Security Training Seminars An integral part of The Open Group Security Programme
|
|
- Madeline Gaines
- 8 years ago
- Views:
Transcription
1 Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce
2 Agenda Check! j Brief Overview of Security Program Key Projects Introduction to Security Training Seminars 2
3 Scope of Program For organisations implementing innovation in Security & Electronic Commerce, the security program aims to: reduce business risks reduce business costs improve competitiveness Support for a secure infrastructure at 3 levels: Internet Enterprise-wide network (Intranet) Platforms 3
4 The IT DialTone Management Services Transaction Processing Application Services Service Qualities Security Manageability Interoperability International Operation Scalability Portability Core Information Exchange Location Services Security Services 4
5 Scope of Program Business Business Requirements Requirements identification, identification, definition definition & prioritisation prioritisation Product Product Developments Developments & Industry Industry Trends Trends Generating, Generating, Participating-in Participating-in & Monitoring Monitoring Technical Technical Developments Developments Standards, Standards, Collaborative Collaborative Technology Technology & Pilot Pilot Trials Trials Defining Defining Branding Branding Programs Programs supported supported by by testing testing Support Support in in the the Marketplace Marketplace Launch, Launch, communications, communications, integration, integration, training, training, procurement procurement 5
6 Scope of Program - evolution Aim to provide a full service range to our partners Aim to provide a full service range to our partners major system vendors, application & middleware providers, end-user organizations mutually supportive activities, no throw over the wall attitude Standards Development Partnerships Consultancy Training Pilot Pilot Trials Trials Testing Brand Brand Peer Peer Networking Market Market Requirements 6
7 Conformance & The Brand Enforced by the X/Open Trade Mark Licence Agreement It conforms to the Standard It will continue to conform Any problems, fixed by the supplier within set time Guaranteed by the supplier Brand can be taken away! 7
8 Agenda Check! Brief Overview of Security Program j Key Projects Introduction to Security Training Seminars 8
9 Distributed Security Framework - (an application programmer s view) Users of Security Services Applications System Services (e.g. network, file-system, database, etc.) Common Security Services Distributed Authentication Common Security Services (provided through Generic interfaces) Distributed Audit Cryptographic Services Key & Cert Management Specific Mechanism Modules Eg. Kerberos SESAME CryptoKnight ETC. As Appropriate 9
10 Common Architecture for PKI Defines, characterises, integrates, positions, components of a PKI Based on use of X509.v3 (due to overwhelming recommendation from customer community) but does not preclude use of other approaches (e.g. SDSI) Provides for, but does not mandate Key Recovery Drafts available publicly via web server References and integrates specifications from other sources e.g. IETF, PC/SC, OpenCard 10
11 Business decisions and Regulatory Framework establish trust relationships Allow for hierarchical structure, direct relationships, and web-of-trust relationships as deemed appropriate for individual circumstances. Do not Dictate through technology 11
12 Business Decisions and Regulatory Framework establish separation/combination of Role... Registration Authorities can be local to user (e.g. lawyers office, local chamber of commerce. Can offer services from multiple competing services (act as broker), customer choice based on business and regulatory considerations. 12
13 CDSA A search on the Internet reveals Canadian Dam Safety Association Canadian Deaf Sports Association Comprehensive Digestive Stool Analysis But since this is a security presentation Common Data Security Architecture 13
14 Common Data Security Architecture (CDSA) For applications and services in a PKI environment Coherent architecture Comprehensive set of services Originally submitted by Intel Revision and addition from PKI Task Group Intel, IBM, Netscape, Entrust, Trusted Information Systems prepared revised specifications Fast-Track adoption Real commitment by suppliers to build into products 14
15 CDSA Fast Track Formal review & comment period completed final version being prepared for publication formal approval Publish final standard - awaiting completion of legal procedures Test suites in development Brand (certification scheme) definition and supporting processes being developed development partnerships in the pipeline 15
