Shared Services Canada (SSC)

Size: px
Start display at page:

Download "Shared Services Canada (SSC)"

Transcription

1 Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29,

2 Agenda TIME TOPICS PRESENTERS 9:00 9:10 Opening Remarks, Objectives & July Meeting Review 9:10 9:15 Cloud Computing: Recap from July AFAC meeting B. Long, Chair W. Daley, Vice-Chair B. Long 9:15 9:40 Cloud Computing Architecture J. Danek 9:40 10:20 Round Table All 10:20 10:30 Health Break 10:30 11:00 Identity, Credential & Access 11:00 11:45 Round Table All R. Thuppal 11:45 12:00 Closing Remarks Chair 2

3 Shared Services Canada Enterprise Architecture Cloud Computing Architecture AFAC Meeting 2 August 29, 2013 Jirka Danek DG Enterprise Architecture 3

4 SSC High Level Requirements Application mobility between private, public and hybrid cloud environments Ability to manage, orchestrate, administrate, and provision from a single open interoperable architectural framework Ability to provide an environment for open competition and level playing field among vendors To ensure on-going competition (not just at contract award) low cost / high value to the Crown over the contract life Agility to have flexibility in the architecture that will allow for scale both from a capacity perspective and with respect to change in technology directions driven by our requirements and marketplace opportunities 4

5 GC Cloud Orchestration Architecture v1 Portal and Self Service Catalogue Multi-Cloud Services (Orchestration, Governance, Financial Control, Brokering, ICAM, Reporting) GC Hybrid Cloud Services GC Public Cloud Services Service, Security, Savings Agility & Mobility GC Community Cloud Services 5

6 July AFAC Cloud Computing Feedback OpenStack was considered by some as not mature enough at this time OpenStack was seen as a potential option for open cloud interoperability, however, it was noted that there are very few significant production implementations at this time It was observed that OpenStack is just one of a number of cloud open standards bodies, and no clear winner has emerged at this time OpenStack is complex and implementation skills are not readily available Fail fast test it and try application mobility in small initial iterations Some AFAC members suggested the cost of the systems integration work for OpenStack would out-weigh the benefit of application mobility Some participants felt that OpenStack would be good for selective non-mission critical workloads Others felt that OpenStack would be good as a long term strategy, but shouldn t be the only plank in SSC s approach to cloud interoperability Did we hear you correctly?? 6

7 SSC DC Challenge Sample Win/Lintel Only Cloud Computing Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Mgmt. Compute Compute Compute Compute OS OS OS OS Hypervisor Hypervisor Hypervisor Hypervisor Hardware Hardware Hardware Hardware 7

8 SSC DC Challenge Sample Win/Lintel Only Cloud Computing VCE FlexPod vstart PureFlex CloudSystem HItachi Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Mgmt. Integrated Infrastructure Systems Compute OS Compute OS Compute OS Compute OS Compute OS Compute OS Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor Hypervisor 8

9 SSC DC Challenge Sample Win/Lintel Only Cloud Computing IBM PureApplication HP AppSystem Oracle Exadata Integrated Application Systems Integrated Mgmt. Compute OS Integrated Mgmt. Compute OS Integrated Mgmt. Compute OS Hypervisor Hypervisor Hypervisor DBMS 9

10 Roadmap of Cloud-based Services Multi-Services, Service Providers and Service Layers Private, Public and Hybrid Cloud Environments Roadmap includes: Enterprise HR Service Enterprise Finance Service Enterprise Document Service Enterprise Web Hosting Service GCNet Services Unified Communications Services Enterprise Data Centre IaaS and PaaS Services Partner-based SaaS implementations (except ETI) 10

11 The Emerging Broker Role Cloud Broker Roles 1. Service Intermediation Enhances via value-added services 2. Service Aggregation Cloud services integration from multiple CSPs 3. Service Arbitrage Managing capacity dynamically, or managing service across a number of providers to meet, for example, SLA or optimum cost metrics. NIST Cloud Reference Architecture: 11

