Deep Security For Service Providers

Size: px
Start display at page:

Download "Deep Security For Service Providers"

Transcription

1 A Trend Micro Technical White Paper July 2015 Deep Security For Service Providers Deep Security Architecture and Design Paper >> This paper is aimed at service providers that are offering cloud services such as Infrastructure as a Service (IaaS) and are looking for a security solution to provide security controls to their subscribers to help protect their workloads from various threats. This paper will help you design, implement, and integrate the Trend Micro Deep Security Platform into your cloud service offering. It contains a collection of best practices based on knowledge gathered from previous AWS deployments and lessons learned by Trend Micro from running Deep Security Software as a Service (DSaaS) in AWS.

2 Contents Getting Started...3 Introduction...3 Intended Audience...3 About the Paper...3 Help and Support...3 solution component and concepts...4 Deep Security Solution Components...4 Supporting Infrastructure Components...4 proposed architecture and design...5 What is Required for the Proposed Architecture?...5 Architecture Considerations...6 NETWORK AND SECURITY DESIGN...7 VPC Subnets...7 Network Communication Flows...8 From Subscribers (Incoming)...8 From Solution Components (Outgoing)...9 Between Solution Components...9 Security...10 SOLUTION COMPONENTS CONFIGURATIONS...10 Amazon EC2 AMIs and Instance Types for each Solution Component...10 Amazon RDS...11 AWS RDS Engine...11 Provisioned IOPS...11 AWS RDS Instance Class...11 Deep Security Manager...11 Agent Initiated Communication...12 ELB Integration...13 Simple Service Integration...13 Multi-Tenancy...13 License Model...14 Tenant Isolation...14 Tenant Template...15 Branding...15 Elastic Load Balancer...15 ELB-1 (For DSM Console Access)...15 ELB-2 (For DSA Heartbeat Communication)...16 ELB-3 (For DSA update Communication)...16 DEPLOYMENT AND MONITORING...17 Tenant (Subscriber) On-Boarding...17 Tenant (Subscriber) Authentication...17 Agent Deployment...18 Agent Deployment Script from the Script Generator...18 Health Checks...19 Changeback...19 Conclusion...20 Page 2 of 20 Trend Micro Technical White Paper

3 Getting Started introduction The Trend Micro Deep Security Platform provides a comprehensive security solution to help address a number of key requirements for service providers and their subscribers. Enterprises that are moving their workloads to hosted and public clouds as a means to gain flexibility, agility, or cost reductions expect to have a trustworthy and cloud-aware security solution. Trend Micro offers service providers a complete portfolio of security solutions with Deep Security that provides advanced server security for physical, virtual, and cloud servers, all from the same platform. By leveraging Deep Security, service providers can easily build and integrate a security solution into their cloud offerings. INTENDED AUDIENCE This paper is intended for Service Providers integrating Deep Security with their cloud solution offering. It is expected that the reader is comfortable with common computing, networking, and Amazon Web Services (AWS) terminologies and topics since the proposed architecture and design in this paper uses AWS. ABOUT THIS PAPER This paper includes architectural considerations and configuration steps for implementing highly available Trend Micro Deep Security in the AWS cloud. It discusses how to leverage AWS services, such as Amazon Elastic Compute Cloud (Amazon EC2), Elastic Load Balancer, AWS RDS, and Amazon Virtual Private Cloud (Amazon VPC) to build and integrate Deep Security in AWS. This paper is aimed at service providers that are offering cloud services such as Infrastructure as a Service (IaaS) and are looking for a security solution to provide security controls to their subscribers to help protect their workloads from various threats. This paper will help you to design, implement, and integrate Trend Micro Deep Security into your cloud service offering. It contains a collection of best practices that are based on knowledge gathered from previous AWS deployments and lessons learned by Trend Micro while running Deep Security Software as a Service (DSaaS) in AWS. HELP AND SUPPORT This paper is not meant to be a substitute for product documentation. For detailed information regarding installation, configuration, administration, and usage of Deep Security, please refer to the following links to online resources, documentation, and self-help tools: Page 3 of 20 Trend Micro Technical White Paper

4 Solution Components and Concepts To better understand how Deep Security and its solution components can be hosted in AWS and integrate with your service offering, first we have presented an overview of Trend Micro solution components and then list the supporting infrastructure services that are selected to implement the solution in AWS. DEEP SECURITY SOLUTION COMPONENTS Deep Security Manager (DSM) This is the management component of the system and is responsible for sending rules and security settings to the Deep Security Agents. The DSM is controlled using the web-based management console. From this interface, the administrator can define security policies, manage deployed agents, query status of various managed instances, etc. Deep Security Agent (DSA) This component is the enforcement point for all protection functionality on an EC2 instance using an agent. The nature of that protection depends on the rules and security settings that each DSA receives from the Deep Security Manager. Additionally, the DSA sends a regular heartbeat to the DSM, and pushes event logs and various other data points about the instance being protected to the DSM. Deep Security Relay (DSR) Deep Security Relay (DSR) relays Deep Security Updates from the Trend Micro Global Update Server to Deep Security Agents. You can create relay groups and assign members to the appropriate groups to create an update hierarchy if required. Database For Deep Security The database contains all persistent information that DSM needs to operate. This includes configuration details and event log information for each individual protected host, and other records required for DSM operation. In an xsp model when multi-tenancy is enabled, individual tenant s databases (called Tn) are also created to provide isolation. These Tn databases contain the security information, policies, users, and various tenant-specific data points. SUPPORTING INFRASTRUCTURE COMPONENTS Amazon Relational Database Service (RDS) To store Deep Security Data, we propose RDS service instead of running a dedicated database server on an EC2 instance. Trend Micro Deep Security supports MS SQL and Oracle DB. We recommend an AWS RDS with Oracle engine. The RDS choice simplifies the architecture since you don t have to setup individual instances to host DSM DB and make various architectural decisions. Once a database is created, you connect to the endpoint and only have to concern yourself with backup and restore windows and scaling the database. Elastic Load Balancing (ELB) To route communication traffic to Deep Security Solution Components (i.e., DSM and DSR) from the agents running on your subscribers instances, an Internet-facing ELB will be used. With this, you can add and remove DSM and DSR EC2 instances as your needs change without disrupting the overall flow of information among the solution components. Page 4 of 20 Trend Micro Technical White Paper

