IBM Research Day: Containers Changing the Game in Cloud. Gosia Steinder Distinguished Research Staff Member
|
|
|
- Abner Caldwell
- 9 years ago
- Views:
Transcription
1 IBM Research Day: Containers Changing the Game in Cloud Gosia Steinder Distinguished Research Staff Member
2 Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 1
3 Containers are not just for microservices Multiple-tenants Single-tenant Docker Engine Host OS Server B Bare metal performance Improved density Docker Engine Host OS Server Container-native cloud Docker Engine Host OS Server B Simplified but flexible environment for customer Customer can deploy applications with flexible topologies, arbitrary runtimes Customers only worry about containerized applications Provider manages the operating system deployment, patching, monitoring, health Improved visibility and control Limited visibility and control Docker Engine Guest OS Hypervisor Host OS Server B B Docker Engine Guest OS Containers on IaaS cloud Docker Engine Guest OS Hypervisor Host OS Server Visibility and control Container has direct access to shared libraries on host Container has direct access to network, storage, accelerators Provider can inspect installed/running packages, configuration Provider can view memory usage stats Provider can monitor and control kernel calls Managed by customer Managed by provider Container-native cloud enables new differentiating capabilities in the areas of security, compliance, and performance management: with better guarantees and simpler to use.
4 Deep Visibility! Operational nalytics! Insights! Customer Value From Container - OS Info - Processes - Disk Info - Metrics - Network Info - Packages - Files - Config Info Docker Run1me - Docker metadata (docker inspect) - CPU metrics (/cgroup/cpuacct/) - Memory metrics (/cgroup/memory) - Docker history Config nnotator Vulnerability nnotator Compliance nnotator Password nnotator SW nnotator Licence nnotator Index (Data) Vuln. & Compl. nalysis Pipeline Service Secure Config nalysis Forensic Security & Compl. Remedia1on Service Plaorm - udit Subsystem - Syscall Tracing - System Integrity Seamless, no- touch, tamper- proof monitoring!
5 Example: Deep monitoring allows no-touch vulnerability analysis
6 Vulnerability dvisor enables ackve client control over container security Policy relaxed Policy strengthened New threats Percentage 100 allow 50 warn 0 Policy change Policy change block
7 Changing the game in cloud with containers Our point of view Container- nakve cloud allows customers to incrementally deliver, scale, and modify high value container- based workloads with unprecedented visibility, insight, and control, and enterprise- grade security, compliance, stability, and performance. lready in IBM Containers on Bluemix Industry- first container Container- na1ve plaorm for micro- services with isola1on expected for public cloud lways on, tamper- proof, built in monitoring of containers and images utomated, built- in vulnerability analy1cs of container images Vulnerability teskng built- in into container devops pipeline Innova1on pipeline Leading container plaorm with advanced orchestrakon, open architecture, increased security, operakonal excellence, and agility Customizable and detailed visibility of event- based and snapshot- based rich data for images and containers nalykcs based insight into security and compliance posture of images and containers based on customizable policies Control over security and compliance posture via devops- level checks and automated remediakon
8 Container orchestration open-source landscape Mesos (Mesosphere) resource management platform enabling partitioning of compute resources across multiple workloads Marathon (Mesosphere) platform as a service enabling deployment of 12-factor applications on top of Mesos Swarm and Compose (Docker) multi-host Docker container management system Kubernetes (Google) platform for the management of microservices enabling fine-grained composition of multi-container instances Today, these communities build all-encompassing stacks with significant functional overlap, divergent PIs, virtually no collaboration, and with significant gaps for large-scale production usage. Our goal: Evolve these opensource projects to become mature production-ready platforms based on our own production usage of these technologies Develop common container management PIs for cloud-native workloads and common open architecture Leverage Cloud Native Computing Foundation as a community to bring together these efforts and drive towards common open architecture
