the original cloud networking company Run your Business in the Cloud.
|
|
- Chrystal Bradley
- 8 years ago
- Views:
Transcription
1 the original cloud networking company Run your Business in the Cloud.
2 Agenda Company Overview Customers Market Overview VNS3 Product Line Summary Appendices What is an Overlay Network? Customer Use Cases Technical Use Cases Demo Use Cases 2
3 About Us Who We Are Cohesive Flexible Technologies Corp. (CohesiveFT) Founded by IT and capital markets professionals with years of experience in operations, enterprise software and client-facing services VNS3 product launched in 2008 with multiple product revisions each year Customers have secured 150M+ virtual device hours in public, private, & hybrid clouds with our solution Offices in Chicago, London, Belo Horizonte and Palo Alto What We Do Deliver hybrid IaaS cloud use cases such as Cloud VPN, Cloud WAN and Cloud Partner Networks Provide VNS3, a Network Function Virtualization appliance that allows our customers to build their own Software Defined Networks. Extend existing enterprise networks and applications to public, private and hybrid clouds. Federate physical, virtual and cloud infrastructure on a common network platform, interface and API Enable enterprises to run business operations in the cloud helping extend both customer facing systems and internal operational platforms Public Cloud Solution Partner 3
4 Our Customers Run Their Businesses in the Cloud 700+ customers in 20+ countries 200+ Self Service Customers 15+ SI Resellers 5+ ISV OEM Including Industry Leaders Global Mutual Fund Company Global ERP provider Global BPMS provider Global Cloud-based Threat Detection Global Fashion Brand Global Toy Manufacturer US National Sports Association References Available Upon Request 4
5 VNS3 Allows Cloud Production Use Cases Hybrid Cloud Cloud AD Cloud Migration Cloud WAN Partner/Customer Network App Modernization Capacity Expansion Cloud DR Cloud Federation 5
6 Enterprises Want to Know How do I connect and secure my cloud servers? How can I avoid Vendor Lock-In? Can I continue to use my current NOC and monitoring tools? Can I attest to the security of my data? Can I have High Availability and still benefit from Cloud pricing? Can my Cloud based systems be made HIPPA PCI compliant? 6
7 SDN market is split into Application and Provider segments Layer 7 Layer 6 Layer 5 Layer 4 VNS 3 Application Layer Application Owner Application-Centric SDN Help me run my business in the cloud NOW. Delivered primarily via Network Function Virtualization (NFV) appliances. Layer 3 Layer 3 Limit of user access, control and visibility Layer 2 Layer 1 Virtual Layer Cloud Owner Service-Provider SDN Optimizes service provider data center operations Delivered primarily via OpenFlow Controllers Layer 0 Alcatel Hardware Layer 7
8 IaaS Cloud is Missing One Key Component What IaaS Offers What You Need What We Do Applications Enterprise Applications Enterprise Applications Virtual Compute Virtual Storage Underlying Network Virtual Compute Virtual Storage Underlying Virtual Network Virtual Compute Virtual Storage Underlying Network Hardware Hardware Hardware Hardware Hardware Hardware VNS3 provides applications with the required connectivity, integration and security when operating in the cloud. 8
9 VNS3 Virtualizes 6 Key Network Functions Allows control, mobility & agility by separating network location and network identity Control over end to end encryption, IP addressing and network topology Router Switch Firewall VPN Concentrator IPsec/SSL Protocol Redistributor Scriptable SDN 9
10 VNS3: Foundation for a Cloud Network IPsec Tunnel SSL Tunnel Firewall/IPsec e.g. Cisco 5585 VNS3 Manager Cloud Instance Cloud Server or Road Warrior Tunneling/VPN SSL-based VPN Site-to-Site VPN (IPsec) Layer 2 Bridging over GRE Layer 3 Cloud WAN Remote VPN (PPTP, L2TP, IPsec) OpenVPN Credential Generation Native IPsec, NAT-Traversal RSA, Diffie Helman Key Mgmt BGP Peering IPsec Support 3DES, AES Encryption IKEv1 and IKEv2 GRE over IPsec MD5 and SHA1 Authentication Key Lifetime Management Multiple Peer List Support Multi-platform Client OpenSSL, Polar SSL 3DES, AES Encryption SSL Support High Availability/Failover 1024, 2048 and custom key sizes MD5 and SHA1 Authentication Scalable Mesh Deployment Certificate-based Authentication DTLS, TLS Administration & Authentication Web GUI Scriptable API Multi-party/factor support access Network Interface Monitor SNMPv2 Configuration Recovery Identity Access Management Live License Upgrade 10