5 Amazon VPC The Deep Security components will be hosted in an AWS VPC environment with public and private subnets. VPC subnets that need to be accessible from the Internet through the VPC Internet gateway will be in public subnet. Subnets that will not be accessible from outside the VPC will be private. Amazon Simple Service (SES) To send messages for system alerts and reports from Deep Security Manager to your subscriber s inbox, we ll integrate DSM with SES. Amazon CloudWatch This monitors the health of Deep Security components and retrieves various monitoring data for them. These data metrics can be used to help troubleshoot and spot trends, etc. They can also be used to take automated action based on the state of your hosted environment. AWS Route53 This provides a highly available and scalable Domain Name System (DNS) service to provide name resolution for the Deep Security solution components. Proposed Architecture and Design WHAT IS REQUIRED FOR THE PROPOSED ARCHITECTURE For a highly available design, the following minimum 1 numbers of AWS and Trend Micro components/resources are needed: 1 RDS Instance to host Deep Security Application Data with Multi- AZ support enabled 1 EC2 Instance that serves as a NAT instance (1 per DMZ in each AZ) 1 EC2 Instance serving as a Remote Desktop Gateway (RDGW) server (1 per DMZ in each AZ) 3 Elastic Load Balancers (ELB) to route traffic to the Deep Security components 2 EC2 Instances to host the Deep Security Manager Application 2 EC2 Instances to host the Deep Security Relay Application scenario for HA 3 Public DNS names to assign to ELBs to allow component communication 1 If availability zone (AZ) failure is a concern then you will need extra resources based on the # of AZ in your final architecture. Page 5 of 20 Trend Micro Technical White Paper

6 The diagram below provides a high level view of the proposed architecture and design: Figure 1: High level view of the proposed architecture and design ARCHITECTURE CONSIDERATIONS In this proposed architecture we ve placed both DSM nodes in one AZ. This deployment choice is recommended to ensure the highest possible performance between Manager Instances and the Database and for cost reasons. In addition, Deep Security Manager is only used to configure the agents and define policies, etc. Thus, registered hosts remain protected in the event of an availability zone (AZ) outage. If AZ failure is a concern then you can host an additional node for DSM in another availability zone and also place additional relays in other AZs. These additional components can be either active to receive traffic or can be turned off and only turned on in case of AZ failures. We ve divided the reminder of this paper into the following sub-sections to discuss the proposed architecture and design shown above. Network and Security Design: in this section we ll discuss various best practices to set up your networking and security mechanisms available in AWS, e.g., Security Groups to enable authorized access and communication between tiers, instances, and traffic from your subscribers. Page 6 of 20 Trend Micro Technical White Paper

7 Solution Components Configurations: this section covers the details involved in the set up of the various solution components for each tier and their roles in the implementation. Deployment and Monitoring: this section provides details on deployment, monitoring, and management of the Deep Security Solution components. Network and Security Design VPC SUBNETS Networking is one of the most critical components of any implementation. When building and integrating Deep Security into your service offering there are various design decisions involved that will dictate your overall network design. We propose a multi-tiered (web, application, and database) network design by leveraging the AWS EC2-VPC platform, which allows you to reserve an isolated portion of the AWS cloud in which to deploy and manage your solution servers. The diagram below provides a high view of the proposed VPC layout with public and private subnets: Figure 2: Proposed VPC layout Page 7 of 20 Trend Micro Technical White Paper

8 NETWORK COMMUNICATION FLOWS From Subscribers (Incoming) The following network communication flows needs to be present to allow traffic from your subscribers: DSM Console: This is required to provide your subscribers (tenants) access to the DSM console via the ELB. DSA Heartbeat: This is required to provide your subscribers (tenants ) Agents access to the DSM for heartbeat via the ELB. DSA Security updates and plug-ins: This is required to provide your subscribers (tenants ) Agents access to the DSR to get security updates and fetch plug-ins via the ELB. We recommend having all incoming communication over TCP port 443 via ELB to avoid any subscriber s side firewall and security groups issues, since communication to Internet over TCP port 443 is usually allowed. The high level view for this recommended incoming communication channels is presented below: Figure 3: Incoming network communication flow Note: All ELBs will have externally resolvable DNS names, details are discussed later in this paper. The Relays can also be co-located on the DSM nodes to keep the cost down, when desired. Page 8 of 20 Trend Micro Technical White Paper

