A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership

Size: px
Start display at page:

Download "A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership"

Transcription

1 A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership «Applied Research Center for Computer Networks» Moscow, Russia

2 Traditionally IT infrastructure can be presented as a connected graph GG tt = VV tt, EE tt, where VV tt IT components, EE tt interactions. We also can introduce a two kinds of topology, assigning to every host: a risk, i.e. L 1 is a measure, a kind of a norm reflecting a probability to get unauthorized access a value of data a host processes, similarly we denote it as L 2, a measure of data category

3 DMZ Back office Sharepoint SCCM Internet Mail Server RDBMS Data Center SCADA HMI HMI Equipment Operational DW segment HMI MES PLM DSC Controllers, sensors, actuators, equipment PLC Sensors

4 The norm of L 1 representing a scalar risk. A given threshold defines a subset V 1 of components. We can assume those components have got heightened risk of unsafe impact. A threshold applied to V and L 2 defines a subset V 2 of hosts or components containing valuable information needed to be protected.

5 We determine the system architecture as secure when there are no direct interactions between V 1 and V 2 elements. If there is a need in such interactions then we have to put an interface called SecS (Security Server). The Security Server is both to lower a risk of hazard effect on valuable hosts and to prevent of rising value level for risky hosts. SDN allows to recalculate norms mentioned above and to customize configurations in order to keep the architecture secure

6 It s really hard and expensive to build absolutely or assured secure architecture. As an example of systems with different levels of security we consider a PC. Also we assume the PC runs under a hypervisor with its manager and two virtual machines. A virtual machine VM1 has connected with Internet, and the other VM2 is not allowed to connect to Internet. A user can work with his confidential data on a VM2 and has to switch to VM1 in order to send these packages. Thus we can state that just described architecture is more secure in comparison of a situation when both virtual machines have been accessed to Internet.

7 VM1 VM2 Admin.OS Hypervisor

8 Data (OLAP facts) accompany with markers to estimate a value, i.e. data category BI (OLAP) procedures recalculate aggregated value markers complying with predefined rules Control Plane applications administer an access to aggregated values on-line according to users credentials and his current activity profile These applications can use AI technology to realize such a flexible security policy to guard sensitive data

9 SDN controller applications solve the problems: To get an access to the object of analysis, i.e. data flow from a web-service to a client, e.g. by men-inthe-middle Applying AI tools to analyze data flow and make a decision on its content during the period defined by technological and business requirements

10 To protect data with a usage of insecure platforms in control and data planes: 1. Split data (e.g. a text) into fragments 2. Furnish every fragment with two cryptographically protected marks 3. Store crypto keys for these marks in control plane 4. Place fragments into randomly chosen memory slices 5. Controller swiftly restores a full text as a linked list according to requested fragment

11 ... Meta data Data Access Control Controller Service of distributed data storage Request to get data Data Fragment 1... Fragment N-1 Processing data Data Fragment N... Data storage systems Fragment 1 Fragment N Fragment N-1... Private cloud... DropBox SkyDrive

12 A secure usage of cryptography depends on the quality of isolating domain with cryptographic functions running Applying specialized high performance technical means in control plane to use dissimilar crypto keys in different data flows and to carry out bulk computations at instantiating cryptographic protection of high quality

13 Thank you Questions

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011

Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011 Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the

More information

Secure Cloud Computing with FlexCloud

Secure Cloud Computing with FlexCloud Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Secure Cloud Computing with FlexCloud Dr.-Ing. Anja Strunk DAAD Summer School CTDS 2012 Sousse, Tunisia 07.09.2012

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

Cloud Computing Architecture

Cloud Computing Architecture Cloud Computing Architecture 1 1. Workload distribution architecture Scale up/down the IT resources Distribute workload among IT resource evenly 2 A variant Cloud service consumer requests are sent to

More information

How To Manage A Virtualization Server

How To Manage A Virtualization Server Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Virtualized Networks based on System Virtualization

Virtualized Networks based on System Virtualization Virtualized Networks based on System Virtualization 2nd GI/ITG KuVS Workshop on Future Internet Karlsruhe 2008 Andreas Fischer, Andreas Berl, and Hermann de Meer Overview Network Virtualization System

More information

InHand Device Cloud Service DN 4.0 Quick Start Guide

InHand Device Cloud Service DN 4.0 Quick Start Guide InHand Device Cloud Service DN 4.0 Quick Start Guide Contents 1. Overview... 3 2. Device Manager... 4 2.1 Get an account by self-registration... 4 2.2 Remotely Configure Gateway and Upgrade firmware...