16 Common Data Security Architecture - CDSA Applications in C Applications in C++ Applications in Java System Security Services Layered Services Tools Method Wrapper Middleware Language Interface Adapter CSSM Security API EM-API Common Security Services Manager CSP Manager SPI Integrity Services TP Module Manager TPI CL Module Manager CLI Security Contexts DL Module Manager DLI Elective Module Mgr EMI Security Add-in Modules Cryptographic Service Provider Trust Model Library Certificate Library Data Storage Library New Category of Service 16 Data store
17 Single Sign-On To support distributed heterogeneous enterprise-wide network Completed so far: Pluggable Authentication Modules (PAM) publicly available on web server In the pipe Account Management built on LDAP based schema Detailed proposals for brand, test 17
18 Agenda Check! Brief Overview of Security Program Key Projects j Introduction to Security Training Seminars 18
19 Security Training Seminars New! Starts here in Amsterdam, establish as regular feature Integral part of Security Program supporting standardization and collaborative technology initiatives in the field Aims: practical advice of obvious value to the business short to medium term tactical advice medium to long term strategic advice supported by case examples 19
20 20 Security Training Seminars Managing: Dr. Phil Holmes background in education, information management and publishing Rob Tate background in practical commercial consultancy Security Training Alliance proposal for alliance of training partners working under common marketing banner common, shared set of training modules co-operation between partners in satisfying customer organization s training needs
21 Security Survival An Indispensable Guide to Securing Your Business Security Survival An indispensable guide to securing your business Essential advice for users and managers Helps prepare you for net security Obtain from: Prentice-Hall Regular & Internet The Open Group Regular & Internet Amazon Internet only Your guide to System Security 21 Covers DCE Security
22 Our Speakers Today Stan Dormer, (Aid to Industry) 30 years in IT and auditing co-founder of COMPACS conferences now in 21st year Pierre Noel (The Open Group) Pierre Noel (The Open Group) practical expertise in DCE, security, Single Sign On open transaction processing, and distributed systems principle Open Group consultant for Single Sign-On 22
23 Rules of Engagement Not a working group meeting Panel Question & Answer Session Feel free to provide feedback to Phil Holmes and Rob Tate either personally or via evaluation forms content, quality, suggestions for future topics interest in The Security Training Alliance Further opportunity for one on one discussion at the reception for interested parties 23
Phil Holmes/ Robert Tate. Security Training
1 Update Phil Holmes/ Robert Tate Update - Agenda 2 Position in June 1997 Alliance Security Briefings at Member Meetings Relation to BS 7799 Training Matrices Coverage, orientation and approach Actions
More informationTrustNet A proposal for establishing Trust and Interoperability over secure network infrastructures
TrustNet A proposal for establishing Trust and Interoperability over secure network infrastructures Dean Adams Agenda Check! j Barriers to Business TrustNet Proposal How do we start Next! 2 Barriers to
More informationStandardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal
Standardizing PKI in Higher Education Apple PKI and Universal Hi-Ed Spec proposal Shawn Geddis Security Consulting Engineer, Apple Enterprise geddis@apple.com 703-264-5103 1 Agenda A View of Apples PKI
More informationSecurity Architecture (ASA)
AppleÕs Security Architecture (ASA) Aram PŽrez Chief Security Architect aram@.com Apple Data Security Group Overview Apple Data Security Group Why provide a security architecture? Requirements Building
More informationPKI for Electronic Commerce
PKI for Electronic Commerce DASCOM 3004 Mission Street Santa Cruz, CA 95060 USA +1-408-460-3600 1/26/98-1 PKI and IntraVerse Agenda Motivation for PKI How PKI (and DCE) can provide Authentication Authorization
More informationSecurity Services Application Programming Interface (SS API) Developer's Security Guidance
M T R 9 9 W 0 0 0 0 0 2 7 M I T R E T E C H N I C A L R E P O R T Security Services Application Programming Interface (SS API) Developer's Security Guidance March 2000 Amgad Fayad Don Faatz Sponsor: DISA
More informationSingle Sign-On Architectures. Jan De Clercq Security Consultant HPCI Technology Leadership Group Hewlett-Packard
Single Sign-On Architectures Jan De Clercq Security Consultant HPCI Technology Leadership Group Hewlett-Packard page 1 Agenda Trusted Security Infrastructures SSO: What and Why? SSO Architectures Extending
More informationIntegrating Policy-Driven Role Based Access Control with the Common Data Security Architecture
Integrating Policy-Driven Role Based Access Control with the Common Data Architecture Along Lin Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-59 April, 1999 E-mail: alin@hplb.hpl.hp.com
More informationThe Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: info@setecs.com Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