11 Extend Your Applications with VNS3 VNS3 gives control in the cloud of: IP Addressing Protocols Network Topology Security VNS3 Overlay Network /24 Cloud 1 Cloud 2 Cloud Server Instances Cloud Server Instances Overlay IP s: Overlay IP s: Use NFV to build Software Defined VNS3 1 Peered VNS3 2 Peered VNS3 3 Peered VNS3 4 Public IP: Public IP: Public IP: Public IP: Networks (SDN): Separate network identity from location Configure in a mesh for high availability Overlay network across multiple virtual environments for infrastructure federation Rest API or UI Data Center Server LAN IP: IPsec Tunnel Data Center Cisco ASA Data Center Server LAN IP:
12 Cloud Overlay Networking US East 1 Europe US East VNS3 Overlay Network Subnet: /22 Cloud Server A Cloud Server B Cloud Server C Cloud Server D Cloud Server E Cloud Server F Overlay IP: Overlay IP: Overlay IP: Overlay IP: Overlay IP: Overlay IP: VNS3 1 Public IP: Overlay IP: Active IPsec Tunnel / /24 Firewall / IPsec Cisco 5505 Peered VNS3 2 Public IP: Overlay IP: Peered Failover IPsec Tunnel VNS3 3 Active IPsec Tunnel / /24 Firewall / IPsec Cisco 5585 Public IP: Overlay IP: User Workstation LAN IP: User Workstation LAN IP: Data Center Server Data Center Server LAN IP: LAN IP: Customer Remote Office Chicago, IL USA Remote Subnet: /24 Customer Data Center London, UK Remote Subnet: /24 12
13 Add Additional Functionality Via Software Containers Isolated Docker containers within VNS3 3.5 allows customers to embed features and functions safely and securely into their Cloud Network. Proxy Reverse Proxy Content Caching Load Balancer IDS Custom Container VNS3 Core Components Router Switch Firewall Protocol Redistributor VPN Concentrator Scriptable SDN 13
14 Interoperability is Key to Cloud Leverage VNS3 allows customers to extend their network to any cloud. 14
15 VNS3 Editions, Support and Services Free Edition $0 Premium + Cloud Usage Fees Zero-Premium Edition for Smaller Production Deployments Lite Edition $150/Month + Cloud Usage Fees Data Center Connect Capabilities for Hybrid Cloud Deployments SME Edition $350/Month + Cloud Usage Fees Overlay Network High Availability plus Data Center Connectivity Enterprise Edition $750/Month + Cloud Usage Fees Complex Virtual Network Deployment with Flexible Licensing Support Plans Free Edition Forum Support Support for all paid Edition Subscriptions Enhanced Support and 24/7 Quick Response Support available for extra fee Self-service image available in most public cloud catalogs Production License 1 Manager 5 Clientpacks 1 IPsec Endpoint 1 Tunnel Self-service image available in most public cloud catalogs Production License 1 Manager 10 Clientpacks 2 IPsec Endpoints 4 Tunnels Custom image deployed to the customer s cloud account Production License 2 Managers 25 Clientpacks 4 IPsec Endpoints 16 Tunnels Custom image deployed to the customer s cloud account Production License 2 Managers 50 Clientpacks 16 IPsec Endpoints 64 Tunnels Services The following are available as part of our Coalescence Services and Server3 Toolkit: NFV/SDN Design and Implementation Cloud Strategy Cloud Training Hybrid Cloud Cloud Security Audit Cloud Active Directory 15
16 Summary CohesiveFT has delivered close to 150m device hours of over the top, application networking in the public clouds to date. Network Function Virtualization enables customers to control their own destiny in and across the clouds. CohesiveFT s VNS3 helps customers deliver application-centric networks and cloud-based mesh networks for connecting offices, customers, and partners - using clouds as global points of presence for delivering their business. CohesiveFT believes SDN can be delivered at both the customer layer of the cloud stack and the service provider layer, ultimately allowing customers to dynamically create global networks of virtually unlimited scale. Patented approach to customer control in the cloud is now being enhanced for improved customer ability to deploy layer 4-7 features from partners, open source or in-house developed as part of their virtual network infrastructure. Connectivity, Integration and Security are the key to cloud success. 16
