blueprint IL3 CONNECTIVITY FROM SECURE END-USER DEVICES
|
|
|
- Marshall Robinson
- 9 years ago
- Views:
Transcription
1 blueprint IL3 CONNECTIVITY FROM SECURE END-USER DEVICES
2 INTRODUCTION Skyscape is one of very few cloud providers that has achieved Pan Government Accreditation (PGA) and PSN Accreditation for our IL3 Compute, Storage and cloud services. One of the key benefits of a PGA IL3 cloud service is the enhanced security it offers due to controls such as more restrictive network connections, additional vetting of end-user personnel and heavily locked down end-user devices, as described in CESG guidance. However, those additional controls also create a challenge as the locked down networks and devices used by many government customers and Skyscape partners (operating at IL3) can make it difficult to manage assured cloud services such as Skyscape's. A core component of the Skyscape Compute-as-a Service platform is VMware vcloud Director which enables customers to control their virtual data centre, virtual machines and virtual networks. This requires a number of programmes to be installed and run on any locked-down devices used to access our platform this in turn can sometimes cause problems depending on the specific use case. For example, in order to view remote consoles of Virtual Machines (VMs), a small Windows executable file for the VMware Remote Control (VMRC) needs to be installed on the locked-down devices, and also a browser plug-in installed and enabled. In addition, to upload or download VMs, a Java plugin needs to be installed and enabled in the client browser. It has been found that for some implementations of locked-down devices, software can be installed by an administrator, however sometime later a configuration management tool will automatically remove the software. One way of addressing the problems experienced when using locked-down devices to access our platform is to deploy and access your VMs through a Bastion Host. This Blueprint document details how Skyscape customers can configure a Bastion Host to facilitate access to our platform via Secure End User Devices. IN THIS BLUEPRINT Access via a Bastion Host 3 Security considerations 5 Connectivity from device to host 5 Using vapp Edge 6 2 Skyscape Cloud Services Limited
3 ACCESSING THE SKYSCAPE PLATFORM VIA A BASTION HOST As described in CESG guidance such as Architectural Pattern 2: Walled Garden Architecture, Bastion Hosts are used as an intermediate point of authentication and connection, perhaps in conjunction with a Remote Access VPN solution. This means that security is not compromised as there is always a managed, known clean Bastion Host between the secure IL3 application and potentially unmanaged or untrusted end-user device. It also provides a practical approach to not installing and maintaining software on end-user devices. Once deployed, on successful connection to a Bastion Host, users can access other services or devices within the assured environment, subject to further (different) authentication, and also subject to configuration of suitable routing/firewalling. In the example below, a simple three-tier web application is being deployed and will be consumed over a Government Secure Network such as GSI. Skyscape customers need to access the various components of the environment via locked-down devices, but are having difficulty installing the various components or plug-ins described previously. Figure 1. Data flows between secure end point and managed server Blueprint: IL3 connectivity from Secure End-User Devices 3
4 To enable secure connectivity, a Bastion Host has been configured on an Access or Admin virtual network within the Skyscape cloud. For this example, a Windows 2008 server is being used, with Remote Desktop Services (RDS) enabled. Users on the locked-down laptops can use the Microsoft Remote Desktop Connection applet (MSTSC) to access the Bastion Host and authenticate against that machine. Once successfully logged-on, RDP or Putty can be used to access other VMs, or devices within the Skyscape cloud, via the Bastion Host. In the example shown, Putty/SSH is used to access a Linux VM running Apache. Users will also be able to access the Skyscape Portal from the web browser on their Bastion Host. They will then be able to install and activate the VMRC and Java Plug-ins required for access on that VM for permanent use (for example, including any other software needed to administer their applications or development environment). 4 Skyscape Cloud Services Limited
5 SECURITY CONSIDERATIONS There are various options within the Skyscape cloud to further secure the scenario discussed above. Connectivity from a Secure End-User Device to a Bastion Host Clearly, RDP access will be required from the Secure End-User Device to the Bastion host. For many Government organisations, RDP (port 3389) is an allowed port through the LAN and perimeter firewalls but it is worth checking. Similarly, as a secure and trusted network, RDP should already be allowed across the GSI. At the Skyscape end of the connection, RDP is allowed through the Skyscape managed perimeter firewalls to the customer's virtual firewall (VMware vshield Edge Gateway). The customer will need to configure their virtual firewall to specifically allow this connection as the platform is pre-configured to deny all access unless otherwise permitted. In this example, a firewall rule is being created to allow RDP/3389 from any external address on the GSI to the Public GSI address the customer wants to allocate for this. Having defined the firewall rule, the DNAT needs to be defined to allow RDP traffic to NAT between the VMware vshield Edge Gateway and the Bastion Host. Blueprint: IL3 connectivity from Secure End-User Devices 5