9 From Solution Components (Outgoing) The following network communication flows need to be present to allow traffic from the solution components: DSM: This is required to provide DSM access to the license update server and to download software packages from the Trend Micro Download center via the NAT server. DSR: This is required to provide DSR access to Trend Micro Active Update to get new pattern and engine files and security updates. DSA: This is required to provide DSA access to Trend Micro Web Reputation and File Reputation Services. The DSA is installed on DSM nodes for self-protection. All external network communication is done over TCP Ports 80 and 443. The high level view for this outgoing network communication channels are presented below: Figure 4: Outgoing network communication flow Between Solution Components The following network communication flows need to be present to allow traffic between the solution components: DSM to RDS: This is required to provide DSM access to AWS RDS for its data and configuration storage. DSM to DSR: This is required to provide DSM the Deep Security Rule updates to ensure the communication direction for DSR instances is set to Bi-Directional. DSR to DSM: This is required to provide DSR access to the Deep Security Manager to download plug-ins and software. Page 9 of 20 Trend Micro Technical White Paper

10 security To enable network traffic security for the incoming and outing traffic of your VPC and its specific subnets, there are two design choices available: Security Groups (SG) and Network ACL (NACL). We propose leveraging the security group approach and creating these security groups to control network communication as follows: Security Group Name Elastic Load Balancing Security Group Web Tier Security Group Application Tier Security Group Database Tier Security Group NAT Security Group Remote Desktop Security Group Purpose The ELB should be placed in this SG and accept connections from DSA on TCP port 443. The DSR should be placed in this SG and accept connections from the ELB SG on TCP port The DSM nodes should be placed in this SG and accept connections from ELB SG on TCP ports 4119, The DSM DB (AWS RDS) should be placed in this SG and accept connections from APP SG or DSM Nodes on TCP Port The NAT instances should be placed in this SG and accept connections from the solution components, i.e., DSM, DSA, and DSR for external access to the Internet for TCP ports 80 and 443. The RDGW should be placed in this SG to accept RDP connections from your on-premises operations team workstation on TCP Port 3389 or 22. Table 1: AWS security groups Solution Components Configurations AMAZON EC2 AMIS AND INSTANCE TYPES FOR EACH SOLUTION COMPONENT Each Trend Micro solution component has distinct requirements for software and infrastructure resources, such as CPU, RAM, and disk storage. Deep Security Solution Components can run on a variety of Amazon EC2 instance types, e.g., Windows and Linux. Below are the recommended specs for a typical xsp implementation. Solution Component Server Recommended Hardware Specs Available EC2 Instance Types AMI s Available Deep Security Manager Processor (vcpu) RAM HDD 64 bits (2-8 vcpu) 16 GB 80 GB m3.large, m3.xlarge, c3.xlarge, c3.2xlarge Windows: Microsoft Windows 2012 (64-bit), Windows Server 2008, 2008 R2 (64-bit), Windows 2003 R2 (64-bit) Linux: Red Hat 5, 6 (64-bit) Deep Security Relay Processor RAM HDD 64 bits (2-4 vcpu) 4 8 GB 40 GB m3.medium, m3.large Windows: Windows Server 2008, 2008 R2 Windows Server 2003 R2 (64-bit) Linux: Red Hat 5, 6, 7 (64-bit), CentOS, 5, 6, 7 (64-bit), Ubuntu 10.04, 12.04, (64-bit), SUSE 10 SP3, SP4 (64-bit), SUSE 11 SP1, SP2, SP3 (64-bit) and Amazon AMI Linux EC2 (64-bit) Table 2: Solution components AMI hardware specifications Page 10 of 20 Trend Micro Technical White Paper

11 AMAZON RDS We propose AWS RDS service instead of running a dedicated database server on an EC2 instance. This choice simplifies the architecture since you don t have to set up individual instances to host DSM DB and make various architectural decisions. Once a database is created, you connect to the endpoint and only have to concern yourself with backup and restore windows and scaling the database. The rest of the server maintenance, database system upgrades, operational monitoring is all handled as part of the AWS service. AWS RDS Engine Trend Micro Deep Security supports MS SQL and Oracle DB. We recommend AWS RDS with the Oracle engine for service providers-based deployment because: For the Deep Security Multi-Tenancy feature, running an MS SQL-based RDS will result in the creation of a separate DB each time you create a new tenant. This means that each tenant would trigger the minimum storage and hourly computational costs for RDS. When using Oracle as a database engine, DS uses multiple schemas within the same database to implement multi-tenancy. Scaling storage after launching a DB instance is currently not supported for SQL Server. The minimal storage requirements for MSSQL RDS instances are significantly higher than Oracle. When the MT feature is used in Deep Security, Multi-AZ support is also required on the DB level. Note: Visit for the limitations around AWS RDS, e.g., the total storage limit for all DB instance is 100 TB. Provisioned IOPS Trend Micro Deep Security requires fast and consistent I/O performance, hence we recommend Provisioned IOPS (input/output operations per second) storage. Start with 1000 IOPS and increase it when needed. The ratio of the requested IOPS rate to the amount of storage allocated is important. The ratio of IOPS to storage, in GB, for your DB instances should be between 3:1 and 10:1. For example, you could start by provisioning an Oracle DB instance with 1000 IOPS and 200 GB storage (a ratio of 5:1). You could then scale up to 2000 IOPS with 200 GB of storage (a ratio of 10:1), 3000 IOPS with 300 GB of storage, and up to the maximum for an Oracle DB instance of 30,000 IOPS with 3 TB (3000 GB) of storage. AWS RDS Instance Class We recommend memory allocation for the AWS RDS instance to be a minimum of 10% of your DB size plus some available memory for overhead. This will ensure the DB indexes are kept in memory for better performance. DEEP SECURITY MANAGER The Deep Security Manager will be a member of the Application Tier Security Group created for servers running in the Application Tier. Both DSM nodes (DSM1 and DSM2) should be running in the same AZ where DSM DB (AWS RDS - Primary) is running. It is recommended to host DSM nodes in the same AZ where the DSM DB is running to avoid network latency issues. The DSM node accessing the DB in a separate AZ has shown hit in performance so it s very critical to put DSM nodes in the same AZ as DSM DB. If Multi-AZ support is required then consider hosting three DSM nodes, two in the same AZ where DSM DB is running and one in the other AZ but shut down. This third node will not receive any traffic from ELB. You can start this node in case of a primary AZ disaster. Page 11 of 20 Trend Micro Technical White Paper