17 Questions? CohesiveFT Americas Chicago, IL USA CohesiveFT Europe London, UK
18 Management Team Patrick Kerpan CEO, Co-founder Dwight Koop COO, Co-founder Chris Swan CTO Kerpan brings more than 20 years of software experience to the role of CTO and was one of CohesiveFT's founders in Previously he was the CTO of Borland Software Corp which he joined in 2000 through the acquisition of Bedouin, Inc., a company that he founded. Kerpan was also the VP and general manager of the Developer Services Platform group at Borland, where he was instrumental in leading the Borland acquisition of StarBase in Before founding Bedouin, Inc., Kerpan was a managing director responsible for derivatives technology at multiple global investment banks. Koop has decades of experience in enterprise IT and entrepreneurial startups. Koop was global head of data center operations and security for Swiss Banks capital markets, and O'Connor and Associates. He was one of the founders and an EVP of the Chicago Board Options Exchange during its early and rapid growth years. Before CohesiveFT, Koop was COO of Bedouin, Inc, VP at Borland and COO of Signet Assurance. Koop is also the Managing Member of Leporidae Holdings LLC. Leporidae recently sold its interest in Rabbit Technologies Limited to VMWare. Swan is responsible for upcoming product releases for VNS3 and Server3 as well as continuing to develop CohesiveFT s thought leadership in the cloud space. He is an active enterprise cloud user and frequently speaks at Cloud Camp London events. Swan recently left UBS where he worked on strategy and architecture for web and mobile offerings across all regions and business divisions. He was previously co-head of Security CTO, CTO at a London based technology investment banking boutique, and Credit Suisse, Chris was a Combat Systems Engineering Officer in the Royal Navy. He has an MBA from OUBS and a BEng in Electronics Engineering from the University of York. Ryan Koop Director of Marketing, Co-founder Koop is the Director of Marketing, responsible for product management, pre- and post-sales support services, and training. In his role, Koop is responsible for overseeing the company's strategy and marketing. He is also responsible for the creation and evolution of the Cloud Container solutions and products Previously he was involved in various technology startups in the financial services and gourmet foods industries. Chris Purrington Global Sales Director As Global Sales Director at CohesiveFT and Managing Director of CohesiveFT UK, Chris is responsible for worldwide sales. With over 20 years in the software industry. Chris has extensive experience in leading ISVs to success in EMEA, this includes 9+ years at Application Lifecycle Management company Borland where he was UK MD and VP UK, Ireland and Africa. Sam Mitchell Senior Solution Architect As Senior Cloud Solutions Architect, Mitchell leads all technical elements of the sales cycle in the UK and internationally. Mitchell runs demos, technical qualification, technical account management of proof of concepts, technical and competitive positioning, RFI/RFP responses and proposals. Before CohesiveFT, Mitchell was a Cloud Solution Architect at Platform Computing, which was recently acquired by IBM. He was also a Lead Architect at SITA, where he headed up OSS BSS Architecture, Design and Deployment activities on SITA's cloud offerings. 18
19 Layers of Control and Access Cloud networks combine with user & provider firewalls and isolation features to create a security lattice with layers of security. Some key security elements must be controlled by the customer but separate from the provider. Provider Owned/Provider Controlled Provider Owned/User Controlled VNS3 - User Owned/User Controlled User Owned/User Controlled 19
20 Appendix - Business Use Cases 20
21 eu-west-1 Burberry Overlay Network Global fashion label bust into public cloud on social media site to handle planned and unplanned traffic spikes Peered retail VNS3 Manager IPsec global Firewall / IPsec hybrid cloud VNS3 VPN and encrypted Overlay Network allowed Burberry to to securely connect to on premises databases protecting customer data. CohesiveFT Confidential User Workstations User Workstations Retail Locations Retail Locations Main Offices and Data Center US APAC UK Data Base Servers Data Base Servers 21
