SPECS Secure Provisioning of Cloud Services based on SLA Management
|
|
- Rafe Sharp
- 8 years ago
- Views:
Transcription
1 SPECS Secure Provisioning of Cloud Services based on SLA Management
2 SPECS Project CeRICT, Italy (coordinator) TUD, Germany IeAT, Romania CSA, United Kingdom FP7-ICT Project Start: 1/11/2013 Project Type: STREP Duration: 30M Total Funding: 3.5 M EU Contribution: 2.4 M XLAB, Slovenia EISI, Ireland
3 SPECS - The Problem Imagine : You are a corporate security manager, You want to migrate some applications to the Cloud. Your Resources Cloud Provider End User Your data
4 SPECS The Problem Data resides on a remote Cloud Service Provider (CSP). Data is security sensitive: Assurance that the CSP's personnel will not have access to your data guarantee that only authorized people can access your data assess a CSP's ability to meet the security requirements, and select a CSP on this basis. What are the security trades-offs offered by different CSPs? - How does one continuously monitor, and enforce the agreed Cloud security levels with the CSP?
5 SPECS - The Problem Denial of Services Your Resources Cloud Provider End User WHO GRANTS YOU? Your data Privacy Cloud Provider
6 SPECS - The Problem Your Resources Denial of Services SLA Cloud Provider End User SPECS SLA Privacy Cloud Provider Your data
7 SPECS Core Idea Problem Statement: End-User Cloud Security (How to compare CSP?, What they grant? How to improve their security features if they do not grant enough? ) Approach: Security-as-a-Service (SECaaS), a Platform which offers security services. Service Level Agreement (SLA) for Security. End-User and CSP features described through SLAs. The SECaaS granted through the SLA life cycle
8 SPECS Platform - WHO GENERAL MODEL Actors: Customers Developer Service Provider Systems: Cloud Application Cloud Platform Cloud Providers
9 SPECS Platform - WHO Interaction Model 1 Hosted Platform Buy resources from Cloud Offer (Security) Services to End Users Buy/Broker resources from Cloud for end user
10 SPECS Platform - WHO Interaction Model 2 Hosting CSP Has its own resources Add Security to its Services for End Users
11 SPECS Platform - WHO Interaction Model 3 End User Platform Buy resources from Cloud End User improve Security on the target services
12 SPECS Platform - HOW The Stack
13 SPECS Platform HOW SLA Management SLA among Users, SPECS and Providers Negotiation Finding the Agreement Monitoring Veryfing the respect of Agreement Enforcement Take Action to grant the Agreement
14 SPECS Platform - HOW SLA Negotiation Conditions: SLA is not fully defined, customer(s) and provider(s) conduct a negotiation process on requirements/services to find agreement Goals Service Provider's view: evaluate the services requested, matching to what can be granted. evaluate the risks related to incorrect evaluation, The customer' s view: evaluate the trade-off across service specifications and the corresponding costs.
15 SPECS Platform HOW - Negotiation Example Scenario: Storing Confidential Data Problem: A User wants to store data on remote Cloud providers, and with data confidentiality requirements. State of the Art: The User chooses a Cloud provider with storage features. Manually checks their SLA, verify the kind of security features offered. Studies different offerings, and chooses. Limitations: Manual evaluation of security. SPECS solution: Single access point: User accesses SPECS services and utilized it to negotiate security requirements. SPECS helps specify needed requirements on a provider even if it does not support it natively
16 SPECS Platform HOW - Negotiation Example Scenario: Security-Oriented Cloud Federation (I) Problem: A User consumes the IaaS resources from a Cloud Federation The User has security requirements that must be fulfilled and observed during the whole usage period. The User may be a Customer or a Cloud Provider. Limitations: No systematic solution for managing the life-cycle of User s security requiremets in a Cloud Federation. Quality of Security (QoSec), refers to the (possibly quantitative) evaluation of security granted by a CSP. No standardized means to specify security requested/provided between Users and CSPs respectively. Manually search for appropriate Cloud offering, particularly in the field of security and privacy possibilities (attributes). SPECS solution: Cloud security can be specified in the form of SLAs. SPECS Security-as-a-Service broker can be deployed between End Users and Cloud Federations to automatically manage the whole SLA life-cycle. SPECS Security-as-a-Service can be used to deploy additional security components when needed by the deployed services SPECS Security-as-a-Service broker can be deployed between End Users and various Clouds or even Cloud Federations to automatically manage the whole SLA life-cycle.