12 Agent Initiated Communication To Allow Deep Security Manager to Deep Security Agent communication, Deep security provides three communication direction choices as follows: Bi-Directional: By default, communications are bi-directional. This means that the Agent normally initiates the heartbeat but still listens on the Agent port for Deep Security Manager (DSM) connections. This allows the Manager to apply changes to the security configuration to the Agent as they occur. Manager Initiated: With this option, The Deep Security Manager always initiates the communication with Agent. This includes security configuration updates, heartbeat operations, and requests for Event logs. Agent Initiated: With this option selected, Agent initiates the communication with the Manager. In this mode, communications between the Manager and the Agent only occur on every heartbeat. If an Agent security configuration has changed, it will not be updated until the next heartbeat. We recommend using Agent Initiated communication since this configuration is easy to implement for your subscribers instances in EC2 or inside a VPC. For EC2 instances, your subscribers don t need to do anything. Since all outbound communications in EC2 are permitted, agents will work by default. Within a VPC, your subscribers must enable an outbound route through an Internet gateway. They must also add a rule to allow outbound communications for TCP over port 443. Most configurations will benefit from a rule that allows TCP over port 443 to address block /0 (everywhere). But if you prefer to lock down this rule further for your subscribers, then depending on where you have implemented this solution and where your subscribers are, they can restrict outbound communication to 443 to your service AWS security group, i.e., < owner ID>/<SG>. The agent initiated communication direction should be configured at the Base Policy Level under Settings > Computer > Communication Direction as shown: Figure 5: Agent initiated communication direction Page 12 of 20 Trend Micro Technical White Paper

13 ELB Integration The Deep Security Manager should be configured for ELB integration to allow the incoming communication flows that we discussed earlier in this paper. The settings that you must configure for this integration are listed under Administration > System Settings > Advanced as shown: Figure 6: DSM integration with ELB The Manager, Heartbeat, and Relay hostname fields should be pointing to the externally resolvable DNS name of these ELBs. If CNAME records for ELB are created for ELB s DNS addresses, then these fields should contain the CNAME records. Simple Service Integration The Deep Security Manager should be configured for SES integration to receive various alerts, notifications, and reporting features. The settings that you must configure for this integration are listed under Administration > System Settings > SMTP as shown: Figure 7: AWS SES integration with DSM Multi-Tenancy Multi-Tenancy lets you create multiple distinct management environments using a single Deep Security Manager and database server installation. It fully isolates the settings, policies, and events for each tenant and makes use of a number of additional infrastructure scaling options. Multi-Tenancy helps you, as a providers, provision Deep Security to subscribers within a service model. Multi-Tenancy is enabled under Administration > System Settings > Advanced. Page 13 of 20 Trend Micro Technical White Paper

14 LICENSING MODEL There are two license modes that you can implement: Inherit Licensing from Primary Tenant: Gives all tenants the same license that you as a provider (Primary Tenant) have and all the licensed security modules that you (the Primary Tenant) are licensed for will be visible to all tenants. Contact your sales representative on XSP pricing for further details. Per-Tenant Licensing: As the name implies, it is a per-tenant license and only the licensed security modules for each tenant will be visible to tenants. We recommend using Inherit Licensing mode and then controlling the security module visibility at the tenant level. Doing so will avoid the step required to acquire a license key from Trend Micro. Tenant Isolation Multiple tenants (subscribers) exist within the same Deep Security Manager installation but their data is highly isolated. The majority of each Tenant s data is stored in a separate database. This database may co-exist on the same database server (AWS RDS) as other tenants, or it can be isolated onto its own database server (AWS RDS). In all cases, some data only exists in the primary database (the one Deep Security Manager was installed with). When multiple database servers are available, tenants are created on the database with the least amount of load. In the first option, a single RDS DB is used to host both the main database and all of your tenants databases. This option is suitable where the number of tenants is not high (less than 100). In the second option, 3 RDS instances are used. 1 RDS is reserved for the main database and the other 2 are used to host tenants databases. You can start with 2 RDS instances (1 for the main database t0) and the other for all tenants (t1, t2, t3 tn) and can add further RDS instances to the pool when needed. The high level view for these design choices are shown below: Figure 8: Multi-tenancy architecture in Deep Security Page 14 of 20 Trend Micro Technical White Paper