22 Geezeo us-west-2 us-east-1 Online Financial Management Solutions Company provided PCI compliant SaaS solution to Banks and Credit Unions using VNS3 and AWS public cloud. Geezeo Multi-tenant PFM Overlay financial services VNS3 Manager Peered IPsec north america Firewall / IPsec partner/customer network Data Center Server Data Center Server Data Center Server Data Center Server Chosen Over AWS Virtual Private Gateway and Traditional Physical Data Center with Cisco Firewall Connectivity. Customer 1 Seattle, WA Customer 2 San Francisco, CA Customer 3 Denver, CO Customer N New York, NY CohesiveFT Confidential 22
23 eu-west-1 us-west-2 Customer N Overlay Traditional BMP and CRM independent software vendor offered their Fortune 500 customers an alternative SaaS version of their software in the cloud with VNS3. Customer 1 Overlay Customer 2 Overlay enterprise isv VNS3 Manager us-east-1 NOC Overlay IPsec north america Peered Firewall / IPsec partner/customer network VNS3 isolates each customer in the cloud and allows Pega to integrate all deployments to their existing NOC. User Workstations Customer 1 Seattle, WA Data Center Private Cloud Customer 2 San Francisco, CA Data Center Server Customer N London, UK Data Center Server Pega NOC Boston, MA CohesiveFT Confidential 23
24 TECH Nigeria Data communications services company needed to connect a patchwork of African telcos to allow users to communicate and advertisers to reach their targets. Ghana Nigeria Uganda Uganda VNS3 Manager telecommunications africa IPsec Firewall / IPsec cloud WAN The VNS3 powered Cloud WAN was constructed with no dedicated physical infrastructure and allowing remarkably cost effective integration service. CohesiveFT Confidential Data Center Server Data Center Server Vodafone Customer MTN Customer SMS Advertiser s Platform Data Center Accra, Ghana Accra, Ghana Johannesburg, South Africa Lagos, Nigeria 24
25 US East D1 D2 EE SS7 Overlay Network D1 D2 UK s largest mobile network operator looking to gain additional control over their existing network investments Overlay Networks Super Site 1 Overlay Networks Firewall / IPsec Super Site 2 London Madrid telecommunications Peered VNS3 Manager Active IPsec africa Failover IPsec cloud WAN D1 D2 D1 D2 D1 D2 D1 D2 Overlay Networks Overlay Networks Overlay Networks Overlay Networks The VNS3 powered overlay network was created to connect Super Sites and HP Cloud Services. Allowing EE to execute big data projects. Super Site 3 Frankfurt Super Site 4 Dublin Super Site 5 Super Site 6 Paris Geneva CohesiveFT Confidential 25
26 us-west-1 us-east-1 Large mutual fund looking to securely burst into public cloud to extend their HPC grid Loomis Sayles Overlay Network financial services VNS3 Manager Peered north america IPsec Firewall / IPsec partner/customer network Data Center Server Data Center Server The VNS3 overlay network was created to allow Loomis Sayles to meet compliance standards while using public cloud for additional capacity. Private Data Center Boston, MA CohesiveFT Confidential 26
27 Appendix - Demo Use Cases 27
28 Demo Topology #1 Berlin, Germany London, UK Paris, France VNS3 Overlay Network /22 Sinatra App Tier Primary DB Backup DB Overlay IP: Overlay IP: Overlay IP: * VNS3 Manager1 VNS3 Manager 2 VNS3 Manager 3 Public IP: Public IP: Public IP: Active IPsec Tunnel Peered Peered Firewall / IPsec Cisco ASA Public IP: Customer Corp Office Nginx Server Public IP: LAN IP: San Francisco 28
29 Demo Topology #2 29
30 Demo Topology #3 NFV-Enabled Storage EC2 US-East-1 US Central EC2 US-West-2 Europe VNS3 1 Public IP: Overlay IP: VNS3 2 Public IP: Overlay IP: VNS3 3 Public IP: Overlay IP: VNS3 4 Public IP: Overlay IP: Peered Peered Peered fs3-nas-1 Overlay IP: fs3-nas-2 Overlay IP: fs3-nas-3 Overlay IP: fs3-nas-4 Overlay IP: fs3-nas-5 Overlay IP: fs3-nas-6 Overlay IP: fs3-nas-7 Overlay IP: fs3-nas-8 Overlay IP: Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes Raid 10 Storage Volumes FileSystem Local #1 FileSystem Local #2 FileSystem Local #3 FileSystem Local #4 FileSystem Local #5 FileSystem Local #6 FileSystem Local #7 FileSystem Local #2 FileSystem Regional #1 FileSystem Regional #2 FileSystem Regional #3 FileSystem Regional #4 FileSystem Global #1 CohesiveFT
Waves of adoption for NFV