17 SPECS Platform HOW - Negotiation Example Scenario: Security-Oriented Cloud Federation (II) SPECS solution: Cloud security can be specified in the form of SLAs. SPECS Security-as-a-Service broker can be deployed between End Users and Cloud Federations to automatically manage the whole SLA life-cycle. SPECS Security-as-a-Service can be used to deploy additional security components when needed by the deployed services SPECS Security-as-a-Service broker can be deployed between End Users and various Clouds or even Cloud Federations to automatically manage the whole SLA life-cycle.
18 SPECS Platform - HOW SLA Monitoring Conditions: A set of signed SLAs Goals SLA is checked for its actual degree of conformance or for penalties if in violation. Service Provider s view: verifying that the SLA are respected (eventually access infrastructure inaccessible to customers) generating alerts before SLAs are broken, in order to activate remedial actions. Customer's view: Having grants bout the effctive respect of agreed SLAs.
19 SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status Problem: A User wants real-time status on SLA accomplishment. State of the Art: The User needs to accept the supplier monitoring or supplier metrics. The User must create local measurements, for example time to resolve an issue, or down time of the service. Limitations: User intervention needed. SPECS solution: SPECS provides a full set of features of monitoring SLA accomplishment. SPECS provides a simple access point to monitoring system. Users know in near real-time what is the status of the SLA.
20 Problem: SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status (I) A Customer consumes Cloud services by different CSPs. The Customer needs the tools to systematically reason about Cloud SLAs, including side-by-side CSP comparison, negotiation and continuous monitoring. Limitations: Lack of the automated tools to aid prospective Cloud customers taking decisions about the stored CSP information (e.g., comparing different providers, evaluating trade-offs, etc.). For current Cloud customers, there are not tools allowing them to monitor in real-time the fulfillment of the contracted Cloud SLA. Lack of customization, as the users are only able to assess compliance with respect to the full SLA used by the repository (i.e., not with subsets of these SLA). SPECS solution: With SPECS it is possible to provide prospective/existing Cloud customers with a real-time Dashboard to enable basic features (e.g., comparing two or more CSP side-by-side) and, also more advanced SLA operations (e.g., real time monitoring of specific SLA clauses). This Dashboard can be integrated to existing repositories such as STAR, to provide a full-solution for Cloud users.
21 SPECS Platform HOW - Monitoring Example Scenario: SLA Run Time Status (II) SPECS solution: With SPECS it is possible to provide prospective/existing Cloud customers with a real-time Dashboard to enable basic features (e.g., comparing two or more CSP side-by-side) and, also more advanced SLA operations (e.g., real time monitoring of specific SLA clauses). This Dashboard can be integrated to existing repositories such as STAR, to provide a full-solution for Cloud users.
