Security in the Cloud for SAP HANA *
|
|
|
- Gervase Crawford
- 10 years ago
- Views:
Transcription
1 White Paper Intel Xeon Processor E7 v2 product family Real-Time Business Intelligence Security in the Cloud for SAP HANA * Intel, Vormetric, Virtustream, and SAP deliver enterprise-class, customer-controlled data security Executive Summary High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. The SAP HANA* platform is a clear leader in this arena, providing a uniquely fast and adaptable platform for real-time business on an enterprise scale. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA, in hosted cloud environments. Although they would like the potential benefits, they have unique requirements regarding security and compliance. Virtustream answers those security and compliance concerns with a global cloud infrastructure that is designed specifically for hosting mission-critical workloads. Now Virtustream is taking cloud security to even higher levels by integrating Vormetric Data Security* into its cloud infrastructure and utilizing a variety of security technologies that are built into the latest Intel Xeon processor E7 v2 family. With this addition to the Virtustream cloud infrastructure, companies retain complete control over their data, security keys, and security policies. Intel, Vormetric, Virtustream, and SAP worked together in SAP* Co-Innovation Lab to integrate and test the combined solution. The results of the tests show that: 1. The performance overhead of encrypting data with Vormetric Data Security is remarkably low on these new platforms, one percent or less across all tested workloads. 2. SAP HANA based on the Intel Xeon processor E7 v2 family provides up to 2.2x the performance of SAP HANA based on the previous-generation E7 family, with much lower overhead for encryption. With this advanced, high-performance security architecture, customers can implement strong data encryption and more granular access controls for SAP HANA, with negligible performance impact and possible performance improvements. And with SAP HANA running on the latest Intel Xeon processor E7 v2 family, they can experience real-time performance across very large data sets up to three times larger than could be supported using previous-generation platforms 1
2 Table of Contents Executive Summary The Goal: Real-Time Business with Cloud-Based Efficiency The Roadblocks Security Gaps in Public Clouds... 2 Data Residency Requirements... 3 Achieving Security and Compliance for SAP HANA in the Cloud SAP HANA: Built-In Security for Enterprise Environments Vormetric: Enhancing Security While Keeping Customers in Full Control of Their Data Virtustream: Enterprise-Class Security and Compliance in the Cloud Intel: Providing the Foundation for Strong, High-Performance Encryption... 6 Advanced Encryption Standard New Instructions (AES-NI) Secure Key Powerful Performance with Fully Encrypted Data Negligible Encryption Overhead for OLTP Faster Performance with Encryption for SAP ERP Summary About SAP* Co-Innovation Lab 12 The Goal: Real-Time Business with Cloud-Based Efficiency Two major trends are converging in business computing. First, companies are moving to in-memory analytics to drive better business outcomes through realtime, data-driven decision making. Second, they are adopting cloud computing technologies to transform the way they deliver IT services. Many companies want to combine these two approaches to achieve the competitive advantages of real-time business with the agility and cost efficiencies of cloud computing. A third trend in business computing can help them do exactly that. The scalability and reliability of industrystandard server platforms have been advancing rapidly. The latest systems based on the Intel Xeon processor E7 v2 family have eclipsed today s RISC/ UNIX*-based systems by delivering better performance at lower total cost 2 and with comparable levels of reliability, availability and serviceability (RAS). 3 These servers deliver the performance and scalability needed for in-memory computing on an enterprise scale and they do this on a cost-effective, industry-standard platform that fits seamlessly into today s public and private cloud computing environments. Intel and SAP collaborated to bring these trends together in SAP HANA. The result is a unique, real-time business platform based on an in-memory database that supports both transactional and analytical applications on the same platform. With its data-agnostic design, SAP HANA can ingest data in real time from all available data sources. For example, SAP HANA supports cost-effective, petabyte-scale Big Data integration using the Intel Distribution for Apache* Hadoop software. Companies are using SAP HANA to perform sophisticated predictive and prescriptive analytics on all their data structured, unstructured, historical, and fresh operational. They are identifying market trends and opportunities, personalizing customer engagements, streamlining operations, and closing financial books in seconds, all while converging infrastructure and data onto a single, simplified in-memory platform. SAP HANA is available as an appliance for onsite implementations and also as an on-demand service from public cloud providers. Cloud solutions can help simplify deployment and reduce up-front costs. They also allow companies to scale SAP HANA up or down as needs evolve. Since customers pay only for the resources they use, this approach can make it easy to align IT investments with business needs as requirements change. The Roadblocks Security Gaps in Public Clouds Achieving full value from SAP HANA requires integrating and analyzing core business data, which typically includes both private customer information and valuable intellectual property. Hosting such sensitive data in the cloud raises security and compliance concerns that must be addressed. Many cloud service providers (CSPs) focus primarily on helping their customers optimize infrastructure agility and IT cost models. Businesses can use these clouds to spin up resources quickly and affordably for non-mission-critical functions and non-sensitive data. However, such clouds are typically a black box to the businesses that use them. Customers have little or no visibility into the data center environment, and their workloads and data may reside on physical infrastructure that is shared with many other customers. 2