12 Broker Use Cases 1. of New Hires: A new government employee joins the government. Their HR information is with Cloud Service Provider #1 (CSP #1) and their financial information and pay systems are with CSP #2. Their is with CSP #3. How does SSC orchestrate interoperability among the systems? What is a broker role? How do we manage ICAM, and directory services? How do we manage custom interoperability? 2. Fail Over and DR: SSC implements a mission critical application internally and wishes to fail over based on capacity thresholds to a hybrid cloud or public cloud provider. 3. Dynamic Allocation: SSC implements an IaaS service for a government web site that is anticipating dramatic changes in capacity that cannot be estimated. Can we implement a pool of cloud providers and allocate workloads based on price or capacity thresholds? 12

13 Questions 1. How do we architect to effectively manage the future state environment? 2. Do we architect for separate management and orchestration systems and processes for each service? 3. Are there mature enterprise reference architecture models that bridge SaaS to PaaS from different service providers? 4. How do we ensure vendor neutrality in this kind of situation? 5. How should we architect to manage cloud sprawl? 13

14 Shared Services Canada Enterprise Architecture Identity, Credential & Access AFAC Meeting 2 August 29, 2013 Raj Thuppal DG Cyber & IT Security Transformation 14

15 Purpose Present GC ICAM proposed plan and Early Releases Seek feedback and input Questions/Discussion 15

16 July 2013 AFAC ICAM Feedback Build in increments according to need and priorities make it as simple as possible Have very clear business goals Make it something attractive that users want to get Scaling to a new identity might be a challenge incrementally connect the islands and migrate from the islands to a consolidated approach Consider all open standards, protocols (e.g. SAML and others) Awareness one of the costs impacts of ICAM is the admin of credentials: Consolidate credentials Be cost effective Bring as much capability as possible to Help Desk (SSC & Partner) Work on the security posture Privacy by Design some provinces have some of the best privacy practices Did we hear you correctly?? 16

17 IT Security Transformation (Draft) IT Security Current State Dept Dept Dept IT Security Target State GCNet Multiple Identities Multiple Identities Multiple Identities Multiple Credentials Single Identity Unified Credential Data in Transit Back office Back office Apps Apps Multiple Multiple Access Access Controls Controls Data in Processing Data at Rest Mission Mission Specific Specific Apps Apps DEFENCE IN DEPTH Consolidated Consolidated Back office Back office Apps Apps Centralized Access Data at Controls Rest Data in Data at Transit Rest Data in Processing Mission Mission Mission Specific Mission Specific Specific Apps Specific Apps Apps Apps Focus on network, perimeter protection and network authentication Focus on data, through layers of protection, separation and active detection Transformation from multiple network domains to single GC domain requires shift from network based security to identity and data based security. 17

18 ICAM Challenges and Requirements DRIVERS Increase Security Improve Service Generate Savings CHALLENGES Lack of comprehensive access controls and management of admin privileges, and dormant accounts Limited GC policy and standards enforcement capability Lack of single GC identity repository Partner specific ICAM, difficult to implement GC wide services Hard coded dependency on ICAM solutions inhibits service evolution Duplication and fragmented technologies, processes and service management Lack of GC wide capability forces application specific ICAM solutions (ex: ETI) SSC Initiatives Blackberry 10 GC-Wifi GCNet GC converged communications GC Secret infrastructure Data centre consolidation Workplace technology devices TBS Initiatives HR Web Fin GCDocs Mobility EMERGING REQUIREMENTS 18

19 GC ICAM Scope (Proposed) Scope: A Government of Canada solution Internal GC workers (e.g. employees, contractors, agents of the Crown, integrees, trusted guests, retirees) and non-person entities (e.g. devices, applications) Logical (IT systems/applications) and physical (building) access management Designated (to Protected B*) and Classified (to Secret) identities, credentials and resources will be managed Current ICAM-related processes and technologies will be transformed to the new ICAM solution, and new ones will be created as needed Out-of-Scope: Individuals and businesses external to the Government of Canada *Note: Protected C requirements are handled as part of the Classified environment 19

