Meet the Cloud API The New Enterprise Control Point
|
|
- Aldous Wiggins
- 8 years ago
- Views:
Transcription
1 Meet the Cloud API The New Enterprise Control Point Presented by: Katrina Kehlet Intel Application Security and Identity Products 1
2 Agenda Why Intel & McAfee- Security Connected Cloud Promise & Threat Environment Why APIs are Central to Control for Cloud Cloud API Fundamentals Cloud API Deployment Models Intel & McAfee Solutions 2
3 Intel & McAfee: Security Connected Extended Enterprise Security Continuum Devices & Infrastructure Security Layers Cross Hardware & Software Cloud APIs App Services Data OS/VM Chip/CPU On-Prem to Cloud Private, Public, Hybrid SaaS, PaaS, IaaS Unique insight into hardware, client, server platform security Driving Innovation through Ecosystem Security Connected! Endpoint, DLP, Threat, App Identity Security Network Edge & SaaS Delivery Security is no longer a siloed discipline for the Extended Enterprise. Security & Identity establish trust across the continuum 3
4 Creating an Explosion of Internet Growth Today 2015 More Users Only 25% of the world is Internet connected today 1 New technologies will connect over 1 billion additional users to the cloud 2 More Devices ~80% of Internet connected devices are computers & phones 3 Cars, TVs, households, etc. to increase connected devices 2.5x to >10 billion globally 3 More Content 2.5B photos on Facebook 4 30B videos viewed/mos 5 Google indexes >1T pages 6 8X network, 16X storage & 20x compute capacity needed 7 Exponential growth driving need for a Billion Virtual Server Cloud 7 4
5 Cloud Models & Players 5
6 The Promise of the Cloud-Scale out on Demand 6
7 The Power of Cloud Computing Business agility Cost efficiencies Enhanced innovation Improved IT services However, security remains the roadblock Data loss Authentication, Authorization and Audit Information governance Data control 7
8 Big Impact, Big Challenge, Big Opportunity Q: How concerned are you about each of the following potential security threats to your IT environment? (1=not at all concerned, 7= very concerned)1 Q: On average, how many virus or malware attacks are you thwarting each month? Identity Theft: $37 billion, 8.1 Million US Adults affected (2010) 2010 Identity Fraud Survey Report, Javelin Research Group Feb, , 2 Source: Intel Primary Research, August 2011 Q: On average, how many virus or malware attacks are you thwarting each month?2 2010: $7.24M ($213 per record) Ponemon Institute Annual Study: Cost of a Data Breach. March 2011 Average Organizational Cost of a Data Breach in Intel Confidential 8
9 Key Trends Affecting Security Malware Explosion Threat Sophistication Targeted Attacks Exponential Growth In Connected Devices Multiple Access Points Manageability Q3/Q4-2009: million samples Q1/Q2-2010: million samples Q3/Q4-2010: million samples Q1/Q2-2011: million samples Source: McAfee Malware Database July 2011 Cloud = Changing Perimeters SLAs New Security Models Compliance Concerns 9
10 Goal? Build the Secure,Connected Chain to the Cloud WHO WHAT WHERE Text here Users and Devices Text here Data and Apps Private Hybrid Public Tied to Asserted/ Federated Cloud Traffic Channels Digital Identities On-Behalf of Enterprise Web Authentication How? The Cloud API 10
11 Cloud API Growth Exploding Top 5 API Types 1. Social 2. Internet 3. Mapping 4. Search 5. Mobile 1/3 of Enterprise Traffic Today is API based 11
12 Cloud Application & API Security Adoption Cloud Security Hype Cycle 2011 App Security as a Service Private Cloud Computing Cloud Security Gateways Cloud Service Brokerage OAuth Security & Risk Standards Tokenization Security as a Service Secure Web Gateways Phone based AuthN Federated Id Mgt /Encryption Technology Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity Time 12
13 Evolution to the Cloud API Control Change: SOA > Services > APIs 13
14 Primary Challenges to Exposing Applications & APIs in the Cloud One-off API Mgt V1 API Gateway V2 Proxy Single App Service V3 Custom Developed Security custom code var JS_KeepTrying = "Keep Trying"; var JS_TryAgain = "Try Again"; var js_0001 = "Please select at least one vendor from the list."; var js_0002 = "Please choose dates in the future."; var js_0003 = "Please choose a checkout date that is at least one day later than your check-in date."; Var var IS_DDPU_ js_0004 = "Please choose dates that ENABLED are less than = 330 false days away."; var js_0005 = "Searching for deals... this may take Security a few moments"; var js_0006 = "Your selections have Hole not changed."; var js_0010 = "Please click again to open each window or adjust browser settin "Update"; var js_0012 = "Show next offer"; var COTs Standards WS* WS-Trust WSDL OAuth Encryption etc Standards based XML Security??? What function call? Complexity Abstraction Point To Shield Dev App Retooling for APIs Fast Changing Cloud APIs Costs at Scale Don t use API Broker to Interface to 3 rd Party Cloud APIs Can t Migrate to Cloud Changes Versioning, Governance, Lifecycle Mgt Short Relationships Immature Provider APIs Repeatable Model Packaged Integration Governance Security API Monetization & Service Brokers Offset costs with way to make $? 14