3 There is another security risk in most public clouds. The CSP administrators who manage the infrastructure typically have access to the entire solution, including applications and data. Although there may be operational safeguards, the potential for insider attacks exists, not only from CSP administrators, but also from advanced persistent threats (APTs) that use sophisticated, long-term strategies to exploit insiders. In this environment, trust between cloud providers and their customers is no longer enough. Businesses need to know that they, and only they, can access their data. They also need to know that protections are in place to guard against both internal and external threats, including APTs. Data Residency Requirements Data mobility raises additional concerns about cloud hosting solutions. Data protection and privacy laws vary around the world, and many jurisdictions have strict requirements regarding data residency. Yet, in many public cloud environments, customer applications and data are often moved without notice to maximize data center efficiency. Your data could potentially be moved across the data center, across the country, or even around the world. If you have sensitive data, this raises serious security concerns. If you have data residency requirements, it may put your business at risk for noncompliance. For example, the European Union Data Protection Regulation makes it illegal to transfer data in response to an overseas court order without authorization from the European Commission. However, if a service provider is incorporated in a non-eu country or has a data center in a non-eu country, the provider is required to comply with a subpoena for data from that non-eu country, even if the data resides in the EU. This and many other global regulatory issues create a tough decision matrix for CSPs and introduce significant potential risks for their customers. To manage risk in such a complicated regulatory environment, enterprise customers must retain full control over their data. Data must not only be encrypted in the cloud, but the customer and only the customer must have access to the encryption keys. With this approach, the CSP can respond appropriately to court orders (by sending the encrypted data), without putting the customer at risk (since the data cannot be unlocked without the customer-controlled encryption keys). Achieving Security and Compliance for SAP HANA in the Cloud Providing strong security and compliance in any computing environment requires robust capability at every level of the solution stack. Security and compliance for SAP HANA begins with the built-in controls. Vormetric, Virtustream, and Intel build on this foundation to extend enterprise-class security and compliance without sacrificing performance or generating excessive administrative overhead. SAP HANA: Built-In Security for Enterprise Environments SAP HANA provides integrated support for establishing and enforcing strong security policies. Built-in capabilities include: Role-based access and authorization for SAP HANA users and administrators. SAP HANA supports strong authentication security using the customer s method of choice (basic authentication, Kerberos, SAML, SAP login and assertion tickets, X.509, and so on). Data encryption. Encryption is supported for both data on disk and data communications across the network. Transaction logs and reporting mechanisms. SAP HANA provides the information and governance support that businesses need to monitor and audit user access and operations. SAP also provides guidance on how to implement these capabilities to ensure strong security across diverse deployment scenarios. For information, see the SAP HANA Security Guide. com/hana/sap_hana_security_guide_ en.pdf Vormetric: Enhancing Security While Keeping Customers in Full Control of Their Data The security protections described above are sufficient for many customers, as evidenced by the success of SAP HANA in supporting mission-critical workloads for large businesses. However, companies with particularly stringent data security requirements are sometimes looking for an even higher level of control. 3
4 In typical implementations of SAP HANA, encryption keys may be hosted and managed by IT maintenance staff. When the implementation is hosted in the cloud, this means that the CSP maintenance staff has access to the encrypted storage of customer s keys and data. Vormetric Data Security closes this security gap. CSP maintenance staff can access the application and the infrastructure, but only the customer s authorized users and security administrators can access the encryption keys, the data, and the access policies. Vormetric Data Security is deployed and managed using the Vormetric Data Security Manager, which can be located either in the customer s data center or in the cloud. Encryption keys are stored in a secure vault (see Figure 1). In addition to ensuring that data and access policies are secured against unauthorized users and administrators, Vormetric Data Security: Provides more flexible and granular decryption access controls based on the requestor, time, data type, and data location (drive, device, disk, and so on). Provides additional granular logs for monitoring, reporting, and indepth security analysis. Logs can be monitored and analyzed using governance, risk management, and compliance (GRC) applications to provide continuous assessment of the security environment and to generate alerts if potential issues arise. This approach is recommended, as advanced analytics is increasingly valuable for detecting the subtle departures from normal usage patterns that might indicate an insider attack or a sophisticated APT. Customer-Controlled Data Security SAP HANA in-memory database Optimized cloud services for mission-critical applications Customer VPN Data encryption and access control policy enforcement persistent storage Vormetric Data Security Manager (Physical or Virtual) Centralizes policy and key management Intel Data Protection Technology with Advanced Encryption Standard New Instructions (AES-NI) and Secure Key Server (Intel Xeon processor E7 v2 family) Scalable server platform with hardware-enhanced security Figure 1. Vormetric provides advanced data encryption and access controls and ensures that only the customer has access to data, access policies, and encryption keys. 4