20 GC ICAM Schedule (Proposed) Current State Inventory of infrastructure and systems Lessons learned Requirements Partner and enterprise requirements End State Plan and Procure End-state architecture and design Service strategy, design, delivery model Business case(s) Consolidation and transformation roadmap Implementation plan Detailed Plans Implement Rn Program : Project, Reporting, Communications, Governance, Stakeholder Engagement, Finance ( ) Implement Rn ( ) Implement Future State ( ) 2013 Sept Jun Sep. Dec. Apr

21 Current State Identity Credential Requirements and Support to Transformation Programs (e.g., , Data Centre ) Access PWGSC Industrial Security Program Workers Security Clearance Attributes Transformation Initiative Employee Attributes ETI Onboarding HR Applications (43 Partners ++) Employees Attributes GEDS Employee Attributes mykey ICM Service Person PKI Key & Onboarding PKI Directory services Departments (DND, RCMP, CRA) Person PKI Key PKI Directory services Others (e.g. SSL ) Line of Business Applications Embedded credential Departments tools and policies Secure Remote Access Departments Facilities PenMod Employee Attributes 21

22 Opportunities TBS back office application modernisation initiatives (HR, Fin, Web, GCDocs) IT service specific ICAM solutions are being designed due to lack of GC wide solution (Ex: ETI), there is an urgent need for a GC ICAM solution (SSC and TBS led initiatives) Internal credential management system is already a GC wide service that could be transformed (open standards, consolidation, decouple from applications etc..) to end state service relatively quickly ETI directory could be leveraged to populate GC ICAM AFAC, industry feedback and previous GC attempts recommend building in increments according to need and priorities and make it as simple as possible 22

23 GC ICAM Schedule (Proposed) Current State Inventory of infrastructure and systems Lessons learned Requirements Partner and enterprise requirements End State End-state architecture and design Service strategy, design, delivery model Tactical Plan Plan and Procure Detailed Plans Business case(s) Consolidation and transformation roadmap Implementation plan Implement Rn Program : Project, Reporting, Communications, Governance, Stakeholder Engagement, Finance ( ) Implement Rn ( ) Implement Future State ( ) 2013 Sept Jun Sep. Dec. Apr

24 ICAM Transformation Strategy Policies Analysis, Access IOS ICAM Directory Policies Process Governance Technology Policies Process Governance Technology July 2013 Dec Jan Dec GC ICAM Program Release 1 ICAM: Identity : Attributes Authoritative Sources Onboarding process Identity Manager Release 2: Identity Credential Access Release...: Identity Credential Access Credential : Applications Authentication (UserID/Pw or mykey) PKI Transformation Access : PiV cards for SSC Simple Sign-On 24

25 GC ICAM Release 1 (Proposed) Principles Avoid development of application specific ICAM services Leverage existing enterprise ICAM services (ETI, ICMS etc..) Adopt open standards Focus on foundation elements that paves way for future GC ICAM Consolidate identities Scope Identity Identify attributes and their authoritative sources Build GC ICAM directory leveraging ETI directory services and other sources Establish GC identity manager that hosts user identities and passwords Credential Transform GC-ICMS and other PKI services Application authentication/decoupling (e.g. using SAML) Access Building access card standard and pilot Web application simple sign-on 25

26 New GC ICAM Service Release 1 - Draft Identity PWGSC Industrial Security Program Workers Security Clearance Attributes Transformation Initiative Employee Attributes ETI Onboarding HR Applications (43 Partners ++) Employees Attributes GEDS Employee Attributes PenMod Employee Attributes Credential Requirements and Support to Transformation Programs and TBS Initiatives (e.g. HR, WEB, Fin, GCDOCS,, , Data Centre ) mykey ICM Service Person PKI Key & Onboarding PKI Directory services Departments (DND, RCMP, CRA) Person PKI Key PKI Directory services Others (e.g. SSL ) Line of Business Applications Embedded credential Access Departments tools and policies Secure Remote Access Departments Facilities New Enterprise Service Identity : Attributes Authoritative Sources Onboarding process Identity Manager Credential : Applications Authentication (UserID/Pw or mykey) PKI Transformation Access : PiV cards for SSC Simple Sign-On 26