6 Using a vapp Edge to further secure the Bastion server In order to further lock down access inbound and outbound to the Bastion server, a vapp Edge can be used with the Bastion server vapp. This is a scaleddown version of a VMware vshield Edge Gateway that provides firewall and NAT services between the Bastion VM and the Organisation network it sits on. As an example, the firewall on the vapp Edge could be used to only allow RDP inbound from the external network (i.e. GSI) if required. More importantly, it can be configured to only allow RDP or SSH outbound to certain machines in the cloud environment. Figure 2. Data flows between secure end point and managed server 6 Skyscape Cloud Services Limited
7 VMware vcloud Director will automatically set up a DNAT to map the organisation network IP address in the diagram to the internal IP address of the Bastion Host ( ). Similarly, to allow the Bastion Host to communicate with the Apache server, a firewall rule can be created. Blueprint: IL3 connectivity from Secure End-User Devices 7
8 Or, the customer could be slightly less strict and allow SSH traffic to the whole Web Tier subnet It s also necessary to configure the VMware vshield Edge Gateway to allow traffic between the Access network and the Web Tier network. On the VMware vshield Edge Gateway configure the services as follows: 8 Skyscape Cloud Services Limited
9 ABOUT SKYSCAPE Skyscape Cloud Services has developed a range of cloud services designed specifically for the UK public sector, to help increase efficiencies, reduce costs, significantly improve procurement times and increase transparency. Our services are easy to adopt, easy to use and easy to leave to ensure that our customers remain in complete control, with minimum risk, reassured by the fact Skyscape's services are Pan Government Accredited (PGA) up to IL3. Skyscape s full offering consists of IaaS, PaaS and SaaS products: IaaS seven offerings around Compute and Storage on demand SaaS 17 offerings around messaging and document management PaaS based upon Cloud Foundry All of Skyscape s UK sovereign cloud computing services are hosted across our two highly-resilient Tier 3 UK data centres in Farnborough and Corsham. Skyscape services are delivered with leading technologies from Skyscape Alliance Partners: QinetiQ, VMware, Cisco, EMC and Ark Data Centres. The Cloud Alliance also provides a collaborative resource which drives innovation and technical product development, helping to continually improve Skyscape s offering to meet the needs of the UK public sector. Skyscape is focused on providing cloud services in a more agile, secure and cost-effective manner. We strive to deliver solutions that harness technology as a way to facilitate the changes that are needed to streamline processes and reduce costs to support the UK public sector and, ultimately, UK citizens and taxpayers. MORE INFORMATION For further information about Skyscape Cloud Services and how we can help you, please send an to [email protected] Blueprint: IL3 connectivity from Secure End-User Devices 9
10 Skyscape Cloud Services Limited A8 Cody Technology Park Ively Road Farnborough Hampshire GU14 0LX +44 (0) Reasonable efforts have been made to ensure the accuracy of the information contained in this document. No advice given or statements or recommendations made shall in any circumstances constitute or be deemed to constitute a warranty by Skyscape Cloud Services Limited as to the accuracy of such advice, statements or recommendations. Skyscape Cloud Services Limited shall not be liable for any loss, expense, damage or claim howsoever arising out of the advice given or not given or statements made or omitted to be made in connection with this document. No part of this document may be copied, reproduced, adapted or redistributed in any form or by any means without the express prior written consent of Skyscape Cloud Services Limited. Skyscape Cloud Services Limited 2014 All Rights Reserved. SC-GEN-106
white paper CLOUD SERVICES AND THE GOVERNMENT SECURITY CLASSIFICATIONS POLICY
white paper CLOUD SERVICES AND THE GOVERNMENT SECURITY CLASSIFICATIONS POLICY SECURITY EXECUTIVE SUMMARY The UK government has increasingly been encouraging the use of cloud services instead of traditional
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
Desktop Services (Production) Lot 2 - Platform as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open
Desktop Services (Production) Lot 2 - Platform as a Service Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
Service description RFL Virtual Data Centre
Service description RFL Virtual Data Centre IaaS G-Cloud 6 1 Contents Overview... 3 Highlights... 3 Description... 3 Use cases... 3 Use cases... 5 Use cases... 5 Pricing... 5 Information assurance... 5
VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION
TECHNICAL MARKETING DOCUMENTATION October 2014 Table of Contents Purpose and Overview.... 3 1.1 Background............................................................... 3 1.2 Target Audience...........................................................