22 SPECS Platform - HOW SLA Enforcement Conditions: A set of signed SLAs Goals the actions needed to respect the SLAs are effectively taken Service Provider s view: At service startup/dynamicly (reconfiguration) Activation of software modules, acquisition of resources, Policy definition and management Improving/selecting security features of Cloud Providers Customer's view: the application of the service requirements explicitly requested into the SLA
23 SPECS Platform - HOW SLA Enforcement Conditions: A set of signed SLAs Goals the actions needed to respect the SLAs are effectively taken Service Provider s view: At service startup/dynamicly (reconfiguration) Activation of software modules, acquisition of resources, Policy definition and management Improving/selecting security features of Cloud Providers Customer's view: the application of the service requirements explicitly requested into the SLA
24 Milestones MS Milestone name Date Means of verification 1 Preliminary Framework Definition 2 Framework Design and Proof-of-Concept M6 D1.1.1,D1.2,D2.1,D3.1,D4.1, D4.2, D6.1, D7.1 M12 D1.1.2, D2.1.2, D2.2, D3.2, D4.1.2, D4.4.2, D4.3.1, D4.4.1, D4.5.1, D , D , D6.2.1, D Framework Prototype M18 D1.3, D1.6, D2.3.1, D3.3, D3.4.1, D , D Framework Operative M24 D1.1.3, D1.4, D2.2, D4.2, Prototype D4.3, D4.5.2, D6.2.2, D7.2.2, 5 Framework Operative M30 D1.5, D1.6.2, D2.3.2, D.3.4.2, D.4.3.3, D.4.5.3, D5.2, D5.3., D5.4, D6.2.3, D7.2.3, D7.3
25 Objective 1: Design an innovative Security Platform-as-a-Service Offer a solution for the SPECS Security-as-a- Service approach, proposing a clear design for a Platform-as-a-Service dedicated to security services and to SLA life cycle management. SO1.1 Design a Security SLA-Oriented Platformas-a-Service SO1.2 Design services dedicated to security SLA Management SO1.3 Design of the interaction protocols among different SLA modules
26 Objective 2: Allow user-centric negotiation of Cloud SLA Propose solution for helping End Users to negotiate Cloud SLA effectively with a set of CSP, by understanding the resulting trade-offs. SO2.1 Design of user-centric Cloud SLA negotiation solution for security parameters SO2.2 Develop the techniques to systematically evaluate the trade-offs related with offered security in Cloud SLA SO2.3 Provide a reference implementation of security negotiation services for Cloud SLA
27 Objective 3: Innovative Solutions for Continuous Security Monitoring Design and implement SLA monitoring solutions dedicated to continuously control the security offered by CSP and to help ensuring the granted QoSec. SO3.1 Identify the requirements for continuously monitoring the fulfillment of SLA in what concerns to the SPECS measures of interest. SO3.2 Evaluate the appropriateness of the stateof-the-art services for SPECS monitoring. SO3.4 Propose innovative monitoring services
28 Objective 4: Develop Innovative Security Services to Enforce SLA Offer a clear design and an implementation of services dedicated to grant security features to Cloud end users in order to fulfill an agreed SLA and, keep a sustained QoSec.. SO4.1 Services to check the effective availability of security features, supprt Negotiation, grant SLAs. SO4.2 Services able to monitor and react in order to respect an agreed Cloud SLA. SO4.3 Provide a sustained QoSec during the life cycle of the application/service, as agreed on the Cloud SLA- SO4.4 Offer additional security services to end users in order to sustain a minimum required QoSec.
29 Objective 5: Real-world validation of SPECS outcomes Implement two relevant use cases to empirically validate the outcomes of the project. SO5.1 Definition of SPECS Platform Use Cases through a set of real applications SO5.2 Design and implement real applications using the SPECS platform.
Dr. Jesus Luna Garcia
Cloud Accountability and SLAs: research challenges and opportunities Dr. Jesus Luna Garcia jluna@cloudsecurityalliance.org Outline Cloud SLA s one year ago Open Research Challenges: Standardization/certification
More informationMaking SLA s Useful for Security
Making SLA s Useful for Security Neeraj Suri www.deeds.informatik.tu-darmstadt.de 11/15/2013 Suri/CIRRUS 1 Service Level Agreement (SLA) Contract which describes the Service, the associated quality levels
More informationPreliminary Design of a Platform-as-a-Service to Provide Security in Cloud
Preliminary Design of a Platform-as-a-Service to Provide Security in Valentina Casola 1, Alessandra De Benedictis 1, Massimiliano Rak 2 and Umberto Villano 3 1 Università Federico II di Napoli, Dipartimento
More informationAccelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance
Accelerating Cloud adoption with Security Level Agreements automation, monitoring and industry standards compliance Cirrus Workshop, Vienna, Austria, November 19, 2013 Dr. Said Tabet Senior Technologist
More informationLeveraging the Potential of Cloud Security Service Level Agreements through Standards
1 Leveraging the Potential of Cloud Security Service Level Agreements through Standards Jesus Luna, Neeraj Suri, Michaela Iorga and Anil Karmel Abstract: Despite the undisputed advantages of Cloud computing,
More informationNokia Siemens Networks Device Management Solution Executive summary
NOKIA SIEMENS NETWORKS DEVICE MANAGEMENT SOLUTION Nokia Siemens Networks Device Management Solution Executive summary 2/6 NOKIA SIEMENS NETWORKS DEVICE MANAGEMENT SOLUTION 1. Introduction In today s markets,
More informationBecoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
More informationMinder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
More informationA Model for Accomplishing and Managing Dynamic Cloud Federations
A Model for Accomplishing and Managing Dynamic Cloud Federations London, CFM workshop 2014, December 8 th Giuseppe Andronico, INFN CT Marco Fargetta (INFN CT), Maurizio Paone (INFN CT), Salvatore Monforte
More informationThe Application Readiness Level Metric
The Application Readiness Level Metric NASA Application Readiness Levels (ARLs) The NASA Applied Sciences Program has instituted a nine-step Application Readiness Level (ARL) index to track and manage
More informationSelf-protecting multi-cloud applications
Self-protecting multi-cloud applications Antonio M. Ortiz 1, Erkuden Rios 2, Wissam Mallouli 1, Eider Iturbe 2, Edgardo Montes de Oca 1 1 Montimage R&D. Paris, France Email: {antonio.ortiz, wissam.mallouli,
More informationPICSE survey. (PICSE: Procurement Innovation for Cloud services in Europe)
PICSE survey (PICSE: Procurement Innovation for Cloud services in Europe) To ensure that Europe reaps the benefits of the shift to cloud computing, there is the need to focus on new ways of procuring cloud
More informationConsor;um (partners) ARES conference Toulouse, 24 August 2015
1 2 3 Consor;um (partners) 4 The honest- but- curious CSP model (cloud service provider)? 5 an attack tolerant framework Ambi;on in the context of honest-but-curious CSPs preserving the benefits associated
More informationAudit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services
O F F I C E O F IN S P E C TO R GENERAL Audit Report 2014-IT-C-016 Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services September 30, 2014 B O A R D O F G O V E R
More informationHelix Nebula: Secure Brokering of Cloud Resources for escience. Dr. Jesus Luna Garcia
Helix Nebula: Secure Brokering of Cloud Resources for escience Dr. Jesus Luna Garcia Outline Background The Blue-Box architecture Security Goals and Requirements Let s imagine Why a Public-Private Partnership
More informationSeamless adaptive multi- cloud management of service- based applications. European Open Cloud Collaboration Workshop, May 15, 2014, Brussels
Seamless adaptive multi- cloud management of service- based applications European Open Cloud Collaboration Workshop, May 15, 2014, Brussels Interoperability and portability are a few of the main challenges
More informationThe Next Generation Data Centers: SPECS and The 3 rd Platform.
The Next Generation Data Centers: SPECS and The 3 rd Platform. Dr. Silvio La Porta Senior Research Scientist EMC Research Europe Dr. Said Tabet Senior Technology Strategist Corporate CTO Office, EMC 1
More informationASCETiC Whitepaper. Motivation. ASCETiC Toolbox Business Goals. Approach
ASCETiC Whitepaper Motivation The increased usage of ICT, together with growing energy costs and the need to reduce greenhouse gases emissions call for energy-efficient technologies that decrease the overall
More information8 Tips for Winning the IT Asset Management Challenge START
Tips for Winning the IT Asset Management Challenge START A successful IT Asset Management (ITAM) program can help you lower your costs and increase your asset utilization. You benefit by avoiding unplanned
More informationOpen Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0
sm Open Data Center Alliance Usage: Cloud Based Identity Governance and Auditing REV. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Reference Framework... 5 Context... 6 Applicability...