27 Questions - Engaging Discussion For the GC ICAM: 1. Is proposed Release 1 scope sufficient to establish critical foundation for GC ICAM? 2. Should the strategy for internal ICAM be federated or non-federated? 3. Should the strategy for ICAM authoritative sources be federated or nonfederated? 27

Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee

Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design December 17, 2012 Agenda TOPICS PRESENTER(S) 9:00 9:15 Opening Remarks and

More information

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013 Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for

More information

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014 CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION Architecture Framework Advisory Committee November 4, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks and Introductions Shirley Ivan,

More information

Workplace Technology Devices: Session 4. Architecture Framework Advisory Committee Meeting April 16, 2014

Workplace Technology Devices: Session 4. Architecture Framework Advisory Committee Meeting April 16, 2014 Workplace Technology Devices: Session 4 Architecture Framework Advisory Committee Meeting April 16, 2014 1 Agenda TIME TOPICS PRESENTERS 9:00 9:10 9:10 11:50 11:50 12:00 Opening Remarks Workplace Technology

More information

Shared Services Canada. Cloud Computing

Shared Services Canada. Cloud Computing Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks

More information

Shared Services Canada (SSC)

Shared Services Canada (SSC) Shared Services Canada (SSC) Cloud Computing: Outstanding Challenges Architecture Framework Advisory Committee Transformation, Service Strategy and Design July 16, 2013 Agenda TIME TOPICS PRESENTERS 9:00

More information

Shared Services Canada Converged Communications Session III Architecture Framework Advisory Committee

Shared Services Canada Converged Communications Session III Architecture Framework Advisory Committee Shared Canada Converged Communications Session III Architecture Framework Advisory Committee Transformation, Service Strategy and Design June 3, 2013 Agenda TIME TOPICS PRESENTERS 09:30 09:45 Opening remarks

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

From Virtualized to ITaaS. Copyright 2011 EMC Corporation. All rights reserved.

From Virtualized to ITaaS. Copyright 2011 EMC Corporation. All rights reserved. From Virtualized to ITaaS 1 Priority Discussion Topics Laying the foundation for IT-as-a- with the right architecture Key process areas and capabilities that need to be rethought during the process (ie.

More information

Shared Services Canada and Cloud Computing

Shared Services Canada and Cloud Computing Shared Services Canada and Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design February 21, 2013 Agenda TIME TOPICS PRESENTER(S) 9:30 9:40 Opening Remarks

More information

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011

A Strawman Model. NIST Cloud Computing Reference Architecture and Taxonomy Working Group. January 3, 2011 A Strawman Model NIST Cloud Computing Reference Architecture and Taxonomy Working Group January 3, 2011 Objective Our objective is to define a neutral architecture consistent with NIST definition of cloud

More information

Government of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap

Government of Canada (GC) Cloud Computing: Information Technology Shared Services (ITSS) Roadmap EDRM 1102023 v6 Government of Canada (GC) Cloud Computing: Information Technology Shared (ITSS) Roadmap Jirka Danek, Chief Technology Officer Information Technology Branch Public Works and Government Canada

More information

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft)

NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Reference Architecture (SP 500-299 draft) NIST Cloud Computing Security Working Group Dr. Michaela Iorga, NIST Senior Security Technical Lead for Cloud Computing Chair, NIST

More information

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II

Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II info@globalknowledge.net www.globalknowledge.net Understanding NIST s Cloud Computing Reference

More information

Applying Business Architecture to the Cloud

Applying Business Architecture to the Cloud Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support

More information

Cloud Computing and Data Center Consolidation

Cloud Computing and Data Center Consolidation Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model! The agile Cloud Brokerage approach An innovative, business aligned and mature IT services delivery model! CLOUD BROKER DEFINITION as defined by the NIST A Cloud Broker is an entity That manages the selection,

More information

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs

CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs CLOUD SERVICE LEVEL AGREEMENTS Meeting Customer and Provider needs Eric Simmon January 28 th, 2014 BACKGROUND Federal Cloud Computing Strategy Efficiency improvements will shift resources towards higher-value