Waves of adoption for How public, private and hybrid cloud networking is used for real workloads Chris Swan, CTO @cpswan the original cloud networking company copyright 2014 1 Agenda What is? Bursting
More informationOverlay Networks: Connecting and Protecting Across Regions with Docker. Patrick Kerpan, CEO
Overlay Networks: Connecting and Protecting Across Regions with Docker Patrick Kerpan, CEO Agenda Background: Cohesive and the cloud Cloud Networking: Limitations Overlay networks: To the rescue Enter
More informationVNS3 Secure Network Appliance Service Defnition for G-Cloud 7
VNS3 Secure Network Appliance Service Defnition for G-Cloud 7 What does VNS3:net do? VNS3:net secures your applications in the cloud. VNS3:net is a cloud native network, routing and security solution which
More informationWhite Paper. Cloud Security Best Practices. Part 1I: Layers of Control with VNS3. October 2014 Copyright Cohesive Networks
White Paper Part 1I: Layers of Control with VNS3 1 Introduction Public cloud offers elastic, scalable, highly available and accessible infrastructure for enterprises of all sizes. The 2014 Gartner Magic
More informationThe networking declaration of independence
The networking declaration of independence How overlay networking gives you control of your networks Chris Swan, CTO @cpswan the original cloud networking company copyright 2014 1 Agenda What is NFV? Declaration
More informationCloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
More informationMicrosoft Azure Configuration
Microsoft Azure Configuration Azure Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Create Azure Private VLAN 10 Launch VNS3 Image from Azure Marketplace 15 VNS3 Configuration Document
More informationGoogle Compute Engine Configuration
Google Compute Engine Configuration GCE Deployment Setup for VNS3 2014 1 Contents Introduction 3 Step 1: GCE VNS3 Image Delivery 9 Step 2: GCE Network Setup 16 Step 3: Launching a VNS3 Manager 19 Instance
More informationCenturyLink Cloud Configuration
CenturyLink Cloud Configuration CenturyLink Setup for VNS3:vpn, VNS3:net and VNS3:turret 2015 copyright 2015 1 Table of Contents Introduction 3 CenturyLink Cloud Deployment Setup 9 VNS3 Configuration Document
More informationUsing Docker in Cloud Networks
Using Docker in Cloud Networks Chris Swan, CTO @cpswan the original cloud networking company 1 Agenda Docker Overview Dockerfile and DevOps Docker in Cloud Networks Some Trip Hazards My Docker Wish List
More informationVNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide
VNS3 to Cisco ASA Instructions ASDM 9.2 IPsec Configuration Guide 2016 Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically
More informationHow To Set Up A Vns3 Controller On An Ipad Or Ipad (For Ahem) On A Network With A Vlan (For An Ipa) On An Uniden Vns 3 Instance On A Vn3 Instance On
ElasticHosts Configuration ElasticHosts Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 ElasticHosts Deployment Setup 9 VNS3 Configuration Document Links 20 copyright 2015 2 Requirements
More informationAppendix C Pricing Index DIR Contract Number DIR-TSO-2724
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers
More informationLaunching of Cloud Networking Services Industry s first NFV-enabled network services available globally
Arcstar Universal One: Launching of Cloud Networking Services Industry s first NFV-enabled network services available globally NTT Communications Corporation Corporate Planning / Network Service Department
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationHP Helion Configuration
HP Helion Configuration HP Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Step 1: HP Helion Deployment Setup 9 Step 2: Launching a VNS3 Controller 15 Server VNS3 Configuration Document
More informationvcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved.
vcloud Air Simone Brunozzi, VP and Chief Technologist, vcloud Air @simon 2014 VMware Inc. All rights reserved. Cloud Computing! Exciting! But wait 2009 2014 98% 94% 2% 6% VMs in Public Cloud VMs On-Premises
More informationMANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments
Page 0 2015 SOLUTION BRIEF MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments NET ACCESS LLC 9 Wing Drive Cedar Knolls NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction...