15 How Cloud Changes the Security Deployment Model to Focus on APIs Traditional Web App Security Model Web IPS WAF IPS Ent Apps Data Store IaaS Cloud Security Model Enterprise Apps must be re-tooled to work with 3 rd Party Provider APIs SAN 15
16 Cloud API Essentials Abstraction General programming interface accessible over HTTP Implementation (REST, SOAP, JSON) not important it s how to scale, secure, manage, audit Keep security & management close to API but abstracted to achieve scale New I/O to interact with: smart phones, apps, browsers, middleware, legacy Encapsulate functions & shield from back end complexity 16
17 Enterprise vs Social APIs Enterprise class security, policy lifecycle management Re-useable by large # of developers Discovery, key & service management Mediation-protocol & token translation Scale high performance across global data centers. Basic security typically REST Speed to implement is priority Monetization & scaling not a priority Publishing focused Enterprise Social Today s API Management Must Bridge Both Concerns 17
18 From SOA Service Governance to API Management Focus on Service Lifecycle Management to Share in One Domain Focus on Policy Lifecycle Management for API to Share Across Many Clouds Enterprise SOA Design Test Business Service Repository Service Retire Production Pre- Production Policy API Service Tracking Versioning, usage, metering, performance Promote APIs- dev, test, prod Storage, meta data, discovery Approval, rollback, upgrade, source control Endpoint update API Consumption Policies Tracks how accessed, changed, tracked, translation Based on identity Transaction context & partner capabilities SLA or subscription agreements sfidentity Is Glue to Establish Cloud Trust Cloud API Governance manages terms for 3 rd party consumption 18
19 Costs Manual API Mgt Driving Cost Increases Avg 10 Today V.1 V.2 Exploding Costs Support Multi-Channel Traffic Dynamically Changing Providers Cloud Provider APIs Immature = Frequent Changes Versioning # of APIs Must have an API monetization strategy to offset costs Must have a way to Auto Manage APIs for scale 19
20 APIs are Strategic Control Points for Cloud Core Apps CRM Workflow Doc Mgt IAM ERP/Mainframe API Broker API Broker API Management Control Performance Management Integration & Service Lifecycle Management Enforce Access & ID Token Translation Threat Protection - DoS, Content Threats Visibility, Auditing, Usage Apps SaaS CRM Partner B2B Social Mashups Xxx takeaway 20
21 What can an Enterprise Control Across Cloud Models with an API? Cloud Provider Enterprise Software as a Service (SaaS) Total Control Application Middleware Operating System Hardware e.g.,.net Identity AuthN, SSO, Metering Platform as a Service (PaaS) Admin Control Total Control Application Middleware Operating System Hardware API Control: Data, Threat Protection, Mediation to on-prem SOA Infrastructure as a Service (IaaS) Admin Control Total Control Application Middleware Operating System Hypervisor Hardware Total API Control Throttle Requests Lower Software down Available the stack Today the provider can Enable stops, IT the more security or the Cloud enterprise Providers is responsible to be a for CSB implementing 21
22 Rise of Cloud Service Broker - Widely Recognized as Key Capability For Cloud Security Privacy NIST - USG Cloud Computing Reference Architecture Cloud Consumer Cloud Auditor Security Audit Privacy Impact Audit Service Layer IaaS PaaS SaaS Resource Abstraction and Control Layer Physical Resource Layer Hardware Cloud Provider Cloud Service Management Business Support Provisioning/ Configuration Portability/ Interoperability Cloud Broker Service Intermediation Service Aggregation Service Arbitrage Performance Audit Facility By 2015, at least 20% of all cloud services will be intermediated via CSBs Daryl Plummer, Managing VP, Gartner Fellow 22
23 Capabilities Available Today Using Gateway Cloud Service Broker Appliance Software CSB On Prem CSB 3 rd party Intermediary Value added processing Packaged API Level Policies Security, Governance, Integration Solves Complexity, Overhead Identity as a Service Security as a Service Trust as a Service IT Departments Can Run On-prem 23
24 New Primary Usage Models for CSBs & API Control Enterprise Middleware Gateway Gateway Gateway Gateway Enterprise Enterprise (Partner) Enterprise Edge Security B2B & mobile to partners Provider Customer or Developers Cloud Provider API Security AuthN, mediation, & QOS packaged services Provider Enterprise Hybrid Cloud-Data & Control Gateway Security to platform provider e.g. storage Security for VM spin up EC2 Provider Enterprise (Partner) Hybrid Cloud-Hosted Edge Security Secure enterprise services on cloud 24