More information

NIST Cloud Computing Program

NIST Cloud Computing Program NIST Program USG Roadmap Top 10 high priority requirements to accelerate USG adoption of the model NIST Mission: To promote U.S. innovation and industrial competitiveness by advancing measurement science,

More information

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com

Build & Manage Clouds with Red Hat Cloud Infrastructure Products. TONI WILLBERG Solution Architect Red Hat toni@redhat.com Build & Manage Clouds with Red Hat Cloud Infrastructure Products TONI WILLBERG Solution Architect Red Hat toni@redhat.com AGENDA Cloud Concepts Market Overview Evolution to Cloud Workloads Evolution to

More information

44 th International Council for Information Technology in Government Administration (ICA) Conference

44 th International Council for Information Technology in Government Administration (ICA) Conference EDRM # 1232029 Government of Canada (GC): Seeing the Future in the Clouds 44 th International Council for Information Technology in Government Administration (ICA) Conference Maurice Chenier, CEO, IT Shared

More information

Sunshine in a Cloudy World

Sunshine in a Cloudy World Sunshine in a Cloudy World OpenStack 101, HP and OpenStack Jeff Holderfield jeffh@hp.com @jeffholderfield Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Cyber Security Symposium 2015 September 29,2015

Cyber Security Symposium 2015 September 29,2015 Cyber Security Symposium 2015 September 29,2015 Introducing David Langston Branch Manager Security Management Department of Technology 2 About CalCloud Mission Offer cost-effective cloud solutions that

More information

A New Way to Compute or: How I Learned to Stop Worrying and Love the Cloud

A New Way to Compute or: How I Learned to Stop Worrying and Love the Cloud A New Way to Compute or: How I Learned to Stop Worrying and Love the Cloud Robert Bohn NIST March 7, 2012 DC/SLA Washington, DC Chapter History Cloud" is borrowed from telephony. Telecoms once offered

More information

Seeing Though the Clouds

Seeing Though the Clouds Seeing Though the Clouds A PM Primer on Cloud Computing and Security NIH Project Management Community Meeting Mark L Silverman Are You Smarter Than a 5 Year Old? 1 Cloud First Policy Cloud First When evaluating

More information

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod

WWT View Point. Journey to the Private Cloud: Take the First Steps with FlexPod WWT View Point Journey to the Private Cloud: Take the First Steps with FlexPod TABLE OF CONTENTS 1...EXECUTIVE OVERVIEW 2...SECTION 1: THE ROAD TO PRIVATE CLOUDS 3...SECTION 2: START WITH A STABLE INTEGRATED

More information

1 The intersection of IAM and the cloud

1 The intersection of IAM and the cloud 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud

More information

Geoff Raines Cloud Engineer

Geoff Raines Cloud Engineer Geoff Raines Cloud Engineer Approved for Public Release; Distribution Unlimited. 13-2170 2013 The MITRE Corporation. All rights reserved. Why are P & I important for DoD cloud services? Improves the end-to-end

More information

The Cloud Management Scenario

The Cloud Management Scenario The Cloud Management Scenario Donna Scott Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior

More information

Web Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm

Web Application Hosting Cloud Solution Architecture. http://www.cloud-council.org/web-app-hosting-wp/index.htm Web Application Hosting Cloud Solution Architecture http://www.cloud-council.org/web-app-hosting-wp/index.htm February, 2015 Presenters Heather Kreger CTO International Standards, IBM US kreger@us.ibm.com

More information

Transformation Initiatives: Status Update

Transformation Initiatives: Status Update Transformation Initiatives: Status Update Presentation to the Information Technology Infrastructure Roundtable June 11, 2014 Grant Westcott, Chief Operating Officer and Vice-Chair, Information Technology

More information

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

NIST Cloud Computing Reference Architecture & Taxonomy Working Group

NIST Cloud Computing Reference Architecture & Taxonomy Working Group NIST Cloud Computing Reference Architecture & Taxonomy Working Group Robert Bohn Information Technology Laboratory June 21, 2011 2 Outline Cloud Background Objective Working Group background NIST Cloud

More information

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services organization providing innovative management and technology-based