15 Tenant Template The Tenant Template feature of Deep Security provides a convenient way of creating a customized out-of-the-box experience for your subscribers. While Deep Security provides advanced server security for physical, virtual, and cloud servers, all from the same platform, some of the available features are not applicable to your implementation, e.g., AWS-based deployments. For this reason, it is recommended as a service provider you create a tenant based on your implementation and fine tune out-of-the-box policies and settings. We recommend setting the agent communication direction to Agent Initiated in the template for all subscribers as discussed earlier. All of your future Tenants will have the example policies and rule update versions included in the snapshot (tenant template). As always the examples are meant to be a starting point. Tenants are encouraged to create policies based on their unique needs. The Tenant Template is created under Administration > System Settings > Tenants as shown: Figure 9: Tenant template Branding You can customize and add your own logo to the Deep Security Manager Console for branding purposes and replace the Deep Security logo at the top-right of the Deep Security Manager interface. (The logo also appears on the sign-in page and at the top of Reports.) The graphic has to be a PNG image 320 pixels wide x 35 pixels high, and smaller than 1 MB. (A template is available in the installfiles directory of the Deep Security Manager.) ELASTIC LOAD BALANCER The ELBs are used to route DSA and DSM console traffic to Deep Security Manager as discussed under the communication flows section. A total of three ELBs are needed to cover all types of communication flows. All of these ELB instances will be a member of the ELB Security Group and have an externally resolvable DNS name. ELB-1 (For DSM Console Access) The subscribers will access the DSM console using a browser over HTTPS, hence a trusted certificate needs to be imported into the ELB configuration to avoid certificate warnings each time your subscribers access the DSM console. The listener should be created as HTTP/HTTPS for this traffic flow and session stickiness should be enabled with 30 minutes or higher expiry time period as needed. For the instance health check you can use the DSM GUI access port, The DNS name for this ELB could be anything that is relevant to your implementation but consider appending app in your subdomain part for easier reference purposes, e.g., app.provider.com. The DSM node 1 and DSM node 2 instances should be registered in this ELB. Page 15 of 20 Trend Micro Technical White Paper

16 ELB-2 (For DSA Heartbeat Communication) The DSA to DSM agent communication is SSL-based and requires mutual authentication, hence it is required to pass through the DSA > DSM communication from the ELB instead of breaking the SSL connection. The listener should be created as TCP for this traffic flow. The DNS name for this ELB could be anything that is relevant to your implementation but consider appending agents in your subdomain part for easier reference purposes, e.g., agents.provider.com. The DSM node 1 and DSM node 2 instances should be registered in this ELB. Figure 10: SSL passthrough (non-terminating) listener for Heartbeat traffic ELB-3 (For DSA Update Communication) The DSA to DSR communication is SSL-based but it doesn t require mutual authentication, hence it is not required to pass through the DSA > DSR communication from the ELB. Instead breaking the SSL connection at ELB is fine. The listener should be created as HTTP/HTTPS for this traffic flow and session stickiness should be enabled with 30 minutes or higher expiry time period as needed. A trusted certificate is not required for the ELB configuration. A self-signed certificate for this ELB configuration is fine. For the instance health check you can use DSR port 4122 for the ping test as shown. Figure 11: DSR health check from ELB The DNS name for this ELB could be anything that is relevant to your implementation but consider appending relays in your subdomain part for easier reference purposes, e.g., relays.provider.com. Page 16 of 20 Trend Micro Technical White Paper

17 Deployment and Monitoring TENANT (SUBSCRIBER) ON-BOARDING The tenant on-boarding can be done either: By leveraging the REST API and integrating it with your service portal By leveraging the out-of-box Tenant Creation Wizard in Deep Security Manager During the tenant on-board process, the tenant DB is created and populated with pre-configured security policies and settings from the tenant template you created earlier on. The tenant admin can then login to their isolated deep security environment and protect their workloads. TENANT (SUBSCRIBER) AUTHENTICATION Tenant management capabilities are also available via the REST API so as service providers you can integrate Deep Security into your existing portals. Regardless of how you decide to present the Deep Security Manager Interface to your subscribers (either through your portal via REST API s integration or direct access), the tenant authentication is performed against the tenant database. The login page includes Tenant Name that provides the context information to Deep Security when authenticating tenants. The following diagram provides the high level view of tenant authentication: Figure 12: Tenant authentication Page 17 of 20 Trend Micro Technical White Paper

18 AGENT DEPLOYMENT There are multiple ways the agent can be installed and deployed into your subscribers instances. Subscribers can also integrate the deep security agent into their provisioning process of instances: It can be a direct installation using the installer packages for the supported operation systems It could be any software delivery method the subscriber is using, from SMS to in-house scripting, to cloud management tools like Rightscale, Chef, Puppet, or Amazon Cloud Formation. Deep Security also provides shell-/power shell-based scripts that can be generated from the Deep Security Web Console. It can also be embedded into your AMI. When embedding an agent into the AMI, ensure the agent is not activated. Agent Deployment Script from the Script Generator The shell/powershell script-based method to install and deploy a Deep Security agent is an easier way to automatically generate a deployment script from a Trend Micro Deep Security Agent which can include tasks such as: Download Deep Security Agent from the Deep Security Manager server or from an S3 bucket Do a silent installation of Deep Security Agent Call Deep Security Manager and then request activation against the specific subscriber (tenant) installation Request a specific security policy assignment (e.g., security policy for a web server or security policy for database servers, etc.). The deployment script can be generated from Administration > Local > Generate Deployment Script. Figure 13: Agent deployment script Page 18 of 20 Trend Micro Technical White Paper