More informationDr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
More informationPreliminary Specification. X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules
PRELIMINARY Preliminary Specification X/Open Single Sign-On Service (XSSO) Pluggable Authentication Modules [This page intentionally left blank] Preliminary Specification X/Open Single Sign-on Service
More informationStandards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
More informationehealth Architecture Principles
ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:
More informationEnabling the Information Age
Enabling the Information Age Web Application Server 4.0 Agenda Architecture Overview Features 2 1 (OAS) 4.0 Strategy Provide High Enterprise Quality of Service Scalable: Multithreaded, Distributed Server
More informationCase Study: Leveraging TPM for Authentication and Key Security
Case Study: Leveraging TPM for Authentication and Key Security 09/20/2011 Gautam Muralidharan Manager, Advisory Services PwC Speaker Introduction Gautam is a manager in the Advisory Technology practice
More informationStandards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations
Standards and Guidelines for Information Technology Infrastructure, Architecture, and Ongoing Operations This document describes applicable standards and guidelines for the university's policy on Information
More informationCloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org 1 Disclaimers This presentation provides education on Cloud Computing and its security
More informationSTATEMENT of. Open Group and The Open Group Trusted Technology Forum. Submitted for the record. Hearing on. March 27, 2012
Executive Summary of The Open Group s testimony to the House Energy and Commerce Oversight and Investigations Subcommittee Hearing on IT Supply Chain Security: Review of Government and Industry Efforts
More informationDraft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
More informationInformation Technology Services
Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University
More informationEnterprise Integration Architectures for the Financial Services and Insurance Industries
George Kosmides Dennis Pagano Noospherics Technologies, Inc. gkosmides@noospherics.com Enterprise Integration Architectures for the Financial Services and Insurance Industries Overview Financial Services
More informationRed Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
More informationNetworkingPS Federated Identity Solution Solutions Overview
NetworkingPS Federated Identity Solution Solutions Overview OVERVIEW As the global marketplace continues to expand, new and innovating ways of conducting business are becoming a necessity in order for
More informationExecutive Education Partnership with the DeGroote School of Business
Canadian Chamber Competition 2013 Connecting with Educators on the Skills Gap Executive Education Partnership with the DeGroote School of Business Submitting Chamber: The Burlington Chamber of Commerce
More informationProduct Standard General Interworking: Internet Server
General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
More informationWhat is Open Source? Open source is defined by three key components:
Integrating Open Source into your business To help businesses deal with the complexity of globalization, unanticipated opportunities, unexpected threats, competitive demands and fiscal constraints, a business
More informationSAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
More informationFirM - Federated Identity & Resource Management For Domino
FirM - Federated Identity & Resource Management For Domino Q3 2005 Agenda Introductions What is FirM FirM Architecture Workflow Demo of FirM V2.1 User experience demonstration Administration experience
More informationThe IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations
Interchange of Data between Administrations EUROPEAN COMMISSION ENTERPRISE DIRECTORATE- GENERAL INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS PROGRAMME Interchange of Data between Administrations 2 of Generic
More informationEuropean Security Standards Reference Implementation Initiative (ESSRII)
European Security Standards Reference Implementation Initiative (ESSRII) A Proposal for Action in Europe on International Information Security Standards Brian Gladman, European Technical Director, Trusted
More informationX/Open Preliminary Specification
X/Open Preliminary Specification X/Open Single Sign-On Service (XSSO) - Pluggable Authentication Modules The Open Group March 1997, The Open Group All rights reserved. No part of this publication may be
More informationMySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
More informationM-CLOUD INITIATIVE: PROVIDING IT SERVICES FOR SOCIETY Iurie Țurcanu CTO @ e-government Center
GOVERNMENT OF REPUBLIC OF MOLDOVA e Government Center M-CLOUD INITIATIVE: PROVIDING IT SERVICES FOR SOCIETY Iurie Țurcanu CTO @ Outline Our Government Agenda Government e Transformation Objectives E Transformation
More informationSGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationWhy is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College
Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Agenda Middleware the hidden part of IT CICS (Customer Information Control System) track record as a middleware
More informationCLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
More informationICANWK504A Design and implement an integrated server solution
ICANWK504A Design and implement an integrated server solution Release: 1 ICANWK504A Design and implement an integrated server solution Modification History Release Release 1 Comments This Unit first released
More informationSingle Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
More informationIntegrating SharePoint Sites within WebSphere Portal
Integrating SharePoint Sites within WebSphere Portal November 2007 Contents Executive Summary 2 Proliferation of SharePoint Sites 2 Silos of Information 2 Security and Compliance 3 Overview: Mainsoft SharePoint
More informationIntroduction. C a p a b i l i t y d o c u m e n t : B i z T a l k S e r v e r
Microsoft Technology Practice Capability document Overview Microsoft BizTalk Server is the middleware application server providing Business Process Management, Process Automations along with SOA / ESB
More informationSession Abstract by Edward A. Feustel Institute for Defense Analyses
Panel Title: The Current State of the CORBA Security Market Panel Chair: Edward A. Feustel, Institute for Defense Analyses Panelists: Bob Blakley, DASCOM Inc. David M. Chizmadia, Computer Science Corporation
More informationRed Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationShibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
More informationGovernment Service Bus
Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and
More informationEngineering Graduate Training Scheme "A" Information Engineering. Model Training Guide
Engineering Graduate Training Scheme "A" Information Engineering Model Training Guide 1 Model Training Guide (MTG) The Model Training Guide is, as the name suggests, a guide to Companies on the practical
More informationManisha R. Patil. Keywords Cloud service provider, Identity Provider, Enhanced Client Profile, Identity Management, Privacy, Trust Manager.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy and Dynamic
More informationSoftware Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:
More informationThis paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:
This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE
More informationPractitioner Certificate Software Asset Management Syllabus. Version 2.0
Practitioner Certificate Software Asset Management Syllabus Version 2.0 June 2010 Practitioner Certificate in Software Asset Management The ISEB Practitioner Certificate in Software Asset Management (SAM)
More informationGENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
More informationInnovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
More informationSEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
More informationKey Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
More informationCloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationNetwork Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
More informationImproving Agility at PHMSA through Service-Oriented Architecture (SOA)
Leveraging People, Processes, and Technology Improving Agility at PHMSA through Service-Oriented Architecture (SOA) A White Paper Author: Rajesh Ramasubramanian, Program Manager 11 Canal Center Plaza,
More informationIONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
More informationMarch 2008 Grant Halverson CEO, GFG Group. Regional Processing Models
March 2008 Grant Halverson CEO, GFG Group Regional Processing Models The search for successful regional and global IT processing models has been a major focus of the last fifteen years across banks, insurance
More informationX.500 and LDAP Page 1 of 8
X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard
More informationCurrent Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationXACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management
A Business Case for Fine-Grained Authorization and Centralized Policy Management Dissolving Infrastructures A recent Roundtable with CIOs from a dozen multinational companies concurred that Identity &
More informationAn introduction to TecSurge
An introduction to TecSurge Webinar on August 19 th, 2015 Session 1: Europe / Asia starts at 9am London / 4pm Singapore Session 2: Americas / Asia starts at 8am Los Angeles / 10am Houston / 11pm Singapore
More informationIntroduction into Web Services (WS)
(WS) Adomas Svirskas Agenda Background and the need for WS SOAP the first Internet-ready RPC Basic Web Services Advanced Web Services Case Studies The ebxml framework How do I use/develop Web Services?