25 Adoption phases IT Tips to Move to API Centric World Retrofit Apps to Leverage API Broker Model as they are moved to cloud Retrofit Ungoverned Apps Service Proxy Targeted Runtime Governance Time 25 25
26 Adoption phases IT Tips to Move to API Centric World Target SaaS. Widespread Adoption Will Drive Immediate ROI Broker IDs for Delegated API Level Auth STS Token Translation, OAuth, SAML, Open ID SaaS Gateway Retrofit Apps Targeted Runtime Governance Time 26 10/17/
27 Adoption phases IT Tips to Move to API Centric World SOA is not Dead - Evolve Services & Governance from Siloed Internal Domains to Cloud Enable the Hybrid Cloud Model by deploying Gateway on Prem Hybrid Mediation SaaS Gateway Retrofit Apps Targeted Runtime Governance Policy Driven SOA Time 27 10/13/
28 Adoption phases IT Tips to Move to API Centric World Leverage Your On-prem Gateway to Interact with 3 rd Party CSBs as they Emerge Cloud Service Brokerages Hybrid Mediation SaaS Gateway Retrofit Apps Targeted Runtime Governance Time 28
29 McAfee Cloud Security Platform Build the Identity Driven Cloud Across Cloud Traffic Channels Unify App APIs, Collaboration, and Policy With Intel & McAfee Modules 2 29
30 Service Gateway FIPS Level 3 Crypto Common Criteria EAL4+ DoD STIG Ready & PKI Certified HSM PKI key storage Cavium crypto acceleration Form factors: software, virtual, and tamper resistant Protocol Agnostic Performance No Programming Flexible CODING REST.,SOAP XML, Non-XML HTTP, FTP, TCP 2x hard appliances Tie-in to chip roadmap Efficient XML parsing at machine level Simple visual environment Routing Transform Validation Service Call-outs Firewall rules 30
31 Your Path to Monetizing APIs and Apps in the Cloud API API Management API Throttling, metering, rate limits Data encryption, tokenization, translation PCI compliant APIs Id token translation and authn Policy lifecycle governance & enforcement Alerts API Management Value Governance Value Chargeback on usage or throughput SLA wait time violations by partner Correlate to web purchases, traffic, dev registrations Restrict search API queries Geo restriction & visibility- by partner Track most active services Enforce SLAs for middleware Partner reports-usage, problems accessing service 31
32 Complete API Security & Visibility - Tied to McAfee Platform Products McAfee epo Integrate API monitoring to central console McAfee Web Gateway Leverages anti virus and web filtering McAfee Data Loss Prevention Provides data leak protection for APIs McAfee Global Threat Intelligence Provides URL and connection reputation 32
33 More Info Free Gartner Report on Cloud Service Brokerage 5 Core API Use Cases Video Cloud API Resource Page More Info 33
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
More informationBlending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
More informationSecure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
More informationManaging SOA Security and Operations with SecureSpan
Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance
More informationThe Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
More informationHelping organizations secure and govern application services for SOA, Web and the Cloud
Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA
More informationSecurity Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
More informationAPI Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
More informationAPIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
More informationIBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
More informationContents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com
Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
More informationTable of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
More informationThe bridge to delivering digital applications across cloud, mobile and partner channels
Axway API Gateway The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway a foundational component in an API-first architecture for digital business provides
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationThe standards landscape in cloud
The standards landscape in cloud PRESENTATION computing TITLE GOES HERE Vincent Franceschini CTO Distributed Architectures, Hitachi Data System Chairman Emeritus, SNIA Governing Board Member, SNIA Cloud
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationLooking Ahead The Path to Moving Security into the Cloud
Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application
More informationNETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
More informationBuilding the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
More informationUsing Layer 7 s API Gateway for vcloud Architectures How to achieve abstraction, security and management of vcloud APIs.