5 Virtustream: Enterprise-Class Security and Compliance in the Cloud Virtustream is a global CSP that focuses specifically on hosting mission-critical workloads for large businesses. Customers vary in size from midsize enterprises to Fortune 500 and Global 2000 companies, and they represent a broad range of industries, including financial services, healthcare, retail, manufacturing, and many others. Virtustream currently hosts production SAP landscapes for more than 100 businesses, including many that are using SAP HANA for real-time analytics and for supporting SAP Business Suite applications. With its global scale and mission-critical focus, Virtustream has the resources and expertise to provide levels of security and compliance that are as good as or better than many businesses are able to provide in their own data centers. Some of the key safeguards that Virtustream provide include the following: Enterprise-class data center security, including both physical and logical safeguards. Customers access their systems and applications through VPNs, and advanced firewalls block digital attacks and unauthorized users at multiple levels throughout the data center (see Figure 2). Advanced data protection and residency control, since Virtustream maintains physical separation of customer data, enabling strong, disklevel security protections that are not possible in many cloud environments. Customers can also stipulate data residency requirements, so that their data is restricted to specified geographies or data centers. Vormetric Data Security adds to these protections by extending encryption coverage to transaction logging and access controls, and by ensuring that only the customer can access the data. Virtustream Architecture on SAP HANA* Customer Internet Site-to-Site VPN MPLS Firewall Storage VPN Public Landing Zone VPN Secure Customer Landing Zone Compute Network Switch Core Network DMZ Platform Management Platform Backup xstream Enterprise Platform Vormetric Transparent Encryption VS DC 1: Production VS DC 1: Non-Prod/DR SAP HANA Managed Service Figure 2. The Virtustream enterprise cloud provides multiple layers of security to protect customer applications and data, including continuous monitoring and analysis of logs to identify sophisticated attacks, such as advanced persistent threats. 5
6 Predictable backup and replication services in accordance with published terms and conditions or as specified in customer service level agreements. Trusted infrastructure for application workloads. Virtustream takes advantage of Intel Platform Protection Technology with Trusted Execution Technology (TXT). 4 TXT cryptographically verifies platform and hypervisor integrity when systems are booted. The system can launch only into a known good state, which helps ensure that no malware of any kind has been inserted during or prior to launch. TXT also provides information that can be used to enforce and validate compliance. Monitoring of infrastructure and transaction logs with GRC applications. These applications use sophisticated, realtime analytic algorithms to identify and alert IT staff to a wide range of potential security breaches, including APTs. Full audit capability. Customers can validate compliance with their own requirements and with government and industry regulations. Virtustream also provides complete professional services and support for feasibility assessment, migration and onboarding, and application support. A key component of this service is to ensure that the security and compliance solution takes into account the unique needs of the customer in a verifiable manner. Intel: Providing the Foundation for Strong, High-Performance Encryption Intel worked closely with SAP to develop the SAP HANA platform, and security continues to be an important area of collaboration. Intel provides hardwarebased security technologies in Intel Xeon processors that help strengthen the security of the Virtustream and Vormetric solution, while sustaining the performance levels that are required to support realtime business processes. TXT was discussed previously. Intel also provides Intel Data Protection Technology with Advanced Encryption Standard New Instructions (AES-NI) and Secure Key. 5 Advanced Encryption Standard New Instructions (AES-NI) In the past, customers had to sacrifice application performance if they wanted to encrypt their data. Encryption and decryption are compute-intensive processes that can add latency to data access times and consume substantial computing resources. In the real-time business environments supported by SAP HANA, such delays and overheads are not acceptable. Intel solves this challenge with AES-NI, which provides seven instructions to accelerate the most compute-intensive AES algorithms. By offloading this processing to dedicated circuits within the processor, much of the latency is eliminated, and server processors are free to focus on their primary data-processing functions. AES-NI is supported in all current s, including the Intel Xeon processor E7 family, which is used in the SAP HANA platform. AES-NI not only accelerates encryption, but also strengthens it. Softwarebased encryption algorithms can be vulnerable to sophisticated side-channel attacks that use indirect methods to decipher encryption keys. Offloading key encryption processes to dedicated circuits within the processor provides better protection against such attacks. Secure Key Encryption is only as secure as the keys that are used to encrypt the data. If an encryption key is stolen or compromised, the associated data is at risk. Traditionally, security vendors have relied on the software-based pseudo random number generators (RNGs) in today s operating systems to generate encryption keys. However, flaws have been found in pseudo RNGs that can be used to compromise data security using side-channel attacks to decipher encryption keys. Secure Key provides high quality keys using a hardware-based RNG that is included in the latest generation of Intel Xeon processors. Secure Key generates truly random numbers based on unpredictable thermal fluctuations within the chip. The RNG is automatically detected and used by leading operating systems. It is completely transparent to applications and supports scalable key generation for demanding enterprise applications. 6