More information

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional

More information

Georgia College & State University

Georgia College & State University Georgia College & State University Milledgeville, GA Domain Name Service Procedures Domain Name Service Table of Contents TABLE OF REVISIONS... 3 SECTION 1: INTRODUCTION... 4 1.1 Scope and Objective...

More information

How To Build A Software Defined Data Center

How To Build A Software Defined Data Center Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

Unifying the Programmability of Cloud and Carrier Infrastructure

Unifying the Programmability of Cloud and Carrier Infrastructure Unifying the Programmability of Cloud and Carrier Infrastructure Mario Kind EWSDN 2014, Budapest UNIFY is co-funded by the European Commission DG CONNECT in FP7 We might only have to knit the future. Operator

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Making Data Security The Foundation Of Your Virtualization Infrastructure

Making Data Security The Foundation Of Your Virtualization Infrastructure Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges

More information

Appendix G: MAS and MSS reports

Appendix G: MAS and MSS reports Appendix G: MAS and MSS reports Administrators can use the Reporting Tool application to generate predefined Messaging Application Server (MAS) reports. These reports are useful for monitoring system usage,

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information

Saisei and Intel Maximizing WAN Bandwidth

Saisei and Intel Maximizing WAN Bandwidth Intel Network Builders Saisei Solution Brief Intel Xeon Processors Saisei and Intel Maximizing WAN Bandwidth Introduction Despite the increased capacity available on WAN links1, service providers and enterprises

More information

School Information Security and Privacy in the Cloud

School Information Security and Privacy in the Cloud School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The

More information

Server Scalability and High Availability

Server Scalability and High Availability Server Scalability and High Availability GO!Enterprise GLOBO Plc. March 2015 Copyright Notice and Usage Terms This guide is Copyright 2012 GLOBO. All Rights Reserved. Permission is granted to make and

More information

Turnkey Technologies- A Closer Look

Turnkey Technologies- A Closer Look Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look

More information

Virtualizing the SAN with Software Defined Storage Networks

Virtualizing the SAN with Software Defined Storage Networks Software Defined Storage Networks Virtualizing the SAN with Software Defined Storage Networks Introduction Data Center architects continue to face many challenges as they respond to increasing demands

More information

Security & Cloud Services IAN KAYNE

Security & Cloud Services IAN KAYNE Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents

More information

Trademark Notice. General Disclaimer

Trademark Notice. General Disclaimer Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment

More information

Cloud Computing Concept, Technology & Architecture

Cloud Computing Concept, Technology & Architecture Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助 Contents Technology mechanisms foundational to cloud platforms are covered,

More information

MS 20246C Monitoring and Operating a Private Cloud

MS 20246C Monitoring and Operating a Private Cloud MS 20246C Monitoring and Operating a Private Cloud Description: Days: 5 Prerequisites: This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

SDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI

SDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI SDN: A NEW PARADIGM Kireeti Kompella CTO, JDI AGENDA What is SDN? Definition and goals of SDN Analogy with Compute Virtualization Orchestration for Agile Provisioning Unified SDN What parts of the network

More information

Parallels Server 4 Bare Metal

Parallels Server 4 Bare Metal Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

PLUMgrid Open Networking Suite Service Insertion Architecture

PLUMgrid Open Networking Suite Service Insertion Architecture White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid

More information

1 Data Center Infrastructure Remote Monitoring

1 Data Center Infrastructure Remote Monitoring Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to

More information

About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.

About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course 10231B: Designing a Microsoft SharePoint 2010 Infrastructure OVERVIEW About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Audience Profile

More information

Module: Sharepoint Administrator

Module: Sharepoint Administrator Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam

Cloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software

More information

Monitoring and Operating a Private Cloud

Monitoring and Operating a Private Cloud Course 20246D: Monitoring and Operating a Private Cloud Page 1 of 7 Monitoring and Operating a Private Cloud Course 20246D: 4 days; Instructor-Led Introduction This course describes how to monitor and

More information

Designing a Microsoft SharePoint 2010 Infrastructure

Designing a Microsoft SharePoint 2010 Infrastructure Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the