Using Layer 7 s API Gateway for vcloud Architectures How to achieve abstraction, security and management of vcloud APIs White Paper Contents Executive Summary... 3 Why Use an API Gateway with vcloud...
More informationSentinet for BizTalk Server SENTINET 3.1
for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,
More informationFrom the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
More informationSecurity to Connect Back-end APIs with HTML5 Cross Platform Apps
API Security to Connect Back-end APIs with HTML5 Cross Platform Apps Andy Thurai, CTO, Intel Big Data & Application Security Software Twitter: @AndyThurai Blog: www.thurai.net/securityblog Intel software
More informationBecoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
More informationNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting
More informationEmerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices
Emerging Approaches in a -Connected Enterprise: Containers and Microservices Anil Karmel Co-Founder and CEO, C2 Labs Co-Chair, NIST Security Working Group akarmel@c2labs.com @anilkarmel Emerging Technologies
More informationCAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
More informationAn Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationContents. Overview 1 SENTINET
Overview SENTINET Overview 1 Contents Introduction... 3 Customer Benefits... 4 Development and Test... 4 Production and Operations... 5 Architecture... 5 Technology Stack... 8 Features Summary... 8 Sentinet
More informationCloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
More informationSecuring The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
More informationA Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011
A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud
More informationWhat Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
More informationCloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011
Cloud Security/Access Control and Identity Management Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011 Agenda Evolution of IT and IdM Requirements Building and Securing Clouds Oracle Public Cloud
More informationCloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
More informationMobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com
Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems jmacy@forumsys.com Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service
More informationCloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, marchany@vt.edu Something Old, Something New New: Cloud describes the use of a collection of services, applications,
More informationAn enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises
agility PLATFORM Product Whitepaper An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises ServiceMesh 233 Wilshire Blvd,
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationSOA @ ebay : How is it a hit
SOA @ ebay : How is it a hit Sastry Malladi Distinguished Architect. ebay, Inc. Agenda The context : SOA @ebay Brief recap of SOA concepts and benefits Challenges encountered in large scale SOA deployments
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationCoIP (Cloud over IP): The Future of Hybrid Networking
CoIP (Cloud over IP): The Future of Hybrid Networking An overlay virtual network that connects, protects and shields enterprise applications deployed across cloud ecosystems The Cloud is Now a Critical
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationDon't outsource IT! Bring your own Cloud with SDN
Don't outsource IT! Bring your own Cloud with SDN Education Session 19 Herman Chao Systems Engineering Manager, Cisco State of CA Government May 2015 Agenda Industry Need and Trends The Network Challenge
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationThe Netskope Active Platform
The Netskope Active Platform Enabling Safe Migration to the Cloud Massive Cloud Adoption Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across
More informationCloud IaaS Migration Roadmap
Cloud IaaS Migration Roadmap A framework for migrating an existing onpremise infrastructure to a public cloud provider Richard Weiss November 3rd 2015 Richard Weiss Principal Consultant, Pythian Group
More informationOverview of IBM Cloud Integration
March 25, 2014 Overview of IBM Cloud Integration Adam Gunther Program Director, Cloud Offerings, WebSphere Product Management Matt Lucas Lead Architect, IBM Integration Bus Agenda Market Observations API
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationTrend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
More informationUnified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
More informationPRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationRE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
More informationHOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
More informationCore Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationCloud, SDN and the Evolution of
Cloud, SDN and the Evolution of Enterprise Networks Neil Rickard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationOracle Cloud 25.09.14. Bjarte Drivenes Enterprise Architect. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud 25.09.14 Bjarte Drivenes Enterprise Architect Copyright 2014 Oracle and/or its affiliates. All rights reserved. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Agenda Private
More informationEnterprise-class API Patterns for Cloud & Mobile
May 2012 Enterprise-class API Patterns for Cloud & Mobile Sponsored by Contents Foreword: The API Is the New Website 1 Requirements for Enterprise APIs 2 Standards for Consuming and Exposing APIs 2 Enterprise-Class