7 By supporting both AES-NI and Secure Key, the Vormetric Data Security Manager increases encryption security while simultaneously reducing the performance impact on both applications and the supporting infrastructure. Notes on platform support: AES-NI is supported in the Intel Xeon processor E7 v2 family, as well as the previous-generation Intel Xeon processor E7 family, both of which are certified for the SAP HANA platform. (AES-NI is also supported in the Intel Xeon processor E5 and E3 families.) Secure Key is supported in the Intel Xeon processor E7 v2 family (and also in the Intel Xeon processor E3 v2, E3 v3, E5 v2, and E5 v3 families). Powerful Performance with Fully Encrypted Data Vormetric Data Security is optimized for AES-NI and Secure Key, so strong data encryption can be implemented pervasively without sacrificing application performance or overloading the SAP HANA platform. This is especially true when the SAP HANA platform is based on the Intel Xeon processor E7 v2 family, which, in some cases, performs even faster with encryption than without. To verify the performance of SAP HANA with Vormetric Data Security, Intel, Vormetric, Virtustream, and SAP conducted a series of performance tests at SAP Co-Innovation Lab, a global laboratory network in which SAP collaborates with partners to develop and test innovative new technologies and solutions. The team tested the solution on the SAP HANA platform based on the Intel Xeon processor E7 product family, and also on the SAP HANA platform based on the Intel Xeon processor E7 v2 product family (see the sidebar, Tripling Data Capacity for SAP HANA). Tripling Data Capacity for SAP HANA* The SAP HANA platform was developed jointly by SAP and Intel to deliver unprecedented performance and scalability for complex analytics acting on large data sets. More recently, Intel and SAP have collaborated to optimize SAP HANA for a new generation of Intel server components. The E7 v2 family provides dramatic performance and scalability enhancements versus previous generation processors, including up to 2x faster performance for complex, ad hoc queries, a and up to 3 times the memory capacity b (up to 6 TB per 4-socket server and up to 12 TB per 8-socket server). For more information, visit: processors/xeon/xeon-processor-e7-family.html The Intel Solid-State Drive DC S3700 Series provides high-performing persistent storage for SAP HANA, which is essential for implementing high availability with zero data loss and without sacrificing in-memory performance. Configuring SSD-to-memory capacity in a four-to-one ratio allows the inmemory database to spill over into a high-speed RAID array for logging, user space requirements, extended data capacity, time series data, and warm cache solutions. For more information, visit: solid-state-drives/solid-state-drives-dc-s3700-series.html The Intel Ethernet Converged Network Adapter X520 Family offers some of the most flexible and scalable Ethernet adapters available for today s data centers. These adapters support unified networking and data center bridging (DCB). DCB enhances the network-attached storage and Internet small computer interface (iscsi) by offering traffic differentiation at the link layer. DCB can be used to converge a variety of applications, such as local area networks, storage area networks, and high-performance computing. For more information, visit: Together, these advances dramatically increase the per-node scalability of SAP HANA, so enterprise customers have more headroom for supporting large-scale SAP Business Suite applications and other mission-critical workloads. a Source: Intel internal measurements November Configurations: Baseline 1.0x: Intel E7505 Chipset using four s E (4P/10C/20T, 2.4 GHz) with 256 GB DDR memory scoring 110,061 queries per hour. Source: Intel Technical Report #1347. New Generation 2x: Intel C606J Chipset using four s E v2 (4P/15C/30T, 2.8 GHz) with 512 GB DDR (running 2:1 VMSE) memory scoring 218,406 queries per hour. Source: Intel Technical Report #1347. b On a 4-socket natively connected platform: E7 family supports 64DIMMS, max memory per DIMM of 32 GB RDIMM; E7 v2 family supports 96DIMMs, max memory per DIMM of 64 GB RDIMM. This enables a 3x increase in memory. 7
8 Performance was measured with and without data encryption. A number of different tests were performed to assess the performance impact of data encryption in scenarios that closely reflect real-world deployments. The results for two key workloads are described below. Negligible Encryption Overhead for OLTP-Bench Workload: Testbed Framework for Online Transaction Processing (OLTP) An open-source OLTP workload was used to determine how SAP HANA performs when operating as the database for a typical transactional business application. The OLTP workload simulates an orderentry application and includes a mix of transactions commonly associated with managing, selling, and distributing a product or service. Performance throughput is measured in transactions per minute (tpm). The team tested two scenarios to determine the performance impact of different volumes of data. In the first scenario, SAP HANA was loaded with 182 GB of data. In the second, it was loaded with 365 GB of data. The results are shown in Figure 3. (The throughput measurements are normalized, using as the baseline the throughput measured for the previous-generation SAP HANA platform, based on the Intel Xeon processor E7-4870, when it was loaded with 182 GB of data.) Performance of SAP HANA With and Without Encryption [Workload: Testbed Framework for Online Transaction Processing (OLTP)] Normalized Throughput % SAP HANA with Vormetric Transparent Data Encryption Total Performance with Encryption (normalized) Performance Impact of Encryption -7.4% 0% -1% 182GB 365GB 182GB 365GB E E v2 E7 Family ~1.0 ~1.75x -7.0% (182 GB) -7.4% (365 GB) Figure 3. Performance Summary Testbed Framework for Online Transaction Processing (OLTP). [Source: Performance tests in SAP Co-Innovation Lab 6,7 ] Without Encryption With Encryption E7 v2 Family 0% (182 GB) -1% (365 GB) In essence, the SAP HANA platform based on the Intel Xeon processor E7 v2 family provided roughly 1.7x the performance of the previous-generation SAP HANA platform based on the Intel Xeon processor E7 family. 6,7 In addition, the performance overhead of encryption was less than or equal to one percent on the newer platform, showing that data encryption can be applied pervasively, with negligible impact on the performance of SAP HANA. 8