More informationManaging Cloud Computing Services in the Enterprise
WHITE PAPER Managing Cloud Computing Services in the Enterprise THE VALUE OF A SINGLE, INTEGRATED CLOUD MANAGEMENT PLATFORM Managing Cloud Computing Services in the Enterprise 2 How does your organization
More informationCloud Federations in Contrail
Cloud Federations in Contrail Emanuele Carlini 1,3, Massimo Coppola 1, Patrizio Dazzi 1, Laura Ricci 1,2, GiacomoRighetti 1,2 " 1 - CNR - ISTI, Pisa, Italy" 2 - University of Pisa, C.S. Dept" 3 - IMT Lucca,
More informationOutline. Introduction Cloud service models The worst mistakes in cloud security Conclusion
The Worst Mistakes in Cloud Security Dr. Eugene Schultz, CISSP, CISM, GSLC Chief Technology Officer Emagined Security Eugene.Schultz@emagined.com ISSA-LA Security Summit West Los Angeles, California June
More informationConsulting Company providing expertise and advices around Collaboration, Communication solutions, Cloud & Business Intelligence
Consulting Company providing expertise and advices around Collaboration, Communication solutions, Cloud & Business Intelligence Who we are? What we believe in? What we deliver? Who we are? We are a team
More informationA Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
More informationOFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA, CRISC Senior Auditor:
More informationContents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com
Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and
More informationBMC Software Consulting Services. Fermilab Computing Division Service Catalog & Communications: Process and Procedures
BMC Software Consulting Services Service Catalog & Communications: Process and Procedures Policies, Client: Date : Version : Fermilab 02/12/2009 1.0 GENERAL Description Purpose This document establishes
More informationUnlock the code IT Asset Management
HP Software: Apps meet Ops 2015 Unlock the code IT Asset Management Luc Landuyt/ April 2 nd, 2015 Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
More informationPublic Cloud Workshop Offerings
Cloud Perspectives a division of Woodward Systems Inc. Public Cloud Workshop Offerings Cloud Computing Measurement and Governance in the Cloud Duration: 1 Day Purpose: This workshop will benefit those
More informationMonitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle
Monitoring, Managing and Supporting Enterprise Clouds with Oracle Enterprise Manager 12c Name, Title Oracle Complete Cloud Lifecycle Management Optimize Plan Meter & Charge Manage Applications and Business
More informationSentinet for BizTalk Server SENTINET 3.1
for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,
More informationOverview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
More informationUNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010
UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer
More informationCLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
More informationSP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF
NFX FOR MSP SOLUTION BRIEF SP Monitor Jump Start Security-as-a-Service Designed to give you everything you need to get started immediately providing security-as-a service, SP Monitor is a real-time event
More informationDaniel Field, Atos Spain. Towards the European Open Science Cloud, Heidelberg, 20/01/2016
Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016 SLALOM is ready to use Cloud SLAs SLALOM will take theory to practice, providing a trusted verifiable starting point
More informationResearch and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects Version 2.
Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects Version 2.0 Authors: Beatriz Gallego-Nicasio Crespo, ATOS Spain S.A.,
More informationCA API Management SaaS
SaaS Listing CA API Management SaaS 1. Introduction This document provides standards and features that apply to the CA API Management SaaS offering ( Service ) provided to the Customer and defines the
More informationImplementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC
More informationManaging Cloud Services in the Enterprise The Value of Cloud Services Brokers
Whitepaper: Managing Cloud Services in the Enterprise The Value of Cloud Services Brokers Whitepaper: Managing Cloud Services in the Enterprise 2 The cloud has revolutionized the way businesses operate
More informationSeaClouds Project D6.2 - Case Study test-beds and key features mapping
SeaClouds Project D6.2 - Case Study test-beds and key features mapping Project Acronym Project Title Call identifier Grant agreement no. 610531 Start Date 1 st October 2013 Ending Date 31 st March 2016
More informationNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
More informationExpert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II
Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference
More informationAHP-Based Quantitative Approach for Assessing and Comparing Cloud Security
AHP-Based Quantitative Approach for Assessing and Comparing Cloud Security Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri TU Darmstadt, Germany CSA (Europe), United Kingdom Email:{ataha, rtrapero,
More informationWhite Paper. An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management
White Paper An Overview of the Kalido Data Governance Director Operationalizing Data Governance Programs Through Data Policy Management Managing Data as an Enterprise Asset By setting up a structure of
More informationFundamental Concepts and Models
Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
More informationBuilding More Reliable Cloud Services The CUMULUS Project
Building More Reliable Cloud Services The CUMULUS Project Antonio Álvarez Romero aalvarez@wtelecom.es London, 17 th June 2014 1 Table of contents Motivations Goals to be achieved What is CUMULUS? Application
More informationAternity Virtual Desktop Monitoring. Complete Visibility Ensures Successful VDI Outcomes
Aternity Virtual Desktop Monitoring Complete Visibility Ensures Successful VDI Outcomes Realizing the Benefits of VDI Requires Illuminating Four Performance Blind Spots Without comprehensive visibility
More informationThe Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
More informationThe Cloud Seen from the U.S.A.