9 Why these choices? kubectl K8s master Compose PI server Scheduler state Etcd service Controller mger K8s minion K8s minion Kubelet Proxy Cdvisor Kubelet Proxy Cdvisor Native Docker experience Rich life-cycle management Pattern deployment via Compose Light-weight POD single-host pattern, fine-grained application composition Desired state management Replication groups with autorecovery, rolling-update, autoscaling Richly-featured microservice platform Framework Offers Start task Mesos Master llocation module Resource / task status Start task Mesos Slave Mesos allows Swarm and Kubernetes to share compute resources 8
10 Container-native Cloud rchitecture Image Registry Orchestration Orchestration (single container and container group) Cloud Services PI Private IP Network Private NFS Storage Container Host C C C C C C Operational Visibility pache Mesos Master Cluster Infrastructure (VMs & bare metal) 9
11 Swarm multi-tenancy and performance enhancements What we are working on: Full PI support on top of Mesos Private registry integration uthentication and authorization with pluggable auth/authz mechanisms Performance analysis and improvement uth Backen d Pass auth token Regular Docker engine PI Swarm auth plugin Override requests and responses Swarm docker calls Swarm Time to create a network grows linearly with the number of networks already present in swarm. Scalability challenge. Our improvement Time to create a network grows linearly with the number of networks already present in Docker engine. Scalability challenge. Working on it 10
12 Kubernetes performance enhancements What we are working on Improved modularity and configurability Network plugins Performance and scalability Default configuration: POD deployment times dramatically increase with system occupancy Tuned configuration: significant performance improvement (2 orders of magnitude) 11
13 Container networking in Swarm and Kubernetes Kubernetes Containers deployed via Swarm and Kubernetes can join the same L2/L3 network seamless private communication between Kubernetes and Swarm parts of an application. Kubernetes Minion gent Kubernetes Minion gent Swarm Master CNI plugin CNI plugin Docker Engine Docker Engine Docker Engine Docker Engine Neutron OVS/OVN network L2 overlays Subnets Security groups Firewalls Load balancers Rich management PIs libnetwork Kuryr libnetwork Kuryr Neutron libnetwork Kuryr libnetwork Kuryr 12
14 Using Swarm & Kubernetes with Mesos Mesos manages the actual resources on the cluster Incoming PI/CLI are stored in a queue, waiting for offers from Mesos The framework s scheduler is used to choose the target host from the Mesos offers The framework sends a task to Mesos slave to create the container Swarm Kubernetes Docker CLI/PI framework Scheduler Scheduler framework Offers Offers Tasks to Mesos Mesos Master Mesos gents
15 Looking forward: introducing Optimistic Offers in Mesos Framework scheduling logic Simpler, however: Under Utilization Starving Big Tasks Non-optimized schedule decision SL Enforcement Pessimistic Offer* Optimistic Offer* IBM is driving Mesos-1607 ( ) with Mesos community to support Optimistic Offers * from the Google Omega Whitepaper
16 Hardened Container Platform with Isolation and Runtime Integrity IBM led Docker community to enhance the engine to meet reasonable security expecta:ons for a cloud service. We are pursuing further innova:ons in isola:on and run:me integrity both in the community and in IBM cloud pla?orm. What: hardening of the underlying compute platform to: Prevent breach of isolation through container privilege escalation attacks Detect, prevent and mitigate resource exhaustion (DoS) attacks Efficiently manage and audit of network isolation across the cloud infrastructure Continuous runtime and enforcement of platform integrity to protect against installation of unknown software Why: Strong level of assurance of isolation from other cloud workloads, without additional management complexity and overhead of hypervisors and VMs Increased visibility afforded by shared platform Kernel (files, processes, system calls) allows earlier detection of anomalies bility to continuously verify (attest) workload integrity