9 Faster Performance with Encryption for SAP ERP Workload: SAP-OLTP 8 An SAP transactional workload representative of an SAP Enterprise Resource Planning (ERP) sales and distribution scenario was used to test the performance of SAP HANA when operating as the database for the SAP ERP application. SAP-OLTP simulates the execution of a general sales cycle in a system running SAP ERP, from the initial order to delivery and billing. Performance throughput is measured in dialog steps per second. Normalized Throughput Performance of SAP HANA With and Without Encryption [Workload: SAP-OLTP] -1.2% +5% Without Encryption With Encryption During the testing, the workload placed on the system was equivalent to that generated by 40,000 users accessing a 4 GB dataset loaded in the SAP HANA database for various ERP functions. The results are shown in Figure 4. (The throughput measurements are normalized, using as the baseline the throughput measured for the previousgeneration SAP HANA platform, based on the Intel Xeon processor E ) In essence, the SAP HANA platform based on the Intel Xeon processor E7 v2 family provided 2.26x the performance of the previous-generation SAP HANA platform based on the Intel Xeon processor E7 family. 9,7 There was no performance overhead for encryption. In fact, the new platform actually performed up to five percent faster with encryption than without encryption. How can encrypting data increase the performance of SAP HANA on the Intel Xeon processor E7 v2 family? The benchmarking team conjectures that the increased availability of computational resources on this newer processor family, combined with enhancements to AES-NI, allow increased parallelism, witnessed by a significant increase in the context switching activity of the system with encryption, and other efficiencies for encryption and decryption processes E SAP HANA with Vormetric Transparent Data Encryption Total Performance with Encryption (normalized) Performance Impact of Encryption E v2 E7 Family x E7 v2 Family -1.2% +5% (Faster with encryption) Figure 4. Performance Summary- SAP-OLTP. [Source: Performance tests in SAP Co-Innovation Lab 9,7 ] This enables higher throughput for both encryption and transactions due to improved data locality, higher multithreading levels, and possibly other factors, as well. The team believes that the slightly higher system throughput observed with encryption is a transient effect that will progressively fade with higher volumes of data. The results obtained in the OLTP-Bench scenario with 365 GB of data provide clear support for this educated guess. 9
10 Summary SAP HANA is transforming the way companies compete, allowing them to analyze all available data almost instantly and integrate the resulting insights into real-time business processes. With on-demand infrastructure solutions from Virtustream, businesses can combine this breakthrough business capability with the agility and cost efficiencies provided by a hosted cloud environment, without compromising performance, availability, security, or compliance. Virtustream is already hosting more than 100 SAP landscapes for enterprise customers. With the addition of Vormetric Data Security and the Intel Xeon processor E7 v2 family with integrated Intel security technologies, Virtustream will provide even better security and compliance for implementations of SAP HANA. Data encryption and access controls will be extended and enhanced, and customers will maintain complete control over their data, encryption keys, and access policies. They will also experience dramatically increased performance versus previous generations of the SAP HANA platform, with negligible performance overhead due to encryption. About SAP* Co-Innovation Lab SAP collaborates with a large community of hardware, software, and service providers to develop, test, and showcase multivendor solutions based on SAP HANA and other SAP products. Much of this collaboration takes place in SAP Co-Innovation Lab. This global network of laboratories provides infrastructure, expertise, and other resources that help vendors come together with SAP development and business teams. By fueling collaboration across the global SAP ecosystem, SAP Co-Innovation Lab helps to speed the delivery of proven solutions that meet the real needs of business customers. For more information, visit: 10
11 11
12 1 On a 4-socket natively-connected platform: Intel Xeon processor E7 family supports 64DIMMS, max memory per DIMM of 32 GB RDIMM; Intel Xeon processor E7 v2 family supports 96DIMMs, max memory per DIMM of 64 GB RDIMM. This enables a 3x increase in memory. 2 Better performance at lower total cost claim based on Intel estimated SPECint*_rate_base2006 results and pricing of comparable 4-socket rack server using Intel Xeon processor E v2 (37.5M Cache, 2.8 GHz, 15-Cores) to IBM POWER*750 using POWER7+ (80M Cache, 4.0 GHz, 8-Cores) as of December SPECint_rate_base2006 benchmark results: 4-chip IBM POWER7+ (1230 baseline score) source: 4-chip Intel Xeon processor E v2 (2280 baseline score estimated) 3 Source: Information Technology Intelligence Consulting (ITIC): Intel Xeon processor E7 Family Reaches Reliability Parity with RISC/UNIX, Delivers % Reliability, Availability, and Serviceability July No computer system can provide absolute security. Requires an enabled Intel processor, enabled chipset, firmware, software, may require a subscription with a capable service provider (may not be available in all countries). Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. Consult your Service Provider for availability and functionality. For more information, visit Consult your system manufacturer and/ or software vendor for more information. 5 No computer system can provide absolute security. Requires an enabled Intel processor and software optimized for use of the technology. Consult your system manufacturer and/or software vendor for more information. 