More information

Presentation to the SITAC Meeting. July 21,2014 Brynhild Haugland Room State Capitol Building

Presentation to the SITAC Meeting. July 21,2014 Brynhild Haugland Room State Capitol Building Presentation to the SITAC Meeting July 21,2014 Brynhild Haugland Room State Capitol Building Agenda Time Topic Presenter 1:00 Welcome / Opening Comments Mike Ressler 1:05 EA Waivers and Standards Jeff

More information

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management

More information

Converged Infrastructure to Private Cloud

Converged Infrastructure to Private Cloud Converged Infrastructure to Private Cloud Geert Kuijken Chief Technologist Converged Infrastructure & Cloud What s coming your way: it will be a hybrid world Build Consume Traditional IT Here today! Private

More information

HP Cloud OS. Платформа OpenStack корпоративного уровня. Иван Кровяков Архитектор облачных решений HP Центральная и Восточная Европа

HP Cloud OS. Платформа OpenStack корпоративного уровня. Иван Кровяков Архитектор облачных решений HP Центральная и Восточная Европа HP Cloud OS Платформа OpenStack корпоративного уровня Иван Кровяков Архитектор облачных решений HP Центральная и Восточная Европа What is OpenStack Software Massively scalable cloud operating system that

More information

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse.

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse. SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager pchadwick@suse.com Product Marketing Manager djarvis@suse.com SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM) Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May

More information

Identity & Access Management

Identity & Access Management TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...

More information

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private & Hybrid Cloud: Risk, Security and Audit Scott Lowry, Hassan Javed VMware, Inc. March 2012 Private and Hybrid Cloud - Risk, Security and Audit Objectives: Explain the technology and benefits behind

More information

NIST Cloud Computing Reference Architecture

NIST Cloud Computing Reference Architecture NIST Cloud Computing Reference Architecture Version 1 March 30, 2011 2 Acknowledgements This reference architecture was developed and prepared by Dr. Fang Liu, Jin Tong, Dr. Jian Mao, Knowcean Consulting

More information

Cloud Services Business Potenziale und Risiken

Cloud Services Business Potenziale und Risiken Cloud Services Business Potenziale und Risiken Prof. Mag. Werner Dorfmeister Enterprise Cloud Computing Services, HP Enterprise Business Electronic-Business Experts, WKO November 2010 1 Mobility + Internet

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

Software Defined Hybrid IT. Execute your 2020 plan

Software Defined Hybrid IT. Execute your 2020 plan Software Defined Hybrid IT Execute your 2020 plan Disruptive Change Changing IT Service Delivery Cloud Computing Social Computing Big Data Mobility Cyber Security 2015 Unisys Corporation. All rights reserved.

More information

BYOD(evice) without BYOI(nsecurity)

BYOD(evice) without BYOI(nsecurity) BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device

More information

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific Realizing the Benefits of Hybrid Cloud Anand MS Cloud Solutions Architect Microsoft Asia Pacific Agenda Key drivers for Hybrid Cloud Unified Cloud Strategy Example Use Cases How to get there Hybrid Cloud:

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Virtualization and IaaS management

Virtualization and IaaS management CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect calvin@redhat.com VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

empower your digital transformation with Private Cloud Solutions Khaled M Khondker

empower your digital transformation with Private Cloud Solutions Khaled M Khondker empower your digital transformation with Private Cloud Solutions Khaled M Khondker 1 as an IT leader, you have the opportunity to play a significant role in the digital transformation of your company business

More information

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist

Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Learn How to Leverage System z in Your Cloud

Learn How to Leverage System z in Your Cloud Learn How to Leverage System z in Your Cloud Mike Baskey IBM Thursday, February 7 th, 2013 Session 12790 Cloud implementations that include System z maximize Enterprise flexibility and increase cost savings

More information

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile

Customer Cloud Architecture for Mobile. http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile Customer Cloud Architecture for Mobile http://cloud-council.org/resource-hub.htm#customer-cloud-architecture-for-mobile June, 2015 1 Presenters Heather Kreger CTO International Standards, IBM US SC38 mirror