More information

The Complete Performance Solution for Microsoft SQL Server

The Complete Performance Solution for Microsoft SQL Server The Complete Performance Solution for Microsoft SQL Server Powerful SSAS Performance Dashboard Innovative Workload and Bottleneck Profiling Capture of all Heavy MDX, XMLA and DMX Aggregation, Partition,

More information

VMUnify EC2 Gateway Guide

VMUnify EC2 Gateway Guide VMUnify EC2 Gateway Guide Version 2.8.1 Copyright Information This document is the exclusive property of Mindtree limited (Mindtree); the recipient agrees that they may not copy, transmit, use or disclose

More information

Simplifying the Transition to Virtualization TS17

Simplifying the Transition to Virtualization TS17 Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation

More information

Monitoring and Operating a Private Cloud

Monitoring and Operating a Private Cloud 3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Monitoring and Operating a Private Cloud Course: MS20246D

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions The Need to Be Innovative and Agile Bridging the IT/OT Divide Using Software-defined Solutions IT & OT Think & Behave Differently IT View We run the network OT is the wild, wild west OT doesn t understand

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Oracle Database Cloud Services OGh DBA & Middleware Day

Oracle Database Cloud Services OGh DBA & Middleware Day Oracle Database Cloud Services OGh DBA & Middleware Day Jan van Tiggelen Principal Sales Consultant Oracle Core Technology June 4th, 2015 Safe Harbor Statement The following is intended to outline our

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Securing the Virtualized Data Center With Next-Generation Firewalls

Securing the Virtualized Data Center With Next-Generation Firewalls Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks

More information

Secure information storage

Secure information storage Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van

More information

Software Defined Cloud Security Architectures

Software Defined Cloud Security Architectures Software Defined Cloud Security Architectures Roy Campbell October 8 th 2014, AFRL, Rome, NY Towards Assured Clouds: Our Approach Concerns Software Defined Networks Virtual Machines and Virtualization

More information

SCADA and Monitoring for Solar Energy Plant

SCADA and Monitoring for Solar Energy Plant SCADA and Monitoring for Solar Energy Plant Segment: Industry Country: Thailand Author: Ranon Satitpanyapan Products: NI LabVIEW with LabVIEW Real-Time Module crio Real-Time controller 8 slot with 16 current

More information

OpenFlow/SDN for IaaS Providers

OpenFlow/SDN for IaaS Providers OpenFlow/SDN for IaaS Providers Open Networking Summit 2011 Stanford University Paul Lappas & Ivan Batanov The Public Cloud Our Definition Shared infrastructure operated by a service provider where no

More information

A Look at the New Converged Data Center

A Look at the New Converged Data Center Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable

More information

Testing ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia mauro.femminella@unipg.

Testing ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia mauro.femminella@unipg. Testing ARES on the GTS framework: lesson learned and open issues Mauro Femminella University of Perugia mauro.femminella@unipg.it Outline What is ARES What testing on GTS? Our solution Performance evaluation

More information

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud

More information

Business Intelligence & Product Analytics

Business Intelligence & Product Analytics 2010 International Conference Business Intelligence & Product Analytics Rob McAveney www. 300 Brickstone Square Suite 904 Andover, MA 01810 [978] 691 8900 www. Copyright 2010 Aras All Rights Reserved.

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

The Internet of Everything:

The Internet of Everything: The Internet of Everything: Transforming O&G Industry in the new age Serhii Konovalov O&G Engineering Executive Amazing things Happen When You Connect the Unconnected March 12th, 2015 Why Internet of Everything?

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers

HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers A MIAREC WHITE PAPER HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers New revenue opportunities for service providers The hosted telephony market is becoming increasingly

More information

Designing a Microsoft SharePoint 2010 Infrastructure

Designing a Microsoft SharePoint 2010 Infrastructure Course Code: M10231 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Designing a Microsoft SharePoint 2010 Infrastructure Overview This five day ILT course teaches IT professionals to design and

More information

Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3. Reference IBM

Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3. Reference IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3 Reference IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3 Reference IBM Note Before using this information

More information

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 financial_nccoe@nist.gov This revision incorporates comments from the public. Page Use case 1 Comments

More information

Big Drivers for IT Security - 2013

Big Drivers for IT Security - 2013 Ending the information security arms race with end-to-end encryption Presenting: Jill Walsh October, 2013 Big Drivers for IT Security Consumerization of IT Device explosion; app explosion Employee demands