6 The claim of roughly 1.75x performance improvement for OLTP workloads with encrypted data and the claim that the performance overhead of encryption was less than or equal to one percent are based on a measurements of transactions per minute (tpm) for an open-source OLTP benchmark running on the following server configurations. Baseline server configuration: Four-socket server platform with 4 x Intel Xeon processor E (10-core, 2.4 GHz). New server configuration: Four-socket server platform with 4 x Intel Xeon processor E v2 (15-core, 2.3 GHz). Both servers were configured with 1 TB memory, 800 GB Intel Solid State Drive 910 PCIe, SuSe Linux Enterprise Server 11 SP3 operating system, Ext3 filesystem, SAP HANA SPS 06 revision Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. 8 SAP-OLTP is a lightweight rewrite of a Java-based SD Benchmark simulator for SAP R/3* version SAP R/3 is the former name of SAP ERP. 9 The claims of up to 2.26x performance and up to 5 percent faster performance with encryption than without encryption are based on measured results for the SAP* SD benchmark simulator (LDSIMM) comparing total performance, as measured by the number of dialog steps per second with and without encryption, on the following configurations. Baseline server configuration: Four-socket server platform with 4 x Intel Xeon processor E (10-core, 2.4 GHz). New server configuration: Four-socket server platform with 4 x Intel Xeon processor E v2 (15-core, 2.3 GHz). Both servers were configured with 1 TB memory, 800 GB Intel Solid State Drive 910 PCIe, SuSe Linux Enterprise Server 11 SP3 operating system, Ext3 filesystem, SAP HANA SPS 06 revision 63. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. A Mission Critical Application is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or go to: Copyright 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. Printed in USA 0914/RAS/MESH/PDF Please Recycle US
Fast, Low-Overhead Encryption for Apache Hadoop*
Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software
Accelerating Business Intelligence with Large-Scale System Memory
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
The Foundation for Better Business Intelligence
Product Brief Intel Xeon Processor E7-8800/4800/2800 v2 Product Families Data Center The Foundation for Big data is changing the way organizations make business decisions. To transform petabytes of data
Intel Service Assurance Administrator. Product Overview
Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an
Accelerating Business Intelligence with Large-Scale System Memory
Accelerating Business Intelligence with Large-Scale System Memory A Proof of Concept by Intel, Samsung, and SAP Executive Summary Real-time business intelligence (BI) plays a vital role in driving competitiveness
Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software
Real-Time Big Data Analytics with the Intel Distribution for Apache Hadoop software Executive Summary is already helping businesses extract value out of Big Data by enabling real-time analysis of diverse
McAfee and SAP HANA. Executive Summary. Real-Time Business Requires Real-Time Security
White Paper SAP HANA Intel Xeon Processor E7 Family Enterprise-class Security McAfee and SAP HANA Real-time, data-driven business with enterprise-class security Executive Summary There s an old saying:
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Intel Data Direct I/O Technology (Intel DDIO): A Primer >
Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
Intel Solid-State Drives Increase Productivity of Product Design and Simulation
WHITE PAPER Intel Solid-State Drives Increase Productivity of Product Design and Simulation Intel Solid-State Drives Increase Productivity of Product Design and Simulation A study of how Intel Solid-State
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations
Intel Platform and Big Data: Making big data work for you.
Intel Platform and Big Data: Making big data work for you. 1 From data comes insight New technologies are enabling enterprises to transform opportunity into reality by turning big data into actionable
Real-Time Big Data Analytics for the Enterprise
White Paper Intel Distribution for Apache Hadoop* Big Data Real-Time Big Data Analytics for the Enterprise SAP HANA* and the Intel Distribution for Apache Hadoop* Software Executive Summary Companies are
Intelligent Business Operations
White Paper Intel Xeon Processor E5 Family Data Center Efficiency Financial Services Intelligent Business Operations Best Practices in Cash Supply Chain Management Executive Summary The purpose of any
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms
Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide
Vendor Update Intel 49 th IDC HPC User Forum. Mike Lafferty HPC Marketing Intel Americas Corp.
Vendor Update Intel 49 th IDC HPC User Forum Mike Lafferty HPC Marketing Intel Americas Corp. Legal Information Today s presentations contain forward-looking statements. All statements made that are not
Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture
White Paper Intel Xeon processor E5 v3 family Intel Xeon Phi coprocessor family Digital Design and Engineering Three Paths to Faster Simulations Using ANSYS Mechanical 16.0 and Intel Architecture Executive
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study
Intel and Qihoo 360 Internet Portal Datacenter - Big Data Storage Optimization Case Study The adoption of cloud computing creates many challenges and opportunities in big data management and storage. To
Cloud based Holdfast Electronic Sports Game Platform
Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online
Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms
Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Family-Based Platforms Executive Summary Complex simulations of structural and systems performance, such as car crash simulations,
Dell s SAP HANA Appliance
Dell s SAP HANA Appliance SAP HANA is the next generation of SAP in-memory computing technology. Dell and SAP have partnered to deliver an SAP HANA appliance that provides multipurpose, data source-agnostic,
A Superior Hardware Platform for Server Virtualization
A Superior Hardware Platform for Server Virtualization Improving Data Center Flexibility, Performance and TCO with Technology Brief Server Virtualization Server virtualization is helping IT organizations
ENHANCING SECURITY FOR SAP HANA IN THE CLOUD
ENHANCING SECURITY FOR SAP HANA IN THE CLOUD A COLLABORATIVE SAP CO-INNOVATION LAB PROJECT WITH INTEL, VORMETRIC, AND VIRTUSTREAM Editors: Ashvin Kamaraju Sergio Pacheco-Sanchez September 2014 Version
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V. Technical Brief v1.