More information

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation

Cloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways

More information

Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th

Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD. Cloud Forward 2015 October 7 th Managing Sprawl of Cloud Services & Data Everywhere in an Enterprise Mazin Yousif, PhD Cloud Forward 2015 October 7 th WE CAN DIGITIZE ALMOST EVERYTHING. WE CAN CONNECT/ANALYZE EVERYTHING DIGITIZED 2 The

More information

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document

Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document Microsoft Services - GCloud 7 Catalogue Cloud Based Device Management Using Enterprise Mobility Suite Production Pilot Service Definition Document 1 Overview of the Service 1.1 Service Objectives The 2

More information

FINANCIAL SERVICES DEPLOYMENTS. Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio

FINANCIAL SERVICES DEPLOYMENTS. Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio FINANCIAL SERVICES DEPLOYMENTS Sari Lafferty, DCIA Yung Chou, Microsoft Pete Manca, Egenera Kevin Nyberg, NaviSite Nicole Nakashian, Agio http://aka.ms/yungchou http://aka.ms/yc @yungchou The 5-3-2 Principle

More information

Barnaby Jeans Sr. Solution Architect Business Critical Applications

Barnaby Jeans Sr. Solution Architect Business Critical Applications Barnaby Jeans Sr. Solution Architect Business Critical Applications Connected, Mobile, Information-Centric World Business Reduction in Complexity via New IT Architectures and Business Models The IT Dilemma

More information

Cloud First Does Not Have to Mean Cloud Exclusively. Digital Government Institute s Cloud Computing & Data Center Conference, September 2014

Cloud First Does Not Have to Mean Cloud Exclusively. Digital Government Institute s Cloud Computing & Data Center Conference, September 2014 Cloud First Does Not Have to Mean Cloud Exclusively Digital Government Institute s Cloud Computing & Data Center Conference, September 2014 Am I part of a cloud first organization? Am I part of a cloud

More information

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014 Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,

More information

EA@GC. Enterprise Architecture at the Government of Canada

EA@GC. Enterprise Architecture at the Government of Canada EA@GC Enterprise Architecture at the Government of Canada Gary Doucet Chief Architect, Government of Canada Treasury Board Secretariat Vice President, Association of Enterprise Architects April 2008 Lets

More information

How To Use Cloud Computing For Federal Agencies

How To Use Cloud Computing For Federal Agencies Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector

More information

GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on

GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on Presenter(s): John Ruegg, DOJ Global Security Working Group Mark Phipps, CJIS/FBI Law Enforcement Online Kevin Heald, PM-ISE

More information

Data Centre Networks Overview

Data Centre Networks Overview TELECOMMUNICATIONS TRANSFORMATION PROGRAM Data Centre Networks (DCN) Industry Day Data Centre Networks Overview Michel Fortin Director General, Telecommunications Transformation Program Transformation,

More information

White Paper. Before we begin a few definitions. Executive Overview Converged Infrastructure Enables Advanced IT

White Paper. Before we begin a few definitions. Executive Overview Converged Infrastructure Enables Advanced IT A Practical Guide to Converged Instrastructure Solutions Converged Infrastructure Solutions are changing the game for data centers Top five recommendations for selecting converged infrastructures. Executive

More information

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation

Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Empowering IT-as-a-Service with Cloud and OpenStack Technology Innovation Jim Wittry HP Cloud Partner Business Manager Jim.wittry@hp.com http://www8.hp.com/us/en/cloud/helion-overview.html Copyright 2014

More information

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information

More information

Dell Active System, Enabling service-centric IT, the path to the Cloud. Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta

Dell Active System, Enabling service-centric IT, the path to the Cloud. Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta Dell Active System, Enabling service-centric IT, the path to the Cloud Pavlos Kitsanelis Enterprise Solutions Lead Greece, Cyprus, Malta Delivery Deployment Cloud models & approaches Private Operated and

More information

Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS

Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Intel IT Cloud Extending OpenStack* IaaS with Cloud Foundry* PaaS Speaker: Catherine Spence, IT Principal Engineer, Cloud Computing Acknowledgements: Aaron Huber, Jon Price November 2014 Legal Notices