More informationCredit Unions and The Cloud. By: Chris Sachse
Credit Unions and The Cloud By: Chris Sachse Agenda! Introduction.! Definition of the cloud.! Discuss cloud popularity.! Look at the use of the cloud.! Discuss cloud management.! Discuss cloud security.!
More informationBuild your public cloud strategy with Oracle IaaS and Oracle PaaS
Build your public cloud strategy with Oracle IaaS and Oracle PaaS Satyendra Pasalapudi Associate Practice Director Apps Associates LLC April 26 th 2016 Copyright 2016. Apps Associates LLC. 1 About Me Satyendra
More informationRethink Remote Access
Rethink Remote Access Next Generation Network Access Technology Next Generation Remote Access Technology Today s remote access technology landscape is a patchwork of point solutions of mixed hardware and
More informationVyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
More informationDo DevOps on VMware vcloud Air Your Way, Without the Rework! Ashok Aletty, vcloud Air Solution Architect
1 Do DevOps on VMware vcloud Air Your Way, Without the Rework! Ashok Aletty, vcloud Air Solution Architect Agenda VMWare vcloud Air Overview Hybrid DevOps vcloud Air DevOps Services VMWare vcloud Air Public
More informationHybrid Cloud. How Businesses should be incorporating Hybrid Cloud as part of their Core IT Strategy
Hybrid Cloud How Businesses should be incorporating Hybrid Cloud as part of their Core IT Strategy Created by: Alan Perkins and Toby Owen Modified Date: 14 th Sep 2013 Classification: Public Legal Disclaimers
More informationHow To Understand The Concept Of A Software Defined Data Center
Point of view Software Defined Data Centers will Change the Way Enterprises Migrate and Deploy to Cloud-Based Applications Software Defined Data Centers have the potential to be both truly revolutionary
More informationMarket Application Delivery Networking. Products ADC, WAN Optimization, Secure Access
Company snapshot Founded 2000 Headquarters Milpitas, CA, USA Employees 400+ Market Application Delivery Networking Products ADC, WAN Optimization, Secure Access Segments Enterprise, Service Provider, Public
More informationTransform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure
White Paper Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure What You Will Learn The new Cisco Application Centric Infrastructure
More informationPLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range
More informationvcloud Air Disaster Recovery Technical Presentation
vcloud Air Disaster Recovery Technical Presentation Agenda 1 vcloud Air Disaster Recovery Overview 2 What s New 3 Architecture 4 Setup and Configuration 5 Considerations 6 Automation Options 2 vcloud Air
More informationIPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks
IPOP-TinCan: User-defined IP-over-P2P Virtual Private Networks Renato Figueiredo Advanced Computing and Information Systems Lab University of Florida ipop-project.org Unit 3: Intra-cloud Virtual Networks
More informationHybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group
Hybrid Cloud: Overview of Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group Agenda Why Hybrid cloud? Cisco Vision Hybrid Cloud Use Cases and ROI Architecture Overview Deployment Model and
More informationSecond-Generation Cloud Computing IaaS Services
Second-Generation Cloud Computing IaaS Services What it means, and why we need it now Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Cloud Computing: Driving IT Forward Cloud computing,
More informationImplementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
More informationConfiguration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview
Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing
More informationHow To Orchestrate The Clouddusing Network With Andn
ORCHESTRATING THE CLOUD USING SDN Joerg Ammon Systems Engineer Service Provider 2013-09-10 2013 Brocade Communications Systems, Inc. Company Proprietary Information 1 SDN Update -
More information3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
More informationHybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
More informationHP OpenStack & Automation
HP OpenStack & Automation Where we are heading Thomas Goh Cloud Computing Cloud Computing Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources.
More informationHyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud
Hyper-V Network Virtualization Gateways - nappliance White Paper July 2012 Introduction There are a number of challenges that enterprise customers are facing nowadays as they move more of their resources
More informationIBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
More informationPega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect
1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,
More informationCloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
More informationVMUG - vcloud Air Deep Dive. 2014 VMware Inc. All rights reserved.
VMUG - vcloud Air Deep Dive 2014 VMware Inc. All rights reserved. Agenda 1 Overview of vcloud Air 2 Advanced Networking Capabilities 3 Use Cases 4 Overview of Disaster Recovery Service 5 Questions 2 VMware
More information2013 ONS Tutorial 2: SDN Market Opportunities
2013 ONS Tutorial 2: SDN Market Opportunities SDN Vendor Landscape and User Readiness Jim Metzler, Ashton, Metzler & Associates Jim@ashtonmetzler.com April 15, 2013 1 1 Goals & Non-Goals Goals: Describe
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationIBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
More informationCisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
More informationSOFTWARE DEFINED NETWORKING
SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationVPN_2: Deploying Cisco ASA VPN Solutions
VPN_2: Deploying Cisco ASA VPN Solutions Description Deploying Cisco ASA VPN Solutions (VPN) 2.0 is the latest update to the Cisco Certified VPN Training that aims at providing network security engineers
More informationVIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers
VIRTUALIZED SERVICES PLATFORM Software Defined Networking for enterprises and service providers Why it s unique The Nuage Networks VSP is the only enterprise and service provider-grade SDN platform that:
More informationNetwork Infrastructure Virtualization: Transforming Telecommunications and Managed Services
Brochure More information from http://www.researchandmarkets.com/reports/2775087/ Network Infrastructure Virtualization: Transforming Telecommunications and Managed Services Description: Historically,
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationHow To Make A Vpc More Secure With A Cloud Network Overlay (Network) On A Vlan) On An Openstack Vlan On A Server On A Network On A 2D (Vlan) (Vpn) On Your Vlan
Centec s SDN Switch Built from the Ground Up to Deliver an Optimal Virtual Private Cloud Table of Contents Virtualization Fueling New Possibilities Virtual Private Cloud Offerings... 2 Current Approaches
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationSoftware Defined Network (SDN)
Georg Ochs, Smart Cloud Orchestrator (gochs@de.ibm.com) Software Defined Network (SDN) University of Stuttgart Cloud Course Fall 2013 Agenda Introduction SDN Components Openstack and SDN Example Scenario
More informationVMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationTRG Clients in the Cloud Today
Understanding Your Cloud Options for Microsoft Dynamics GP Presented by: Brady Curtis Building Now for Your Future TRG Clients in the Cloud Today Cloud 5% On Prem 95% Building Now For Your Future RG Connect
More informationSDN Services at the Customer Edge
WHITEPAPER SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage SDN Services at the Customer Edge White Box SDN Foundation for Strategic Advantage Businesses and consumers
More informationSecurity MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
More informationArchitecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
More informationThe Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
More informationSecuring Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
More informationThe Production Cloud
The Production Cloud The cloud is not just for backup storage, development projects and other low-risk applications. In this document, we look at the characteristics of a public cloud environment that
More informationVirtual Privacy vs. Real Security
Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationHughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
More informationSDN CONTROLLER. Emil Gągała. PLNOG, 30.09.2013, Kraków
SDN CONTROLLER IN VIRTUAL DATA CENTER Emil Gągała PLNOG, 30.09.2013, Kraków INSTEAD OF AGENDA 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net ACKLOWLEDGEMENTS Many thanks to Bruno Rijsman for his
More informationRIDE THE SDN AND CLOUD WAVE WITH CONTRAIL
RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL Pascal Geenens CONSULTING ENGINEER, JUNIPER NETWORKS pgeenens@juniper.net BUSINESS AGILITY Need to create and deliver new revenue opportunities faster Services
More informationCisco NFV Solution for the Cisco Evolved Services Platform