Intel Ethernet and Configuring Single Root I/O Virtualization (SR-IOV) on Microsoft* Windows* Server 2012 Hyper-V Technical Brief v1.0 September 2012 2 Intel Ethernet and Configuring SR-IOV on Windows*
Modernizing Servers and Software
SMB PLANNING GUIDE Modernizing Servers and Software Increase Performance with Intel Xeon Processor E3 v3 Family Servers and Windows Server* 2012 R2 Software Why You Should Read This Document This planning
VNF & Performance: A practical approach
VNF & Performance: A practical approach Luc Provoost Engineering Manager, Network Product Group Intel Corporation SDN and NFV are Forces of Change One Application Per System Many Applications Per Virtual
Intel RAID SSD Cache Controller RCS25ZB040
SOLUTION Brief Intel RAID SSD Cache Controller RCS25ZB040 When Faster Matters Cost-Effective Intelligent RAID with Embedded High Performance Flash Intel RAID SSD Cache Controller RCS25ZB040 When Faster
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
How To Build A Cisco Ukcsob420 M3 Blade Server
Data Sheet Cisco UCS B420 M3 Blade Server Product Overview The Cisco Unified Computing System (Cisco UCS ) combines Cisco UCS B-Series Blade Servers and C-Series Rack Servers with networking and storage
Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration
SOLUTION BLUEPRINT IT SECURITY MANAGEMENT Enhancing McAfee Endpoint Encryption * Software With Intel AES-NI Hardware- Based Acceleration Industry IT security management across industries Business Challenge
Cisco for SAP HANA Scale-Out Solution on Cisco UCS with NetApp Storage
Cisco for SAP HANA Scale-Out Solution Solution Brief December 2014 With Intelligent Intel Xeon Processors Highlights Scale SAP HANA on Demand Scale-out capabilities, combined with high-performance NetApp
Leading Virtualization 2.0
Leading Virtualization 2.0 How Intel is driving virtualization beyond consolidation into a solution for maximizing business agility within the enterprise White Paper Intel Virtualization Technology (Intel
iscsi Quick-Connect Guide for Red Hat Linux
iscsi Quick-Connect Guide for Red Hat Linux A supplement for Network Administrators The Intel Networking Division Revision 1.0 March 2013 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH
Oracle Database Reliability, Performance and scalability on Intel Xeon platforms Mitch Shults, Intel Corporation October 2011
Oracle Database Reliability, Performance and scalability on Intel platforms Mitch Shults, Intel Corporation October 2011 1 Intel Processor E7-8800/4800/2800 Product Families Up to 10 s and 20 Threads 30MB
CLOUD SECURITY: Secure Your Infrastructure
CLOUD SECURITY: Secure Your Infrastructure 1 Challenges to security Security challenges are growing more complex. ATTACKERS HAVE EVOLVED TECHNOLOGY ARCHITECTURE HAS CHANGED NIST, HIPAA, PCI-DSS, SOX INCREASED
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters
Creating Overlay Networks Using Intel Ethernet Converged Network Adapters Technical Brief Networking Division (ND) August 2013 Revision 1.0 LEGAL INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Cold Storage in the Cloud: Trends, Challenges, and Solutions
White Paper Intel Atom Processor Intel Xeon Processor Cloud-based Cold Storage Cold Storage in the Cloud: Trends, Challenges, and Solutions Executive Summary Private and public clouds often use a single
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets
WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The
SAP HANA - an inflection point
SAP HANA forms the future technology foundation for new, innovative applications based on in-memory technology. It enables better performing business strategies, including planning, forecasting, operational
Colgate-Palmolive selects SAP HANA to improve the speed of business analytics with IBM and SAP
selects SAP HANA to improve the speed of business analytics with IBM and SAP Founded in 1806, is a global consumer products company which sells nearly $17 billion annually in personal care, home care,
The Case for Rack Scale Architecture
The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage
Re-Hosting Mainframe Applications on Intel Xeon Processor-based Servers
SOLUTION BRIEF Intel Xeon Processor-based Servers Mainframe Migration Re-Hosting Mainframe Applications on Intel Xeon Processor-based Servers A Proven Methodology for Mainframe Migration The mainframe
Maximum performance, minimal risk for data warehousing
SYSTEM X SERVERS SOLUTION BRIEF Maximum performance, minimal risk for data warehousing Microsoft Data Warehouse Fast Track for SQL Server 2014 on System x3850 X6 (95TB) The rapid growth of technology has
InterSystems and VMware Increase Database Scalability for Epic EMR Workload by 60 Percent with Intel Xeon Processor E7 v3 Family
White Paper processor E7 v3 family InterSystems Caché Epic EMR Software VMware vsphere ESXi Healthcare InterSystems and VMware Increase Database Scalability for Epic EMR Workload by 60 Percent with Processor
Security in the Cloud
solution brief Cloud Computing Security in the Cloud Intel Xeon Processor E5-4600/2600/2400/1600 Intel Technologies Enable More Secure Business Computing in the Cloud Would you like to begin transforming
Intel Cloud Builders Guide: Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor 5600 Series Parallels* Security Monitoring and Service Catalog for Public Cloud VPS Services Parallels, Inc. Intel Cloud Builders Guide: Cloud Design and
VMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery
WHITE PAPER Cost-Efficient SSL Application Delivery Upsurge in Encrypted Traffic Drives Demand for Cost-Efficient SSL Application Delivery Always On SSL Since 1994, enterprises looking to protect the security
NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments
Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and
Accomplish Optimal I/O Performance on SAS 9.3 with
Accomplish Optimal I/O Performance on SAS 9.3 with Intel Cache Acceleration Software and Intel DC S3700 Solid State Drive ABSTRACT Ying-ping (Marie) Zhang, Jeff Curry, Frank Roxas, Benjamin Donie Intel
Intel Data Migration Software
User Guide Software Version 2.0 Document Number: 324324-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY
Intel: a Thought Leader Helping IoT Scale Out
Internet of Things Intel: a Thought Leader Helping IoT Scale Out The Next Evolution Of Computing Dr Jean-Laurent PHILIPPE Intel EMEA IoT Technical Manager Eclipse Days, Grenoble, Mar 30-31, 2015 Legal
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing
The Open Cloud Near-Term Infrastructure Trends in Cloud Computing Markus Leberecht BELNET Networking Conference 25-Oct-2012 1 Growth & IT Challenges Drive Need for Cloud Computing IT Pros Growth IT Challenges
How To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1
How to Configure Intel Ethernet Converged Network Adapter-Enabled Virtual Functions on VMware* ESXi* 5.1 Technical Brief v1.0 February 2013 Legal Lines and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED
Different NFV/SDN Solutions for Telecoms and Enterprise Cloud
Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*
Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze
Power Benefits Using Intel Quick Sync Video H.264 Codec With Sorenson Squeeze Whitepaper December 2012 Anita Banerjee Contents Introduction... 3 Sorenson Squeeze... 4 Intel QSV H.264... 5 Power Performance...