17 Securing the container platform Coloring: Docker supports this out of box. Docker or Linux gap we are working on it Inherent issue Restrict Docker PI Calls Docker Registry Docker PI allows users to create privileged containers or change capabilities without authorization. Provider must restrict access to certain PIs and ensure access to PI is authorized. Use V2 registry it has signatures for images and layers. Isolation from other containers Resource isolation Capability limitation Kernel isolation Host root isolation Docker Engine Configuration pprmor Host Security Hardware ssisted Verification and Isolation Use kernel namespaces for isolating from other containers: pid, net, ipc, mnt, utc, uts.. Leverage cgroups for resource isolation. Network traffic shaping is an issue with default networking. No ability to isolate process id resources. Not all control knobs exposed in CLI.. Limit the set of Linux capabilities each container is started with. Docker, by default drops most capabilities. Ensure that changes is capabilities are properly authorized. ll Docker containers share host kernel, but not all syscalls and capabilities are exposed to them. Inherent issue with containers. User namespaces: container root is de-priivileged on host. Docker: in v1.10 root in all containers mapped to same unprivileged id on host Work in progress:: Enable configurable mappings (requires Linux kernel improvement) User pprmor profiles for containers (customizable) Provider must ensure proper pprmor configuration. Use pprmor for daemon confinement (customizable). Provider must ensure proper pprmor configuration. Follow best practice for securing a host (e.g., STIG firewall, auditd) Use Trusted computing and TPM for host integrity verification and VT-d for better isolation
18 Security Configuration nalytics: Detection of Misconfiguration & Breach of Isolation Enhanced Visibility template Event & Log Repositories (e.g. logstash) Security Backend Configuration Database nalytics Security Configuration nalytics Detects Configuration Drift Generate lerts & Remediation ctions based on Risk and sset Value (see next) ication Developer builds & deploys complex app with (network) security policies FW, IPS/IDS, Forward notifications on orchestration events, PI calls, Kubernetes Docker Compose Docker Engine Monitoring Ironic Nova Neutron Cloud User modifies running application settings to improve performance (e.g. change IPS policies) Tenant 1 Tenant 2 Tenant 3 Generate alerts if any misconfiguration is detected ssess relative risk of configuration anomaly
19 Recommended for you Demos of technology in discussed today: CCI-7280 : IBM Research Day Demo: Running Containers on Swarm and Kubernetes at Data Center Scale Related Research presentations and demos: YPS-7294: IBM Research Day Demo: Scale on IBM Power Systems, coming next SD-7288: IBM Research Day Demo: Vulnerability Remediation Service, happened this morning LBs and Education on IBM Containers: TCD-1506: Hands-On Lab Demonstrating the Enterprise-Grade Capabilities of IBM Containers CCD-6713: Meet the Experts Who re Leveraging Docker Containers and Microservices to Run IBM Containers CCD-3865: Leveraging IBM Containers for Enterprise-Scale Software Development CDL-9409: Learn IBM Conatiners in 15 minutes InnerCircle presentations: DEV-6859: IBM and Docker Container Offerings, Strategy and Roadmap Core curriculum: CCD-2715: Building an Enterprise PaaS with Bluemix, Docker Container Services and Watson on IBM Power Systems COC-3243: IBM Containers and Open Technologies: Container Service Designed for the Enterprise CCD-3518: The Bluemix Triple Threat: Cloud Foundry, Containers and Virtual Machines 18
20 Notices and Disclaimers Copyright 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GS DP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "S IS" WITHOUT NY WRRNTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHLL IBM BE LIBLE FOR NY DMGE RISING FROM THE USE OF THIS INFORMTION, INCLUDING BUT NOT LIMITED TO, LOSS OF DT, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. ny statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. ctual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. ll materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law 19
21 Notices and Disclaimers Con t. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLIMS LL WRRNTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WRRNTIES OF MERCHNTBILITY ND FITNESS FOR PRTICULR PURPOSE. The provision of the information contained h erein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, spera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FSP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGMON, OpenPower, Purenalytics, Pureication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoD, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: 20
22 Thank You Your Feedback is Important! ccess the InterConnect 2016 Conference ttendee Portal to complete your session surveys from your smartphone, laptop or conference kiosk.
Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation
Requirements Change Management and Artifact Workflow DOP-1027 DOORS Next Generation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team
The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team Please Note: IBM s statements regarding its plans, directions, and intent are subject to change
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery Carm Janneteau, Product Manager, Watson Analytics Robert Hatfield, Development Manager, Watson
IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley
IBM Watson IoT Platform Analytics Real-Time Insights Wayne Riley What Does IoT Real-Time Insights Do? Performs analytics on IoT data as in arrives at the IBM Watson IoT Platform Analytics applied immediately
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Ryan Dennings Auto-Owners Insurance Company October 28, 2015 2015 IBM Corporation Overview Auto-Owners Insurance
Cryptographic Keys Life Cycle Management for your Company
Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences 09/09/2015 #ibmamplify @elianetozman and @jbrett 2015 IBM Corporation PLEASE NOTE: IBM s statements regarding its plans, directions,
Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami
Taking the next hot mobile video game live with Docker and IBM SoftLayer Scott Porter, Daniel Krook, Shaun Murakami Agenda Mobile video gaming on the cloud The video gaming market in 2016 Typical mobile
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India Abhijit Thosar, ICICI Bank Limited Nishant Kulkarni, IBM Introduction ICICI Bank is an is an Indian
BBP-2665 IBM BPM Process Modeling Experience on the Web
BBP-2665 IBM BPM Process Modeling Experience on the Web Victor Chan STSM, IBM BPM Tools & User Interface Thu, 25-Feb 11:30 AM - 12:15 PM Mandalay Bay SOUTH - Reef Ballroom D Please Note: IBM s statements
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Please Note: IBM s statements regarding its plans, directions,
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture [email protected].
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions Eddie Lin IBM STSM, DS8000 Architecture [email protected] Please Note: IBM s statements regarding its plans, directions,
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize Chris Walker IBM Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect
Soar into the API Economy by Moving Services and Metadata from WSRR to IBM API Connect Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience MBM-5829 Thorsten Gau (@tgau) IBM Distinguished Engineer v04 Zurich Insurance is... helping customers understand and protect
Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)
Provably Secure Data Protection in the Cloud ICDES (IBM Cloud Data Encryption Services) Agenda Cloud Security and Intro to ICDES Manish Aggarwal, IBM, Offering Manager Cloud Client Case Study: Crohn s
Deliverability 101. #amplify15. 2015 International Business Machines Corporation
Deliverability 101 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape
STRATEGIC WHITE PAPER The next step in server virtualization: How containers are changing the cloud and application landscape Abstract Container-based server virtualization is gaining in popularity, due
Deliverability 201. #amplify15. 2015 International Business Machines Corporation
Deliverability 201 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
The Virtualization Practice
The Virtualization Practice White Paper: Managing Applications in Docker Containers Bernd Harzog Analyst Virtualization and Cloud Performance Management October 2014 Abstract Docker has captured the attention
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Notices and Disclaimers Copyright 2016 by International
Cisco Application-Centric Infrastructure (ACI) and Linux Containers
White Paper Cisco Application-Centric Infrastructure (ACI) and Linux Containers What You Will Learn Linux containers are quickly gaining traction as a new way of building, deploying, and managing applications
Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here
Ro Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework Subtitle here Please Note: Ro IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
Deploying a private database cloud on z Systems
Deploying a private database cloud on z Systems How DPS evolved over time and what is coming next SAP on z IBM Systems Conference Holger Scheller - IBM April 13 th, 2016 Trademarks The following are trademarks
Building Docker Cloud Services with Virtuozzo
Building Docker Cloud Services with Virtuozzo Improving security and performance of application containers services in the cloud EXECUTIVE SUMMARY Application containers, and Docker in particular, are
YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer
YSS-1841 IBM Cloud Storage Options Tony Pearson IBM Master Inventor and Senior Software Engineer Cloud Storage Taxonomy Ephemeral Storage Typically boot volumes, page files and temporary data Goes away
WHITEPAPER INTRODUCTION TO CONTAINER SECURITY. Introduction to Container Security
Introduction to Container Security Table of Contents Executive Summary 3 The Docker Platform 3 Linux Best Practices and Default Docker Security 3 Process Restrictions 4 File & Device Restrictions 4 Application
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Keynote: Cyber Intelligence and Cyber Security Overview
3/08/205 Keynote: Cyber and Cyber Security Overview David Waxman Executive Architect EIA Bob Stasio EIA for Cyber Security Product Manager Ralph Klaassen Senior Architect EIA 3/08/205 Important Disclaimer
DataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Private Cloud Management
Private Cloud Management Speaker Systems Engineer Unified Data Center & Cloud Team Germany Juni 2016 Agenda Cisco Enterprise Cloud Suite Two Speeds of Applications DevOps Starting Point into PaaS Cloud
Taking control of the virtual image lifecycle process
IBM Software Thought Leadership White Paper March 2012 Taking control of the virtual image lifecycle process Putting virtual images to work for you 2 Taking control of the virtual image lifecycle process
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualised data centres Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
Security of Cloud Computing for the Power Grid
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 Security of Cloud Computing for the Power Grid Industry Panel November 12, 2014 UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
Collaborative DevOps Learn the magic of Continuous Delivery. Saurabh Agarwal Product Engineering, DevOps Solutions [email protected].