More informationMobile Security and Management Opportunities for Telcos and Service Providers
Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile
More informationBringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com
Bringing Cloud Security Down to Earth Andreas M Antonopoulos Senior Vice President & Founding Partner www.nemertes.com Agenda About Nemertes Cloud Dynamics and Adoption Assessing Risk of Cloud Services
More informationMcAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
More informationAPI Management Introduction and Principles
API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common
More informationService Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
More informationB2B Cloud Services. Transforming the B2B Integration Landscape. 2011 IBM Corporation
B2B Cloud Services Transforming the B2B Integration Landscape Agenda Business Trends and Your Dynamic Business Network B2B and the Cloud A Vision for B2B Cloud Services 2 Disclaimer IBM s statements regarding
More informationSecuring the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
More informationAn Open Policy Framework for Cross-vendor Integrated Governance
An Open Policy Framework for Cross-vendor Integrated Governance White Paper Intel SOA Expressway An Open Policy Framework for Cross-vendor Integrated Governance Intel SOA Expressway delivers a pluggable
More informationIT AS A SERVICE BROKER
IT AS A SERVICE BROKER MIT Sloan CIO Symposium May 21, 2014 Thomas P. Roloff Senior Vice President EMC Global Services twitter: @TRoloff 1 Why Transformation? Business is Changing Faster Than IT Business
More informationOPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationTHE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
More informationVirtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
More informationSecurity in the Software Defined Data Center
Security in the Software Defined Data Center Francesco Vigo Senior Systems Engineer, VMware fvigo@vmware.com Ugo Piazzalunga Technical Manager, SafeNet ugo.piazzalunga@safenet-inc.com Agenda Software Defined
More informationT-SYSTEMS Cloud STORY
Michael Moritz Lead Enterprise Architect Cloud Computing Cloud & Partner Sales - CTO Office T-Systems International GmbH Agenda Cloud Challenges T-Systems Cloud Strategy 2 Agenda Cloud Challenges T-Systems
More informationMoving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
More informationSecure your cloud applications by building solid foundations with enterprise (security ) architecture
Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More informationHybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group
Hybrid Cloud: Overview of Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group Agenda Why Hybrid cloud? Cisco Vision Hybrid Cloud Use Cases and ROI Architecture Overview Deployment Model and
More informationMobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
More informationInfrastructure for more security and flexibility to deliver the Next-Generation Data Center
Infrastructure for more security and flexibility to deliver the Next-Generation Data Center Stefan Volmari Manager Systems Engineering Networking & Cloud Today's trends turn into major challenges Cloud
More informationPresented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com. Securing application delivery in the cloud
Presented by Philippe Bogaerts Senior Field Systems Engineer p.bogaerts@f5.com Securing application delivery in the cloud 2 The Leader in Application Delivery Networking Users Data Center At Home In the
More informationReplacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands
Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP Dennis de Leest Sr. Systems Engineer Netherlands Microsoft Forefront Threat Management Gateway (TMG) Microsoft Forefront Threat Management
More informationWebSphere Integration Solutions. IBM Day Minsk 2014. Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe
WebSphere Integration Solutions IBM Day Minsk 2014 Ann Litvinov WebSphere Connectivity Professional Central Eastern Europe 1 Agenda 1 Understand vision for ESB capabilities 2 Understand DataPower Basics
More informationDynamic Security for the Hybrid Cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
More informationCloud Computing and Standards
Cloud Computing and Standards Heather Kreger CTO International Standards, IBM kreger@us.ibm.com 2012 IBM Corporation Technology will play the key role in success Speed Value 90% 1 view cloud as critical
More informationDeep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
More informationIntel IT Cloud 2013 and Beyond. Name Title Month, Day 2013
Intel IT Cloud 2013 and Beyond Name Title Month, Day 2013 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Intel and the
More informationApigee Edge API Services Manage, scale, secure, and build APIs and apps
Manage, scale, secure, and build APIs and apps Hex #FC4C02 Hex #54585A Manage, scale, secure, and build APIs and Apps with is designed to unite the best of Internet and enterprise technologies to provide
More informationThank you for joining us today! The presentation will begin shortly. Thank you for your patience.
Thank you for joining us today! The presentation will begin shortly. Thank you for your patience. Copyright 2012-2015. SDNCentral LLC. All Rights Reserved September 11, 2015 Webinar Logistics Enable pop-ups
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationKeith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com
1 Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com Agenda Cloud Computing VMware and Security Network Security Use Case Securing View Deployments Questions 2 IT consumption
More information