More informationMasterPass Authorized Vendor. Introducing Pecunda The MasterPass Modular Wallet
MasterPass Authorized Vendor Introducing Pecunda The MasterPass Modular Wallet Context With the introduction of the MasterPass wallet, MasterCard offers merchants and consumers a new, quick and secure
More informationClavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
More informationCloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com
Cloud & Security Dr Debabrata Nayak Debu.nayak@huawei.com AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationOracle Security. Joyce Peng Senior Product Manager, Life Sciences Oracle Corporation Yao-chun.Peng@oracle.com
Oracle Security Joyce Peng Senior Product Manager, Life Sciences Oracle Corporation Yao-chun.Peng@oracle.com Agenda Security Challenges 21 CFR Part 11 HIPAA Oracle Security Security Challenges Privacy
More informationSecurity Service Specification 15
Security Service Specification 15 [1] This chapter incorporates material that was adopted in three separate specifications related to security: CORBA Security Rev 1.1 (formal/97-12-22) Common Secure Interoperability
More informationA study of Cloud Computing Ecosystem
EIS A study of Cloud Computing Ecosystem Vikram Gawande Juan Mario Álvarez Aguilar The Tuck School at Dartmouth 10/11/2010 About Cloud Computing: Cloud computing is a model for enabling convenient, on-demand
More informationCritical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
More informationAchieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
More informationThe MDM (Measurement Data Management) system environment
1 Audi fast facts Brands: Audi and Lamborghini 964.151 premium cars delivered to customers 2007 33.600.000.000 turnover 2007 53.347 employees worldwide 2 Overview Audi's test environment Measurement data
More informationPLM Eclipses CPC as a Software Market
Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle
More informationShared Services Canada (SSC)
Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29, 2013 1 Agenda TIME
More informationIntroduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture
Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationHow To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
More informationGlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,
GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING
More informationAvailability Digest. www.availabilitydigest.com. @availabilitydig. HPE Helion Private Cloud and Cloud Broker Services February 2016
the Availability Digest @availabilitydig HPE Helion Private Cloud and Cloud Broker Services February 2016 HPE Helion is a complete portfolio of cloud products and services that offers enterprise security,
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationWhite paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
More informationNewcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
More information6 Cloud strategy formation. 6.1 Towards cloud solutions
6 Cloud strategy formation 6.1 Towards cloud solutions Based on the comprehensive set of information, collected and analysed during the strategic analysis process, the next step in cloud strategy formation
More informationA Pluggable Security Framework for Message Oriented Middleware
A Pluggable Security Framework for Message Oriented Middleware RUEY-SHYANG WU, SHYAN-MING YUAN Department of Computer Science National Chiao-Tung University 1001 Ta Hsueh Road, Hsinchu 300, TAIWAN, R.
More information<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
More informationIntegration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationDesign Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationDigital Rights Management
The term Digital Rights Management - DRM - has its origins in the combined efforts of some vendors, their marketing staff and some other industry analysts in the late 1990s [1]. It is a breakthrough in
More informationWindows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation
Windows 2000 Security Architecture Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation Topics Single Sign-on Kerberos v5 integration Active Directory security Delegation of authentication
More informationCASE 8: Procurement of public key infrastructure
CASE 8: Procurement of public key infrastructure Uni. Athens / CERES Country / region Netherlands Short description This is the case of an integrated central e-government infrastructure for issuing and
More information