More information

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Course Description This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM Domain I: Feasibility Study - identify, scope and justify the automation project Task 1: Define the preliminary scope through currently

More information

Course 20346: Managing Office 365 Identities and Services

Course 20346: Managing Office 365 Identities and Services Course 20346: Managing Office 365 Identities and Services Overview About this course This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating,

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing

LICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing LICENSING MANAGEMENT SERIES A Guide to Assessing Windows Server Licensing July 2010 This document provides customers of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server

More information

How To Create A Cloud Based System For Aaas (Networking)

How To Create A Cloud Based System For Aaas (Networking) 1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on

More information

Course 20246: Monitoring and Operating a Private Cloud

Course 20246: Monitoring and Operating a Private Cloud Course 20246: Monitoring and Operating a Private Cloud Type:Course Audience(s):IT Professionals Technology:Microsoft System Center Level:300 This Revision:D Delivery method: Instructor-led (classroom)

More information

The BIg Picture. Dinsdag 17 september 2013

The BIg Picture. Dinsdag 17 september 2013 The BIg Picture Dinsdag 17 september 2013 2 Agenda A short historical overview on BI Current Issues Current trends Future architecture First steps to this architecture 3 MIS/EIS Data Warehouse BI Multidimensional

More information

Applying Cryptography as a Service to Mobile Applications

Applying Cryptography as a Service to Mobile Applications Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography

More information

This presentation provides an overview of the architecture of the IBM Workload Deployer product.

This presentation provides an overview of the architecture of the IBM Workload Deployer product. This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

Network Virtualization

Network Virtualization Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Software Defined Network Application in Hospital

Software Defined Network Application in Hospital InImpact: The Journal of Innovation Impact: ISSN 2051-6002 : http://www.inimpact.org Special Edition on Innovation in Medicine and Healthcare : Vol. 6. No. 1 : pp.1-11 : imed13-011 Software Defined Network

More information

White Paper on NETWORK VIRTUALIZATION

White Paper on NETWORK VIRTUALIZATION White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

Leveraging Virtualization for Higher Business Continuity within Industrial Facilities

Leveraging Virtualization for Higher Business Continuity within Industrial Facilities White Paper Leveraging Virtualization for Higher Business Continuity Author: Jim Frider, Product Marketing Manager, Invensys Operations Management What s Inside: 1. Executive Summary 2. Introduction 3.

More information

SHAREPOINT ARCHITECTURE FUNDAMENTALS

SHAREPOINT ARCHITECTURE FUNDAMENTALS CHAPTER 4 SHAREPOINT ARCHITECTURE FUNDAMENTALS Whether you re a business user, manager, architect, developer, or IT pro, you ll want to understand the fundamental structure and core terminology of SharePoint

More information

First experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview.

First experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview. First experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview. We have some exciting times ahead. The possibilities of Windows Server 2016 look really phenomenal.

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com

Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud

More information

Software Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture

Software Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture Software Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture Tom Lehman, Brecht Vermeulen, Marshall Brinn, Niky Riga, Larry Landweber DRAFT DO NOT DISTRIBUTE

More information

White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:

White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside: White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3.

More information

Maintaining HMI and SCADA Systems Through Computer Virtualization

Maintaining HMI and SCADA Systems Through Computer Virtualization Maintaining HMI and SCADA Systems Through Computer Virtualization Jon Reeser Systems Engineer PROFI-VISION Automation 1150 Glenlivet Drive Allentown, PA 18106 jon.reeser@profi-vision.com Thomas Jankowski

More information

CON8474 - Software-Defined Networking in a Hybrid, Open Data Center

CON8474 - Software-Defined Networking in a Hybrid, Open Data Center CON8474 - Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Director, Product Management Oracle Virtual Networking Ronen Kofman Director of Product Development Oracle OpenStack

More information

Hybrid for SharePoint Server 2013. Search Reference Architecture

Hybrid for SharePoint Server 2013. Search Reference Architecture Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including

More information

Network Virtualization: A Tutorial

Network Virtualization: A Tutorial Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012

More information

Analysis of Network Segmentation Techniques in Cloud Data Centers

Analysis of Network Segmentation Techniques in Cloud Data Centers 64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology

More information