The Cloud Seen from the U.S.A. Stephen R. Bell, Counselor to the U.S. Coordinator, International Communications and Information Policy, U.S. Department of State OUTLINE Commercial drivers of Cloud services
More informationITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
More informationSummit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits
Summit Platform The Summit Platform provides IT organizations a comprehensive, integrated IT management solution that combines IT service management, IT asset management, availability management, and project
More informationITSM Process Description
ITSM Process Description Office of Information Technology Incident Management 1 Table of Contents Table of Contents 1. Introduction 2. Incident Management Goals, Objectives, CSFs and KPIs 3. Incident Management
More informationGeorgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania
Open source API and platform for heterogeneous Cloud computing environments Georgiana Macariu, Dana Petcu, CiprianCraciun, Silviu Panica, Marian Neagul eaustria Research Institute Timisoara, Romania Problem
More informationFederation of Cloud Computing Infrastructure
IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationManaged File Transfer in Enterprise Java Applications
Managed File Transfer in Enterprise Java Applications By David Sims Flux I: Why Should You Care About Managed File Transfer? In an SOA world, bulk data transfer occurs largely by way of file transfer.
More informationCloud Service Rollout. Chapter 9
Cloud Service Rollout Chapter 9 Cloud Service Topics Cloud service rollout plans vary depending on the type of cloud service SaaS, PaaS, or IaaS and the vendor. Unit Topics Identifying vendor roles and
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationCLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs
CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value
More informationIDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
More informationIAAS CLOUD EXCHANGE WHITEPAPER
IAAS CLOUD EXCHANGE WHITEPAPER Whitepaper, July 2013 TABLE OF CONTENTS Abstract... 2 Introduction... 2 Challenges... 2 Decoupled architecture... 3 Support for different consumer business models... 3 Support
More informationFive Fundamental Data Quality Practices
Five Fundamental Data Quality Practices W H I T E PA P E R : DATA QUALITY & DATA INTEGRATION David Loshin WHITE PAPER: DATA QUALITY & DATA INTEGRATION Five Fundamental Data Quality Practices 2 INTRODUCTION
More informationFile Governance Provides the Management in MFT White Paper December 2011
File Governance Provides the Management in MFT White Paper December 2011 ISSUED BY: Jonathan Lampe Chief Analyst File Transfer Consulting Peter Sedgwick Product Marketing Primeur www.primeur.com Primeur
More informationWhite Paper. Cloud Vademecum
White Paper Cloud Vademecum Cloud is the new IT paradigm this document offers a collection of thoughts, internal and external discussions and information. The goal is to inspire and stimulate the route
More informationLANDesk Professional Services
LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,
More informationHow To Standardize Itil V3.3.5
Business white paper Standardize your ITSM An HP approach based on best practices Table of contents 3 Introduction 3 Benefits and challenges 5 The HP approach to standardizing ITSM 6 Establish an IT operations
More informationApplication Management Services (AMS)
Contents 1. AMS : An Overview 2. AMS : Models 3. Delivery Organization 4. Processes & Tools 5. Transition Methodology 6. Pricing Application Management Services (AMS) Enterprise Application Services Capability
More informationService Virtualization:
Service Virtualization: Reduce the time and cost to develop and test modern, composite applications Business white paper Table of contents Why you need service virtualization 3 The challenges of composite
More informationSERVICE ORIENTED APPLICATION MANAGEMENT DO CURRENT TECHNIQUES MEET THE REQUIREMENTS?