19 This deployment script can then be used in instance provisioning e.g., in user-data field as shown: Figure 14: Agent deployment via user-data HEALTH CHECKS The Deep Security Manager gathers monitoring information every minute and provides a dashboard widget to show system memory, CPU, and raise warnings if these resources reach their configured limit values. Figure 15: DSM widget to monitor system resources In addition, Amazon provides CloudWatch under AWS. Amazon CloudWatch basic monitoring collects and reports metrics for CPU utilization, data transfer, and disk usage activity from each Amazon EC2 instance at a five-minute frequency. You can also consider using Detailed Monitoring to collect metrics at 1-minute intervals. You can then use these metrics and take actions to automate the majority of the solution through AWS API in case of failures. CHARGEBACK The Deep Security Manager stores information about tenant usage that can be used by the services providers to charge their subscribers. The information is available in: Widget Form: Shows various metrics about tenant usage, e.g., protection hours, DB use, etc. Report: This report details protection hours, the current database sizes, and the number of computers (activated and non-activated) for each tenant. REST API: The API s stored data can also be pulled directly from the DSM DB to produce reports for chargeback. Page 19 of 20 Trend Micro Technical White Paper

20 Conclusion We used AWS as a computing environment to design, implement, and integrate Trend Micro Deep Security into your cloud service offerings. The similar design approach can be used to implement and integrate this solution in Microsoft Azure or even in your on-premises data center. By incorporating Trend Micro Deep Security into your solution offerings you get: Increased service adoption rates and market share by acquiring security-conscience buyers Differentiation from rival providers not offering brand-specific or other security complements Collection of effective cloud security technologies proven to work within the unique cloud environment Additional revenue through application, server, and data protection services Combined brand recognition and publicity through partnership and co-marketing activities Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our Web site at by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [WP01_DS_xSP_MT_DesignGuide_150714US] Page 20 of 20 Trend Micro Technical White Paper

Alfresco Enterprise on AWS: Reference Architecture

Alfresco Enterprise on AWS: Reference Architecture Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)

More information

How To Choose Between A Relational Database Service From Aws.Com

How To Choose Between A Relational Database Service From Aws.Com The following text is partly taken from the Oracle book Middleware and Cloud Computing It is available from Amazon: http://www.amazon.com/dp/0980798000 Cloud Databases and Oracle When designing your cloud

More information

How AWS Pricing Works

How AWS Pricing Works How AWS Pricing Works (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction... 3 Fundamental

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

Deploy Remote Desktop Gateway on the AWS Cloud

Deploy Remote Desktop Gateway on the AWS Cloud Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4

More information

Microsoft Windows Server Failover Clustering (WSFC) and SQL Server AlwaysOn Availability Groups on the AWS Cloud: Quick Start Reference Deployment

Microsoft Windows Server Failover Clustering (WSFC) and SQL Server AlwaysOn Availability Groups on the AWS Cloud: Quick Start Reference Deployment Microsoft Windows Server Failover Clustering (WSFC) and SQL Server AlwaysOn Availability Groups on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer July 2014 Last updated: September 2015 (revisions)

More information

TECHNOLOGY WHITE PAPER Jun 2012

TECHNOLOGY WHITE PAPER Jun 2012 TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache

More information

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud David Pae, Ulf Schoo June 2013 (Please consult http://aws.amazon.com/windows/

More information

19.10.11. Amazon Elastic Beanstalk

19.10.11. Amazon Elastic Beanstalk 19.10.11 Amazon Elastic Beanstalk A Short History of AWS Amazon started as an ECommerce startup Original architecture was restructured to be more scalable and easier to maintain Competitive pressure for

More information

Overview and Deployment Guide. Sophos UTM on AWS

Overview and Deployment Guide. Sophos UTM on AWS Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2

More information

TECHNOLOGY WHITE PAPER Jan 2016

TECHNOLOGY WHITE PAPER Jan 2016 TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview

More information

How AWS Pricing Works May 2015

How AWS Pricing Works May 2015 How AWS Pricing Works May 2015 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 15 Table of Contents Table of Contents... 2 Abstract... 3 Introduction...

More information

RemoteApp Publishing on AWS

RemoteApp Publishing on AWS RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...

More information

ArcGIS 10.3 Server on Amazon Web Services

ArcGIS 10.3 Server on Amazon Web Services ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick

More information

Using ArcGIS for Server in the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

Every Silver Lining Has a Vault in the Cloud

Every Silver Lining Has a Vault in the Cloud Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance

More information

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Application Security Best Practices. Matt Tavis Principal Solutions Architect Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...

More information

Using SUSE Studio to Build and Deploy Applications on Amazon EC2. Guide. Solution Guide Cloud Computing. www.suse.com

Using SUSE Studio to Build and Deploy Applications on Amazon EC2. Guide. Solution Guide Cloud Computing. www.suse.com Using SUSE Studio to Build and Deploy Applications on Amazon EC2 Guide Solution Guide Cloud Computing Cloud Computing Solution Guide Using SUSE Studio to Build and Deploy Applications on Amazon EC2 Quickly

More information

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer

Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer March 2014 Last updated: September 2015 (revisions) Table of Contents Abstract... 3 What We ll Cover...