Zend and IBM: Bringing the power of PHP applications to the enterprise
Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages
How To Reduce Pci Dss Scope
WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS
Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture
White Paper Developing Solutions with Intel ONP Server Reference Architecture Developing High-Performance, Flexible SDN & NFV Solutions with Intel Open Network Platform Server Reference Architecture Developing
Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum
Intel Core TM i3 Processor Series Embedded Application Power Guideline Addendum July 2012 Document Number: 327705-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise
Kronos Workforce Central 6.1 with Microsoft SQL Server: Performance and Scalability for the Enterprise Providing Enterprise-Class Performance and Scalability and Driving Lower Customer Total Cost of Ownership
Dell Virtualization Solution for Microsoft SQL Server 2012 using PowerEdge R820
Dell Virtualization Solution for Microsoft SQL Server 2012 using PowerEdge R820 This white paper discusses the SQL server workload consolidation capabilities of Dell PowerEdge R820 using Virtualization.
Intel Internet of Things (IoT) Developer Kit
Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision
Intel RAID RS25 Series Performance
PERFORMANCE BRIEF Intel RAID RS25 Series Intel RAID RS25 Series Performance including Intel RAID Controllers RS25DB080 & PERFORMANCE SUMMARY Measured IOPS surpass 200,000 IOPS When used with Intel RAID
SimpliVity OmniStack with Vormetric Transparent Encryption
SimpliVity OmniStack with Vormetric Transparent Encryption Page 1 of 12 Table of Contents Executive Summary... 3 Audience... 3 Solution Overview... 3 Simplivity Introduction... 3 Why Simplivity For Virtualized
Platfora Big Data Analytics
Platfora Big Data Analytics ISV Partner Solution Case Study and Cisco Unified Computing System Platfora, the leading enterprise big data analytics platform built natively on Hadoop and Spark, delivers
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
IS IN-MEMORY COMPUTING MAKING THE MOVE TO PRIME TIME?
IS IN-MEMORY COMPUTING MAKING THE MOVE TO PRIME TIME? EMC and Intel work with multiple in-memory solutions to make your databases fly Thanks to cheaper random access memory (RAM) and improved technology,
新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV)
新 一 代 軟 體 定 義 的 網 路 架 構 Software Defined Networking (SDN) and Network Function Virtualization (NFV) 李 國 輝 客 戶 方 案 事 業 群 亞 太 區 解 決 方 案 架 構 師 美 商 英 特 爾 亞 太 科 技 有 限 公 司 Email: [email protected] 1 Legal
An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
Express5800 Scalable Enterprise Server Reference Architecture. For NEC PCIe SSD Appliance for Microsoft SQL Server
Express5800 Scalable Enterprise Server Reference Architecture For NEC PCIe SSD Appliance for Microsoft SQL Server An appliance that significantly improves performance of enterprise systems and large-scale
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
The Engine for Digital Transformation in the Data Center
product brief The Engine for Digital Transformation in the Data Center Intel Xeon Processor E5-2600 v4 Product Family From individual servers and workstations to clusters, data centers, and clouds, IT
COSBench: A benchmark Tool for Cloud Object Storage Services. [email protected] 2012.10
COSBench: A benchmark Tool for Cloud Object Storage Services [email protected] 2012.10 Updated June 2012 Self introduction COSBench Introduction Agenda Case Study to evaluate OpenStack* swift performance
An Evaluation Framework for Selecting an Enterprise Cloud Provider
An Evaluation Framework for Selecting an Enterprise Cloud Provider WHITE PAPER This White Paper is intended for senior IT leaders of global enterprises considering a new cloud solution or expanding an
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
EMC XtremSF: Delivering Next Generation Performance for Oracle Database
White Paper EMC XtremSF: Delivering Next Generation Performance for Oracle Database Abstract This white paper addresses the challenges currently facing business executives to store and process the growing
EMC VFCACHE ACCELERATES ORACLE
White Paper EMC VFCACHE ACCELERATES ORACLE VFCache extends Flash to the server FAST Suite automates storage placement in the array VNX protects data EMC Solutions Group Abstract This white paper describes
High Performance Computing and Big Data: The coming wave.
High Performance Computing and Big Data: The coming wave. 1 In science and engineering, in order to compete, you must compute Today, the toughest challenges, and greatest opportunities, require computation
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
IBM Storwize V7000 Unified and Storwize V7000 storage systems
IBM Storwize V7000 Unified and Storwize V7000 storage systems Transforming the economics of data storage Highlights Meet changing business needs with virtualized, enterprise-class, flashoptimized modular
Intel RAID Controllers
Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications
EMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server
White Paper EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server Abstract This white paper addresses the challenges currently facing business executives to store and process the growing