In: New Developments in Distributed Applications and Interoperable Systems: 3rd IFIP International Working Conference (DAIS 2001), Cracow, Poland Kluwer Academic Publishers, September 2001 SERVICE ORIENTED
More informationData Sheet Netrounds Control Center
Data Sheet Netrounds Control Center The core component of Netrounds is a unifying cloud-based Control Center, which provides a consolidated GUI for operations staff as well as a cloud API for external
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers MOC6430 About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationCYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Zürcher Fachhochschule
CYCLOPS The Ultimate Billing Framework for Cloud Services Dr. Piyush Harsh, ICCLab InIT Zurich University of Applied Sciences Cloud services today Commoditization Same set of services being offered Compute,
More informationTechnical Report CLOUD; Cloud private-sector user recommendations
TR 103 126 V1.1.1 (2012-11) Technical Report CLOUD; Cloud private-sector user recommendations 2 TR 103 126 V1.1.1 (2012-11) Reference DTR/CLOUD-0011-UserRec Keywords CLOUD, Requirements, USER 650 Route
More informationIT Service Management tools - Acquisition and implementation
IT Service Management tools - and implementation Christian F. Nissen, CFN People A/S ITIL and PRINCE2 are Registered Trade Marks of Axelos in the United Kingdom and other countries COBIT is a registered
More informationMKS Integrity & CMMI. July, 2007
& CMMI July, 2007 Why the drive for CMMI? Missed commitments Spiralling costs Late delivery to the market Last minute crunches Inadequate management visibility Too many surprises Quality problems Customer
More informationAnnex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
More informationSentinet for Windows Azure SENTINET
Sentinet for Windows Azure SENTINET Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationEnsuring Contract Compliance through integration of Ariba Contracts and SAP ECC Michael Chavez and Sean Rhoades, Deloitte Consulting LLP
Orange County Convention Center Orlando, Florida June 3-5, 2014 Ensuring Contract Compliance through integration of Ariba Contracts and SAP ECC Michael Chavez and Sean Rhoades, Deloitte Consulting LLP
More informationHow To Understand Cloud Computing
Capacity Management Ensures Success for Enterprise Cloud Consumers At one time or another in our lives, we have all looked up at the clouds; watching a neverending parade of different forms and faces that
More informationCloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationLR120 LoadRunner 12.0 Essentials
LR120 LoadRunner 12.0 Essentials Overview This five-day course introduces students to HP LoadRunner 12.0, including the usage of Virtual User Generator (VuGen), Controller and Analysis tools. This course
More informationWHITE PAPER. Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness
WHITE PAPER Leveraging a LEAN model of catalogbased performance testing for quality, efficiency and cost effectiveness Traditionally, organizations have leveraged project-based models for performance testing.
More informationAuditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2213812/ Auditing Cloud Computing. A Security and Privacy Guide. Wiley Corporate F&A Description: The auditor's guide to ensuring
More informationThe Importance of Information Delivery in IT Operations
The Importance of Information Delivery in IT Operations David Williams Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from
More informationMS-20246: Monitoring and Operating a Private Cloud
MS-20246: Monitoring and Operating a Private Cloud Description This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses on how to manage and administer
More informationCourse 10750A: Monitoring and Operating a Private Cloud with System Center 2012
Course 10750A: Monitoring and Operating a Private Cloud with System Center 2012 Duration: 5 Days What you will learn This course describes how to monitor and operate a private cloud with Microsoft System
More informationCloud Security Audit for Migration and Continuous Monitoring
Cloud Security Audit for Migration and Continuous Monitoring Umar Mukhtar Ismail, Shareeful Islam,2 School of Architecture, Computing & Engineering, University of East London,UK 2 SBA Research, Austria
More informationThe ITIL v.3 Foundation Examination
The ITIL v.3 Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper B, version 3.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationHow To Improve Cloud Infrastructure
Report on the public consultation for H2020 work programme 2014-15: Cloud Computing, Software and Services Rapporteur: David Griffin Presentation to EC DG CONNECT, E.2, Software & Services, Cloud, Brussels,
More informationCLOUDFORMS Open Hybrid Cloud
Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open
More informationContract Management The Mavericks Won t Like This!
Contract Management The Mavericks Won t Like This! Keith Wallis How Much Did That Project Cost? Real Life Example Original contract amount $500K Variations scope changes not visible Total variations =
More informationConcurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services
Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based
More informationHow To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
More informationA framework for secure migration processes of legacy systems to the cloud
A framework for secure migration processes of legacy systems to the cloud A framework for secure migration processes of legacy systems to the cloud 1. Introduction 2. SMiLe2Cloud 3. Conclusions 1. Introduction
More informationCloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service
Cloud Computing Best Practices Cloud Computing Best Practices Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service Overview Cloud Computing
More information