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012
Unleash the IaaS Cloud About VMware vcloud Director and more VMUG.BE June 1 st 2012 2 Who? Viktor van den Berg Consultant @ PQR Former Dutch VMUG Leader Blogger at www.viktorious.nl Twitter @viktoriousss
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1
easy to adopt, easy to use, easy to leave service description API accessible Cloud Storage IaaS version 5.1 Contents Highlights... 3 Overview... 3 Example use cases... 4 Trial service... 4 Information
Technical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
Dedicated Compute Cloud. Lot 1 - Infrastructure as a Service. Version: 1.0, Issue Date: 09/12/2014. Classification: Open
Dedicated Compute Cloud Version: 1.0, Issue Date: 09/12/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 201416/12/2014. Other than for the sole purpose of evaluating this Response,
HP Service Manager Architecture and Security HP Software-as-a-Service
HP Service Manager Architecture and Security HP Software-as-a-Service Introduction...2 Architecture...2 Infrastructure Setup...4 Security Setup...4 Customer Infrastructure Requirements...5 Introduction
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM FOR VMWARE VCLOUD AIR
DEPLOYMENT GUIDE AVI NETWORKS CLOUD APPLICATION DELIVERY PLATFORM FOR VMWARE VCLOUD AIR Introduction VMware vcloud Air is a public cloud platform built on the proven foundation of vsphere and managed by
How to Guide: StorageCraft Cloud Services VPN
How to Guide: StorageCraft Cloud Services VPN CONTENTS Executive Summary...3 Setting up the VPN...4 Connecting to the VPN from a single computer...5 Providing a LAN site with access to the VPN...6 Conclusion...12
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Dell Cloud Services. Services
Dell Cloud Services Services The Cloud is Key Foundation of ITaaS Traditional Virtualized Private Cloud Distribution Today Public Cloud Distribution in 3 5 Years A mix of architectures can be employed
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
vcloud Suite Architecture Overview and Use Cases
vcloud Suite Architecture Overview and Use Cases vcloud Suite 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Best Practices: Pass-Through w/bypass (Bridge Mode)
Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Cisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
service description Document Management in the Cloud Software as a Service
easy to adopt, easy to use, easy to leave service description Document Management in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing... 4 Trial service...
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.
How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates
Email and Collaboration as a Service. Lot 3 - Software as a Service. Version: 2.0, Issue Date: 05/02/2014. Classification: Open
Email and Collaboration as a Service Version: 2.0, Issue Date: 05/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this Response,
Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016
Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms
FUJITSU Cloud IaaS Trusted Public S5 Connecting to a Virtual Machine (VM)
FUJITSU Cloud IaaS Trusted Public S5 Connecting to a Virtual Machine (VM) This guide describes the process for connecting to a IaaS Trusted Public S5 Virtual Machine Each Virtual System provides the ability
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
AT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM : How to Get Started. Version 2.0 January 2012
Version 2.0 January 2012 AT&T CLOUD SERVICES AT&T Synaptic Compute as a Service SM : How to Get Started 2012 AT&T Intellectual Property. All rights reserved. Notice Copyright AT&T Intellectual Property.
Monitoring Hybrid Cloud Applications in VMware vcloud Air
Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION
REDCENTRIC INFRASTRUCTURE AS A SERVICE SERVICE DEFINITION SD021 V2.2 Issue Date 01 July 2014 1) OVERVIEW Redcentric s Infrastructure as a Service (IaaS) enables the to consume server, storage and network
G-Cloud Service Definition. Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS
G-Cloud Service Definition Canopy Unmanaged Enterprise Private Cloud (IL3 Capable) IaaS Canopy Unmanaged Enterprise Private Cloud IaaS Canopy Unmanaged Enterprise Private Cloud delivers the efficiencies,
Your Guide to VMware Lab Manager Replacement
Your Guide to VMware Lab Manager Replacement white paper BROUGHT TO YOU BY SKYTAP 2 Your Guide to VMware Lab Manager Replacement Contents Your Guide to VMware Lab Manager Replacement... 3 The Power and
Open Source Sales Force Automation (SFA) in the Cloud SaaS
Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud
Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP Principal Systems Engineer Security Specialist Agenda What is the Cloud? Virtualization Basics
CSC GOVCLOUD MULTI-TENANT IAAS
SERVICE DESCRIPTION CSC GOVCLOUD MULTI-TENANT IAAS Approved G-Cloud 5 Supplier PAN GOVERNMENT CLOUD PLATFORM CSC is pleased to introduce our GovCloud Service; a pan Government as-a-service Cloud platform,
Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
Goliath Performance Monitor Prerequisites v11.6
v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Virtualization & Cloud Computing (2W-VnCC)
Virtualization & Cloud Computing (2W-VnCC) DETAILS OF THE SYLLABUS: Basics of Networking Types of Networking Networking Tools Basics of IP Addressing Subnet Mask & Subnetting MAC Address Ports : Physical
service description Email, SharePoint and File Archive in the Cloud Software as a Service
easy to adopt, easy to use, easy to leave service description Email, SharePoint and File Archive in the Cloud Software as a Service version 4.0 Contents Overview... 3 Example use cases... 3 Pricing...