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 1 1) Government Cloud Journey 2) Government Clouds 3) Way Forward 2 1. Government Cloud

More information

UNIFYING THE HYBRID CLOUD

UNIFYING THE HYBRID CLOUD UNIFYING THE HYBRID CLOUD The Emergence of the Hybrid Cloud: A Challenge for Enterprise, an Opportunity for Managed Service Providers The growing adoption of cloud computing, driven by the promise of increased

More information

maximum Control through 2 lines Cloud Service Brokering

maximum Control through 2 lines Cloud Service Brokering Infrastructure Services the way we see it Cover Next-Gen title Cloud: Helvetica Choice thin, and 30-33 maximum Control through 2 lines Cloud Service Brokering Cloud 2.0 is about more than cost savings.

More information

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges

The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges WHITE PAPER The Cloud-Enabled Enterprise Developing a Blueprint and Addressing Key Challenges Cloud computing offers a significant opportunity for improved business outcomes through the delivery of innovative

More information

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe

The New Style of IT. Rob McMahon. Director Cloud Computing HP General Western Europe The New Style of IT Rob McMahon Director Cloud Computing HP General Western Europe Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without

More information

NIST Cloud Computing Program Activities

NIST Cloud Computing Program Activities NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com

Hybrid Cloud Mini Roundtable. April 17, 2013. Expect Excellence. www.divihn.com Hybrid Cloud Mini Roundtable April 17, 2013 Expect Excellence www.divihn.com Today s Agenda What to expect today Introductions Plus, why are you here this evening? What is Hybrid Cloud? Why Hybrid Cloud?

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

Information Systems Security Line of Business (ISS LoB)

Information Systems Security Line of Business (ISS LoB) Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background

More information

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management

HP Converged Cloud Cloud Platform Overview. Shane Pearson Vice President, Portfolio & Product Management HP Converged Cloud Cloud Platform Overview Shane Pearson Vice President, Portfolio & Product Management Cloud is the biggest disruption since the Internet 1970-80s Mainframe 1990s Client/Server 2000s The

More information

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS

Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Cloud Security: Evaluating Risks within IAAS/PAAS/SAAS Char Sample Security Engineer, Carnegie Mellon University CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk

More information

Public Cloud and Managed Communications Services: Right Time, Right Place?

Public Cloud and Managed Communications Services: Right Time, Right Place? : Right Time, Right Place? Market Advisory Report Ashok Kumar Director, Custom Research December, 2013 Current Analysis (www.currentanalysis.com) Washington, D.C. Paris, France Phone: +1 703 404 9200;

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

The NIST Cloud Computing Program

The NIST Cloud Computing Program The NIST Cloud Computing Program Robert Bohn Information Technology Laboratory National Institute of Standards and Technology October 12, 2011 Information Technology Laboratory Cloud 1 Computing Program

More information

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom Cloud Architecture and Management M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom Cloud Computing Architecture Reference Architecture, Terminology and Definitions Akaza Cloud Architecture

More information

HEAnet IaaS Proof of Concept

HEAnet IaaS Proof of Concept HEAnet IaaS Proof of Concept 1. Background 2. Client benefits 3. HEAnet Cloud Profile 4. Project status update & next steps 5. Use Cases 6. Demonstration 7. Q&A Robert Hackett Alexander Ufimtsev The role

More information

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

More information

Build and Manage Private and Hybrid Cloud. Urban Järund, Sr Regional Services Manager Nordics, Red Hat

Build and Manage Private and Hybrid Cloud. Urban Järund, Sr Regional Services Manager Nordics, Red Hat Build and Manage Private and Hybrid Cloud Urban Järund, Sr Regional Services Manager Nordics, Red Hat CLOUD DEPLOYMENT MODELS HYBRID CLOUD Interoperable combination of private and public cloud. PRIVATE

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Information Technology Association of Canada (ITAC)

Information Technology Association of Canada (ITAC) Information Technology Association of Canada (ITAC) Dancing with Departments Shared Services Canada (SSC) Update Peter Bruce, Senior Assistant Deputy Minister Projects and Client Relationships September

More information