of the hosting industry
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationHow Solace Message Routers Reduce the Cost of IT Infrastructure
How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT
More informationWindows Admins... & Long-term capacity planning... do the two go together?
Windows Admins... & Long-term capacity planning... do the two go together? Carl Stanfield EMC Australia Capacity management requires a few minutes of your day to crunch some numbers. The results are priceless
More informationBefore and After Series. Data Center Migrations. Data Center Migrations with Legacy Infrastructure
Before and After Series Data Center Migrations SimpliVity's revolutionary hyperconverged platform based on x86 hardware and VMware hypervisor technology, abstracts data from its underlying hardware to
More informationDeployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
More informationA Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
More informationOracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
More informationComprehensive Monitoring of VMware vsphere ESX & ESXi Environments
Comprehensive Monitoring of VMware vsphere ESX & ESXi Environments Table of Contents Overview...3 Monitoring VMware vsphere ESX & ESXi Virtual Environment...4 Monitoring using Hypervisor Integration...5
More informationW H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers
W H I T E P A P E R : T E C H N I C A L Understanding and Configuring Symantec Endpoint Protection Group Update Providers Martial Richard, Technical Field Enablement Manager Table of Contents Content Introduction...
More informationAuditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
More informationStorgrid EFS Access all of your business information securely from any device
Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent
More informationSophos Ltd. All rights reserved.
Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to
More informationTHE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
More informationReverse Proxy Three Myths Busted
Reverse Proxy Three Myths Busted Discover the real facts about how reverse proxy enables enhanced security and IT efficiency. Written by Joe Campbell, Principal Solutions Architect, Dell Software Abstract
More informationWHITE PAPER. Data Center Fabrics. Why the Right Choice is so Important to Your Business
WHITE PAPER Data Center Fabrics Why the Right Choice is so Important to Your Business Introduction Data center fabrics are emerging as the preferred architecture for next-generation virtualized data centers,
More informationCUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com
` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationWhite Paper. True Business Cloud. You Know You Want It. By Doug Barney, Executive Editor Cloud Computing Magazine by TMC
White Paper True Business Cloud You Know You Want It By Doug Barney, Executive Editor Cloud Computing Magazine by TMC SMBs have the most to gain from the cloud and moving core applications to it. But it
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationSECURELINK.COM REMOTE SUPPORT NETWORK
REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,
More informationServer & Application Monitor
Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich
More informationCloud Computing For Bioinformatics
Cloud Computing For Bioinformatics Cloud Computing: what is it? Cloud Computing is a distributed infrastructure where resources, software, and data are provided in an on-demand fashion. Cloud Computing
More informationCan Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?
Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for
More informationBackup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey
Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning Brien M. Posey Introduction There usually isn t anything overly complicated about backing up a physical datacenter. While it s true
More informationBuilding Private & Hybrid Cloud Solutions
Solution Brief: Building Private & Hybrid Cloud Solutions WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction When most
More informationProject Documentation
Project Documentation Class: ISYS 567 Internship Instructor: Prof. Verma Students: Brandon Lai Pascal Schuele 1/20 Table of Contents 1.) Introduction to Cloud Computing... 3 2.) Public vs. Private Cloud...
More informationDesigning & Managing Reliable IT Services
Solution Brief: Designing & Managing Reliable IT Services WITH EGENERA CLOUD SUITE SOFTWARE Egenera, Inc. 80 Central St. Boxborough, MA 01719 Phone: 978.206.6300 www.egenera.com Introduction In today s
More informationGetting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT
Getting Real with Policies for Software Defined Infrastructure Manish Dave Principal Engineer, Intel IT Manish Dave, Principal Engineer, Intel IT Network Security Architect @ Intel IT 15+ years of experience
More informationNetwork Services in the SDN Data Center
Network Services in the SDN Center SDN as a Network Service Enablement Platform Whitepaper SHARE THIS WHITEPAPER Executive Summary While interest about OpenFlow and SDN has increased throughout the tech
More informationCitrix XenServer Backups with Xen & Now by SEP WWW.SEPUSA.COM
Citrix XenServer Backups with Xen & Now by SEP WWW.SEPUSA.COM Contents INTRODUCTION AND OVERVIEW... 3 XEN SERVER BACKUP METHODS... 3 OFFLINE BACKUP... 4 ONLINE LIVE MEMORY BACKUP... 4 ONLINE QUIESCED BACKUP...
More informationAmazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
More informationAbout the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
More informationNetworks that virtualization
Networks that know virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public clouds,
More informationThe Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum
The Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum Chris Howard Vice President, Nutanix Federal Phil Ditzel Senior SE Public Cloud Let s start with the definition NIST s Defini-on: A model
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationDell Enterprise Mobility Management
Dell Enterprise Mobility Management Comprehensive mobile enablement solution enables your unique mobility/byod strategy Secure the business. Empower the user. It s no secret that employees who use mobile
More informationAn Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC ahmed.gamal.eldin@itida.gov.eg
More informationCloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationConstructing your Private Cloud Strategies for IT Administrators & Decision Makers
Constructing your Private Cloud Strategies for IT Administrators & Decision Makers Greg Shields Senior Partner and Principal Technologist, Concentrated Technology, LLC http://concentratedtech.com Virtualization
More informationCaaS SMB Pricing Guide
Computing as a Service, SMB (CaaS SMB) is a flexible, high-performance, pay-as-you-go, computing-on-demand service from Verizon. The service is ideal for smaller businesses; individual departments; rapid
More informationChapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
More informationSharePoint Capacity Planning Balancing Organiza,onal Requirements with Performance and Cost
SharePoint Capacity Planning Balancing Organiza,onal Requirements with Performance and Cost Kirk Devore / J.D. Wade SharePoint Consultants Horizons Consul;ng Agenda Expecta;ons Defining SharePoint Capacity
More information5nine Virtual Firewall 2.1 for Microsoft Hyper-V
KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationPALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa jsherlow@paloaltonetworks.com @jsherlow Palo Alto Networks at a Glance Corporate Highlights
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationThe Top 20 VMware Performance Metrics You Should Care About
The Top 20 VMware Performance Metrics You Should Care About Why you can t ignore them and how they can help you find and avoid problems. WHITEPAPER BY ALEX ROSEMBLAT Table of Contents Introduction... 3
More informationGlobal Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
More informationApplication Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
More informationMcAfee Enterprise Mobility Management 12.0. Performance and Scalability Guide
McAfee Enterprise Mobility Management 12.0 Performance and Scalability Guide Contents Purpose... 1 Executive Summary... 1 Testing Process... 1 Test Scenarios... 2 Scenario 1 Basic Provisioning and Email
More informationData Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
More informationIO Visor: Programmable and Flexible Data Plane for Datacenter s I/O
IO Visor: Programmable and Flexible Data Plane for Datacenter s I/O LINUX FOUNDATION COLLABORATIVE PROJECTS Introduction Introduction As an industry, we have been building datacenter infrastructure for
More informationMicrosoft Exchange Solutions on VMware
Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...
More informationBuilding Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
More informationx10 questions - and answers - about cloud computing
x10 questions - and answers - about cloud computing But first - Who am I? 1. What is cloud computing? "Cloud compu+ng is a generic term used to describe the disrup+ve transforma+on in I.T. towards a service
More informationCompetitive Comparison Between Microsoft and VMware Cloud Computing Solutions
Competitive Comparison Between Microsoft and VMware Cloud Computing Solutions Introduction As organizations evaluate how cloud computing can help them improve business agility, reduce management complexity
More informationSystem Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana
2013 System Center 2012 Suite SYSTEM CENTER 2012 SUITE BSD BİLGİSAYAR Adana Configure and manage apps, services, computers, and VMs... 1 Operations Manager... 3 Configuration Manager... 4 Endpoint Protection...
More informationFrom Rivals to BFF: WAF & VA Unite OWASP 07.23.2009. The OWASP Foundation http://www.owasp.org
From Rivals to BFF: WAF & VA Unite 07.23.2009 Brian Contos, Chief Security Strategist Imperva Inc. brian.contos@imperva.com +1 (650) 832.6054 Copyright The Foundation Permission is granted to copy, distribute
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationUserLock advanced documentation
UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file
More informationSDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar
SDN- based Mobile Networking for Cellular Operators Seil Jeon, Carlos Guimaraes, Rui L. Aguiar Background The data explosion currently we re facing with has a serious impact on current cellular networks
More informationNetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK 1. ThinPoint solution to Access your Own PC You require your business users to access their own PC in the office remotely
More informationQlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
More informationReceptionist-Small Business Administrator guide
Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,
More informationBusiness Startups - Advantages of Using Automation
CLOUD AUTOMATION How Cloud Automation Can Help You Scale Your IT Services TABLE OF CONTENTS Introduction 03 Business Benefits 07 Administrator Benefits 11 Technical Considerations 14 Conclusion 17 2 INTRODUCTION
More informationNetworks that know data center virtualization
Networks that know data center virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public
More informationIOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
More informationGetting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
More informationUniversity of Utah WAN Firewall Presenta6on
University of Utah WAN Firewall Presenta6on Raising Awareness of our WAN Firewall Issues This document is for internal University of Utah use only. 4 Key Internet Firewall Ques6ons Who do we serve and
More informationDNS, DNSSEC and DDOS. Geoff Huston APNIC February 2014
DNS, DNSSEC and DDOS Geoff Huston APNIC February 2014 The Evolu3on of Evil It used to be that they sent evil packets to their chosen vic3m but this exposed the abacker, and limited the damage they could
More informationThe VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5
The VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5 R E F E R E N C E A R C H I T E C T U R E B R I E F Table of Contents Overview...................................................................
More informationSoftware defined Storage The next generation of Storage virtualization
Software defined Storage The next generation of Storage virtualization November 2013 Robin Keupers SNIA Europe Dell Software defined not that well defined. Chaos! To help clarify the market and reduce
More informationOptimizing Data Center Networks for Cloud Computing
PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,
More informationZadara Storage Cloud A whitepaper. @ZadaraStorage
Zadara Storage Cloud A whitepaper @ZadaraStorage Zadara delivers two solutions to its customers: On- premises storage arrays Storage as a service from 31 locations globally (and counting) Some Zadara customers
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationCitrix XenDesktop Backups with Xen & Now by SEP
Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5
More informationUsing New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationAmazon EC2 XenApp Scalability Analysis
WHITE PAPER Citrix XenApp Amazon EC2 XenApp Scalability Analysis www.citrix.com Table of Contents Introduction...3 Results Summary...3 Detailed Results...4 Methods of Determining Results...4 Amazon EC2
More informationEasily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS
Easily Managing User Accounts on Your Cloud Servers How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS How Did We Get Here? How the move to IaaS has created problems
More informationVMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking
F5 White Paper VMware DRS: Why You Still Need Assured Application Delivery and Application Delivery Networking VMware Infrastructure products provide the next generation virtual platform for the new data
More information