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
2013 ovh.com. All rights reserved
Abstract During this session, the user will learn how to optimize security, rights, network layers to build Private, Hybrid & Public Cloud range of services based on a same infrastructure using VMware
Self-Service Provisioning and the Private Cloud
Self-Service Provisioning and the Private Cloud Using Microsoft Server Virtualization and Dell Compellent Storage Virtualization to Improve Delivery of Infrastructure as a Service Solution Overview Published:
DiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
AT&T Synaptic Compute as a Service SM
Version 1.5 June 2015 AT&T Synaptic Compute as a Service SM Instruction Guide to AT&T Operating System Usage 2015 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
RemoteApp Publishing on AWS
RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...
Documentum Document Management in the Cloud Service Definition
Documentum Document Management in the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Documentum Document
Backup to the Cloud Service Definition
Backup to the Cloud Service Definition Service Overview Working together with its Cloud Services Partner, Skyscape, SynApps Solutions (SynApps) has developed its Backup to the Cloud service to enable organisations
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Arctur Enterprise+ Cloud Services
Arctur Enterprise+ Cloud Services Enterprise Cloud with the lowest prices in the region! At Arctur we offer a high-end cloud service called Arctur Enterprise+ Cloud Services (AE+CS) that will enable you
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
Using Public IP Settings
Using Public IP Settings Interoute Virtual Data Centre Peter Farmer VDC Appliance Development Manager Interoute 01 Using Public IP Settings The Interoute Virtual Data Centre (VDC) Public IP Settings allow
Copyright Pivotal Software Inc, 2013-2014 1 of 351
Table of Contents Table of Contents Pivotal CF Documentation Getting Started with Pivotal CF Using Operations Manager Prerequisites to Deploying Operations Manager and Elastic Runtime Preparing Your Firewall
XenDesktop 7.5 on Amazon Web Services (AWS) Design Guide
XenDesktop 7.5 on Amazon Web Services (AWS) Design Guide July 14, 2014 Revision History Revision Change Description Updated By Date 0.1 Document Created Peter Bats April 17, 2014 1.0 Final Draft Peter
Bridging the gap between local IT and Cloud services, keeping you in control
Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,
Getting Started Guide: Deploying Puppet Enterprise in Microsoft Azure
Getting Started Guide: Deploying Puppet Enterprise in Microsoft Azure 1 Getting Started Guide with Microsoft Azure Getting Started Guide: Deploying Puppet Enterprise in Microsoft Azure Puppet Enterprise
Implementing PCoIP Proxy as a Security Server/Access Point Alternative
Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Palo Alto Networks AAC Lab Creation Guidelines v1.0
Palo Alto Networks AAC Lab Creation Guidelines v1.0 Contact Information Corporate Headquarters: Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 http://www.paloaltonetworks.com/ About this Guide
Virtual Desktop Infrastructure in
Introducing Virtual Desktop Infrastructure in Propalms TSE 6.0 1. Introduction: Propalms TSE 6.0 introduces the Virtual Desktop Infrastructure that lets you harness the power of virtualization technology.
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
NIS s Cloud Server is an enterprise-grade cloud application infrastructure designed specifically for small and mediumsized
NIS s Cloud Server TECHNICAL GUIDE INTRODUCTION NIS s Cloud Server is an enterprise-grade cloud application infrastructure designed specifically for small and mediumsized businesses. Cloud Server lets
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Disaster Recovery White Paper
Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase
M2M Series Routers. Port Forwarding / DMZ Setup
Introduction Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. Many internet services and applications use designated
vshield Quick Start Guide vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0
vshield Manager 4.1 vshield Edge 1.0 vshield App 1.0 vshield Endpoint 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
What s New with VMware vcloud Director 5.1
What s New with VMware vcloud Director 5.1 Feature Overview TECHNICAL WHITE PAPER JULY 2012 Table of Contents What s New with VMware vcloud Director 5.1.... 3 Software-Defined IaaS.... 3 Hardware and OS