More information

Amazon Relational Database Service (RDS)

Amazon Relational Database Service (RDS) Amazon Relational Database Service (RDS) G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Scalable Architecture on Amazon AWS Cloud

Scalable Architecture on Amazon AWS Cloud Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies kalpak@clogeny.com 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect

More information

Best Practices for Siebel on AWS

Best Practices for Siebel on AWS Best Practices for Siebel on AWS Contributors The following individuals and organizations contributed to this document Ashok Sundaram, Solutions Architect, Amazon Web Services Milind Waikul, CEO, Enterprise

More information

Microsoft SharePoint Server 2013 on the AWS Cloud: Quick Start Reference Deployment

Microsoft SharePoint Server 2013 on the AWS Cloud: Quick Start Reference Deployment Microsoft SharePoint Server 2013 on the AWS Cloud: Quick Start Reference Deployment Mike Pfeiffer August 2014 Last updated: April 2015 (revisions) Table of Contents Abstract... 3 What We ll Cover... 4

More information

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC Prepared by: Peter Bats Commissioning Editor: Linda Belliveau Version: 5.0 Last Updated:

More information

Reference Testing Guide for Deep Security

Reference Testing Guide for Deep Security A Trend Micro Technical White Paper June 2015 Reference Testing Guide for Deep Security >> This reference testing guide contains information and instructions to help validate a Trend Micro Deep Security

More information

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1.

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1. CONTENTS 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix EXECUTIVE SUMMARY Tenzing Managed IT services has recently partnered with Amazon Web Services

More information

Deploying Splunk on Amazon Web Services

Deploying Splunk on Amazon Web Services Copyright 2014 Splunk Inc. Deploying Splunk on Amazon Web Services Simeon Yep Senior Manager, Business Development Technical Services Roy Arsan Senior SoHware Engineer Disclaimer During the course of this

More information

Estimating the Cost of a GIS in the Amazon Cloud. An Esri White Paper August 2012

Estimating the Cost of a GIS in the Amazon Cloud. An Esri White Paper August 2012 Estimating the Cost of a GIS in the Amazon Cloud An Esri White Paper August 2012 Copyright 2012 Esri All rights reserved. Printed in the United States of America. The information contained in this document

More information

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015 Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

Using ArcGIS for Server in the Amazon Cloud

Using ArcGIS for Server in the Amazon Cloud Using ArcGIS for Server in the Amazon Cloud Randall Williams, Esri Subrat Bora, Esri Esri UC 2014 Technical Workshop Agenda What is ArcGIS for Server on Amazon Web Services Sounds good! How much does it

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Goliath Performance Monitor Prerequisites v11.6

Goliath Performance Monitor Prerequisites v11.6 v11.6 Are You Ready to Install? Use our pre-installation checklist below to make sure all items are in place before beginning the installation process. For further explanation, please read the official

More information

Stratusphere Solutions

Stratusphere Solutions Stratusphere Solutions Deployment Best Practices Guide Introduction This guide has been authored by experts at Liquidware Labs in order to provide a baseline as well as recommendations for a best practices

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Smartronix Inc. Cloud Assured Services Commercial Price List

Smartronix Inc. Cloud Assured Services Commercial Price List Smartronix Inc. Assured Services Commercial Price List Smartronix, Inc. 12120 Sunset Hills Road Suite #600, Reston, VA 20190 703-435-3322 cloudassured@smartronix.com www.smartronix.com Table of Contents

More information

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat. simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January 2015 www.tricerat.com Legal Notices Simplify Monitoring s Configuration for Citrix

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

XenDesktop 7.5 on Amazon Web Services (AWS) Design Guide

XenDesktop 7.5 on Amazon Web Services (AWS) Design Guide XenDesktop 7.5 on Amazon Web Services (AWS) Design Guide July 14, 2014 Revision History Revision Change Description Updated By Date 0.1 Document Created Peter Bats April 17, 2014 1.0 Final Draft Peter

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Hosting Requirements Smarter Balanced Assessment Consortium Contract 11 Test Delivery System. American Institutes for Research

Hosting Requirements Smarter Balanced Assessment Consortium Contract 11 Test Delivery System. American Institutes for Research Contract 11 Test Delivery System American Institutes for Research Revision History Revision Description Author/Modifier Date Initial Release David Lopez de Quintana October 14, 2013 Updated to latest Amazon

More information

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001 unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information

More information

GreenSQL AWS Deployment

GreenSQL AWS Deployment GreenSQL AWS Deployment Table of Contents 2 Table of Contents... 3 from Amazon's Marketplace... 3 from Amazon's EC2 Console... 3 Amazon Launch Wizard walkthrough... 4 Post-installation procedures... 7

More information

Resource Sizing: Spotfire for AWS

Resource Sizing: Spotfire for AWS Resource Sizing: for AWS With TIBCO for AWS, you can have the best in analytics software available at your fingertips in just a few clicks. On a single Amazon Machine Image (AMI), you get a multi-user

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

Web Application Hosting in the AWS Cloud Best Practices

Web Application Hosting in the AWS Cloud Best Practices Web Application Hosting in the AWS Cloud Best Practices September 2012 Matt Tavis, Philip Fitzsimons Page 1 of 14 Abstract Highly available and scalable web hosting can be a complex and expensive proposition.