Cisco NFV Solution for the Cisco Evolved Services Platform Cisco Knowledge Network Presentation Vijay Venugopal Senior Manager, Product Marketing, Cisco Cloud and Virtualization Group September 2014 Agenda
More informationIT Infrastructure Services. White Paper. Utilizing Software Defined Network to Ensure Agility in IT Service Delivery
IT Infrastructure Services White Paper Utilizing Software Defined Network to Ensure Agility in IT Service Delivery About the Author Siddhesh Rane Siddhesh Rane is a Technical Architect and part of the
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationInfrastructure, application services, and managed services - all in a single, integrated platform CENTURYLINK S END-TO-END MANAGEMENT SOLUTIONS:
CenturyLink Cloud Infrastructure, application services, and managed services - all in a single, integrated platform Businesses like yours are moving their apps to CenturyLink Cloud. All signs point to
More informationUsing SouthBound APIs to build an SDN Solution. Dan Mihai Dumitriu Midokura Feb 5 th, 2014
Using SouthBound APIs to build an SDN Solution Dan Mihai Dumitriu Midokura Feb 5 th, 2014 Agenda About Midokura Drivers of SDN & Network Virtualization Adoption SDN Architectures Why OpenDaylight? Use
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationPalo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
More informationHow To Use Arcgis For Free On A Gdb 2.2.2 (For A Gis Server) For A Small Business
Esri Middle East and Africa User Conference December 10 12 Abu Dhabi, UAE Understanding ArcGIS in Virtualization and Cloud Environments Marwa Mabrouk Powerful GIS capabilities Delivered as Web services
More informationThe Advantages of Cloud Services
Cloud-Based Services: Assure Performance, Availability, and Security What You Will Learn Services available from the cloud offer cost and efficiency benefits to businesses, but until now many customers
More informationBuilding scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationVPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide. http://www.peplink.com - 1 - Copyright 2015 Peplink
Peplink Balance http://www.peplink.com - 1 - Copyright 2015 Peplink Introduction Introduction Understanding Peplink VPN solutions Peplink's VPN is a complete, seamless system that tightly integrates your
More informationBridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
More informationWHITE PAPER: Egenera Cloud Suite
WHITE PAPER: Egenera Cloud Suite ... Introduction Driven by ever-increasing business demand, cloud computing has become part of many organizations IT strategy today. Driving this transition is the need
More informationBuilding VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
More informationSoftware AG and the AWS cloud. Past, Present and Best Practices. Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing
Software AG and the AWS cloud Past, Present and Best Practices Jonathan Madamba Director, Solution Cloud John Fitzgerald Director, Product Marketing Agenda How Software AG Uses The cloud Software AG s
More informationArchitecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More informationVMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION
TECHNICAL MARKETING DOCUMENTATION October 2014 Table of Contents Purpose and Overview.... 3 1.1 Background............................................................... 3 1.2 Target Audience...........................................................
More informationNetwork Virtualization
Network Virtualization The New Imperative in the Enterprise Data Center The Trusted News and Resource for SDx, SDN, NFV, Cloud & Virtualization Infrastructure Key Considerations for Network Virtualization
More informationSean Bennett. Cloud Platforms & Networking Group
Sean Bennett Cloud Platforms & Networking Group Half of Americans think cloud computing is affected by stormy weather 30 th August 2012 Survey: Nobody knows what Cloud Computing Is 31 st August 2012 Cloud
More informationBusiness Values of Network and Security Virtualization
Business Values of Network and Security Virtualization VMware NSX in the context of the Software Defined Data Center Klaus Jansen Virtual Networks Sales Specialist VMware NSBU 2014 VMware Inc. All rights
More informationNET ACCESS HIPAA COMPLIANT FLEXCloud
Page 0 2015 SOLUTION BRIEF NET ACCESS HIPAA COMPLIANT FLEXCloud A Managed Infrastructure Solution that Meets the Regulatory Demands of the Health Care Industry NET ACCESS LLC 9 Wing Drive Cedar Knolls,
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More information10 Strategies to Optimize IT Spending in an Economic Downturn. Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN
10 Strategies to Optimize IT Spending in an Economic Downturn Wong Kang Yeong, CISA, CISM, CISSP Regional Security Architect, ASEAN Current Economic Landscape 2 Basically you Basically you ve had to throw
More information