Collaborative DevOps Learn the magic of Continuous Delivery Saurabh Agarwal Product Engineering, DevOps Solutions [email protected] Please note IBM s statements regarding its plans, directions, and intent
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
An Analysis of Container-based Platforms for NFV
An Analysis of Container-based Platforms for NFV Sriram Natarajan, Deutsche Telekom Inc. Ramki Krishnan, Dell Inc. Anoop Ghanwani, Dell Inc. Dilip Krishnaswamy, IBM Research Peter Willis, BT Plc Ashay
Chris Rosen, Technical Product Manager for IBM Containers, [email protected] Lin Sun, Senior Software Engineer for IBM Containers, [email protected].
Chris Rosen, Technical Product Manager for IBM Containers, [email protected] Lin Sun, Senior Software Engineer for IBM Containers, [email protected] Please Note IBM s statements regarding its plans, directions,
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
WHITE PAPER. Five Steps to Better Application Monitoring and Troubleshooting
WHITE PAPER Five Steps to Better Application Monitoring and Troubleshooting There is no doubt that application monitoring and troubleshooting will evolve with the shift to modern applications. The only
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service
CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service Open Data Center Alliance, Inc. 3855 SW 153 rd Dr. Beaverton, OR 97003 USA Phone +1 503-619-2368 Fax: +1 503-644-6708 Email:
Zend and IBM: Bringing the power of PHP applications to the enterprise
Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages
Java and Other Languages
Java and Other Languages Chris Bailey: STSM, IBM Runtime Monitoring 2015 IBM Corporation A Quick Survey 2 Percentage of Audience What languages do you use? 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Java
Communications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
Kubernetes-Murano Integration in Mirantis OpenStack 7.0
Kubernetes-Murano Integration in Mirantis OpenStack 7.0 December 3, 2015 John Jainschigg (Mirantis), Bhasker Nallapothula (Biarca) and Ihor Dvoretskyi (Mirantis) www.mirantis.com A few introductions John
IBM Bluemix, the digital innovation platform
IBM Bluemix, the digital innovation platform Linux day 2015, Torino Greta Boffi, IBM Cloud EcoD 1 Cloud Service Models IBM SaaS Bluemix eliminates / dramatically simplifies various tasks: Traditional On-Premises
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
2015 IBM Continuous Engineering Open Labs Target to better LEARNING
2015 IBM Continuous Engineering Open Labs Target to better LEARNING (NO COST - not a substitute for full training courses) Choose from one or more of these Self-Paced, Hands-On Labs: DMT 3722 - Learn to
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16
Do Containers fully 'contain' security issues? A closer look at Docker and Warden. By Farshad Abasi, 2015-09-16 Overview What are Containers? Containers and The Cloud Containerization vs. H/W Virtualization
Managing Kubernetes and OpenShift with ManageIQ. Alissa Bonas, Dublin 2015
Managing Kubernetes and OpenShift with ManageIQ Alissa Bonas, Dublin 2015 The stages of containers world Containerizing an app Run a container Run multiple containers Run multiple containers Orchestrate
Best Practices for Monitoring a Vmware Environment. Gary Powell Senior Consultant IBM SWG Tivoli
Best Practices for Monitoring a Vmware Environment Gary Powell Senior Consultant IBM SWG Tivoli Virtualization without Service Management is even more dangerous than not virtualizing in the first place
Implement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
Jenkins World Tour 2015 Santa Clara, CA, September 2-3
1 Jenkins World Tour 2015 Santa Clara, CA, September 2-3 Continuous Delivery with Container Ecosystem CAD @ Platform Equinix - Overview CAD Current Industry - Opportunities Monolithic to Micro Service
IBM Software Integrated Service Management: Visibility. Control. Automation.
IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming
IBM SmartCloud Workload Automation
IBM SmartCloud Workload Automation Highly scalable, fault-tolerant solution offers simplicity, automation and cloud integration Highlights Gain visibility into and manage hundreds of thousands of jobs
Unmasking Virtualization Security. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Eric A. Hibbard, CISSP, CISA Hitachi Data Systems SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Distributed Scheduling with Apache Mesos in the Cloud. PhillyETE - April, 2015 Diptanu Gon Choudhury @diptanu
Distributed Scheduling with Apache Mesos in the Cloud PhillyETE - April, 2015 Diptanu Gon Choudhury @diptanu Who am I? Distributed Systems/Infrastructure Engineer in the Platform Engineering Group Design
Lunch and Learn: BlueMix to Mainframe making development accessible in the
Lunch and Learn: BlueMix to Mainframe making development accessible in the Cloud Rosalind Radcliffe IBM Distinguished Engineer, IBM Academy of Technology [email protected] @RosalindRad Insert Custom
IBM FlashSystem Cloud Performance and Capability
IBM FlashSystem Cloud Performance and Capability Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information
Intel Service Assurance Administrator. Product Overview
Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an
Alan Conley, John Belamaric. Bloxfest - Containers
Alan Conley, John Belamaric Bloxfest - Containers May 2016 Infoblox Microservices & Containers Container based microservices are an emerging approach for rapidly developing and delivering applications.
IBM Bluemix. The Digital Innovation Platform. Simon Moser ([email protected]) @mosersd
IBM Bluemix The Digital Innovation Platform Simon Moser ([email protected]) @mosersd Who am I? - Senior Technical Staff Member at IBM Research & Development Lab in Böblingen, Germany - Bluemix Application
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what
What new with Informix Software as a Service and Bluemix? Brian Hughes IBM
What new with Informix Software as a Service and Bluemix? Brian Hughes IBM 1 Acknowledgements and Disclaimers Availability. References in this presentation to IBM products, programs, or services do not
Introduction to IBM Worklight Mobile Platform
Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
DevOps for the Mainframe
DevOps for the Mainframe Rosalind Radcliffe IBM Distinguished Engineer, Enterprise Modernization Solution Architect [email protected] 1 Please note IBM s statements regarding its plans, directions, and
Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)
Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms. In a tale
CA Automation Suite for Data Centers
PRODUCT SHEET CA Automation Suite for Data Centers agility made possible Technology has outpaced the ability to manage it manually in every large enterprise and many smaller ones. Failure to build and
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
IBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
WebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
Cloud computing White paper November 2009. IBM Point of View: Security and Cloud Computing
White paper November 2009 IBM Point of View: Security and Cloud Computing Page 2 Table of Contents Introduction... 3 Address cloud security the grand challenge... 4 Evaluate different models of cloud computing...
How to Deliver Measurable Business Value with the Enterprise CMDB
How to Deliver Measurable Business Value with the Enterprise CMDB James Moore [email protected] Product Manager, Business Service, Netcool/Impact 2010 IBM Corporation Agenda What is a CMDB? What are CMDB
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
RED HAT CONTAINER STRATEGY
RED HAT CONTAINER STRATEGY An introduction to Atomic Enterprise Platform and OpenShift 3 Gavin McDougall Senior Solution Architect AGENDA Software disrupts business What are Containers? Misconceptions
DevOps Best Practices for Mobile Apps. Sanjeev Sharma IBM Software Group
DevOps Best Practices for Mobile Apps Sanjeev Sharma IBM Software Group Me 18 year in the software industry 15+ years he has been a solution architect with IBM Areas of work: o DevOps o Enterprise Architecture
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