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok

More information

Amazon Elastic Compute Cloud Getting Started Guide. My experience

Amazon Elastic Compute Cloud Getting Started Guide. My experience Amazon Elastic Compute Cloud Getting Started Guide My experience Prepare Cell Phone Credit Card Register & Activate Pricing(Singapore) Region Amazon EC2 running Linux(SUSE Linux Windows Windows with SQL

More information

VMware vrealize Automation

VMware vrealize Automation VMware vrealize Automation Reference Architecture Version 6.0 and Higher T E C H N I C A L W H I T E P A P E R Table of Contents Overview... 4 What s New... 4 Initial Deployment Recommendations... 4 General

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

CUSTOMER SAP Afaria Overview

CUSTOMER SAP Afaria Overview SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7

More information

Cloud Models and Platforms

Cloud Models and Platforms Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model

More information

Deploying XenApp 7.5 on Microsoft Azure cloud

Deploying XenApp 7.5 on Microsoft Azure cloud Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities

More information

How To Plan A Desktop Workspace Infrastructure

How To Plan A Desktop Workspace Infrastructure Dell Copyright 2014 Moka5, Inc. All rights reserved. Moka5, MokaFive, LivePC, and the Moka5 logo are trademarks of Moka5, Inc. All other product or company names may be trademarks of their respective owners.

More information

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it

More information

Product Overview and Functional Specification

Product Overview and Functional Specification Product Overview and Functional Specification Virtual Private Clouds Value Added Reseller (VAR) / Managed Service Provider (MSP) 1 P a g e Cloud Introduction and Glossary of Cloud Terms Cloud computing

More information

Amazon Compute - EC2 and Related Services

Amazon Compute - EC2 and Related Services Amazon Compute - EC2 and Related Services G-Cloud Service 1 1.An overview of the G-Cloud Service Arcus Global are approved to sell to the UK Public Sector as official Amazon Web Services resellers. Amazon

More information

Microsoft Exchange Solutions on VMware

Microsoft Exchange Solutions on VMware Design and Sizing Examples: Microsoft Exchange Solutions on VMware Page 1 of 19 Contents 1. Introduction... 3 1.1. Overview... 3 1.2. Benefits of Running Exchange Server 2007 on VMware Infrastructure 3...

More information

How To Install And Use Trend Micro Software On A Computer Or Network With A Network Security Agent (For A Powerpoint) For Free

How To Install And Use Trend Micro Software On A Computer Or Network With A Network Security Agent (For A Powerpoint) For Free Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

ArcGIS for Server: In the Cloud

ArcGIS for Server: In the Cloud DevSummit DC February 11, 2015 Washington, DC ArcGIS for Server: In the Cloud Bonnie Stayer, Esri Session Outline Cloud Overview - Benefits - Types of clouds ArcGIS in AWS - Cloud Builder - Maintenance

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Client Monitoring with Microsoft System Center Operations Manager 2007

Client Monitoring with Microsoft System Center Operations Manager 2007 Client Monitoring with Microsoft System Center Operations Manager 2007 Microsoft Corporation Published: December 18, 2006 Updated: December 18, 2006 Executive Summary Client monitoring is a new feature

More information

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Deployment and Configuration Guide

Deployment and Configuration Guide vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri

ArcGIS for Server in the Amazon Cloud. Michele Lundeen Esri ArcGIS for Server in the Amazon Cloud Michele Lundeen Esri What we will cover ArcGIS for Server in the Amazon Cloud Why How Extras Why do you need ArcGIS Server? Some examples Publish - Dynamic Map Services

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

KonyOne Server Installer - Linux Release Notes

KonyOne Server Installer - Linux Release Notes KonyOne Server Installer - Linux Release Notes Table of Contents 1 Overview... 3 1.1 KonyOne Server installer for Linux... 3 1.2 Silent installation... 4 2 Application servers supported... 4 3 Databases

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Content Distribution Management

Content Distribution Management Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11

More information

SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0

SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0 SharePoint 2013 on Windows Azure Infrastructure David Aiken & Dan Wesley Version 1.0 Overview With the Virtual Machine and Virtual Networking services of Windows Azure, it is now possible to deploy and

More information

DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING. August 27, 2015 HTTPS://WWW.REGTAP.INFO/

DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING. August 27, 2015 HTTPS://WWW.REGTAP.INFO/ DISTRIBUTED DATA COLLECTION FOR REINSURANCE (RI) AND RISK ADJUSTMENT (RA): PROVISIONING August 27, 2015 Session Guidelines This is a 90-minute webinar session. For questions regarding the Distributed Data

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

Amazon EC2 Product Details Page 1 of 5

Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Functionality Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of

More information

Hosting Requirements Smarter Balanced Assessment Consortium Contract 11 Test Delivery System. American Institutes for Research

Hosting Requirements Smarter Balanced Assessment Consortium Contract 11 Test Delivery System. American Institutes for Research Contract 11 Test Delivery System American Institutes for Research Revision History Revision Description Author/Modifier Date Initial Release David Lopez de Quintana October 14, 2013 Contents 4 Overview...

More information