Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity



Similar documents
SaaS & Cloud Application Development & Delivery

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Autodesk PLM 360 Security Whitepaper

Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )

Vendor Questionnaire

Category: Business Process and Integration Solution for Small Business and the Enterprise

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

SAAS. Best practices for SAAS implementation using an Open Source Portal (JBoss)

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

redcoal SMS for MS Outlook and Lotus Notes

How To Secure Your Data Center From Hackers

Security Features: Lettings & Property Management Software

Securing Virtual Applications and Servers

Protecting Your Organisation from Targeted Cyber Intrusion

MEGA Web Application Architecture Overview MEGA 2009 SP4

CloudPassage Halo Technical Overview

Security from a customer s perspective. Halogen s approach to security

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

SECURITY DOCUMENT. BetterTranslationTechnology

VMware vcloud Networking and Security

Is Liferay Right for Your Organization? Seven Things to Consider When Choosing a Portal Platform

Building a SaaS Application. ReddyRaja Annareddy CTO and Founder

VMware vcloud Networking and Security Overview

Configuration Information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

FileCloud Security FAQ

Pervasive Software + NetSuite = Seamless Cloud Business Processes

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Retention & Destruction

Security Controls for the Autodesk 360 Managed Services

IBM EXAM QUESTIONS & ANSWERS

Security Overview Enterprise-Class Secure Mobile File Sharing

TOP SECRETS OF CLOUD SECURITY

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

PI Cloud Connect. Frequently Asked Questions

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

GoodData Corporation Security White Paper

SOA REFERENCE ARCHITECTURE: WEB TIER

CHAPTER 2 THEORETICAL FOUNDATION

W H IT E P A P E R. Salesforce CRM Security Audit Guide

Lotus Domino Security

SharePoint 2013 Logical Architecture

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

74% 96 Action Items. Compliance

IBX Business Network Platform Information Security Controls Document Classification [Public]

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

HP Business Service Management

Locking down a Hitachi ID Suite server

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

March

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How To Protect Your Cloud Computing Resources From Attack

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

AT&T Synaptic Hosting SM Service Security Overview

Ensuring the security of your mobile business intelligence

Configuration Information

VMware vcloud Director for Service Providers

Software-Defined Networks Powered by VellOS

Securing the Service Desk in the Cloud

Mobile Application Development Platform Comparison

IT Architecture Review. ISACA Conference Fall 2003

IT Security. Securing Your Business Investments

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

PCI DSS Reporting WHITEPAPER

Cyber Security for NERC CIP Version 5 Compliance

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

CloudPassage Halo Technical Overview

Introduction to Endpoint Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Security Issues in Cloud Computing

Sentinet for BizTalk Server SENTINET 3.1

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

Effective End-to-End Cloud Security

SANS Institute First Five Quick Wins

Product Comparison List

Compiere Technical Architecture Modern, configurable, extendible

No.1 IT Online training institute from Hyderabad URL: sriramtechnologies.com

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Network Security Guidelines. e-governance

Live Guide System Architecture and Security TECHNICAL ARTICLE

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Cisco Unified Expert Advisor

The increasing popularity of mobile devices is rapidly changing how and where we

Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.

Sentinet for BizTalk Server SENTINET

Last Updated: July STATISTICA Enterprise Server Security

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Data Center Virtualization and Cloud QA Expertise

SonicWALL PCI 1.1 Implementation Guide

Transcription:

Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web: www.ekartha.com

Introduction is a comprehensive Service Development and Delivery Platform for rapidly building and delivering On Demand/SAAS applications and business services. can help you build your SAAS applications quickly and inexpensively, ensuring that your customers can access your applications in the shortest possible time. The foundation of a mature SAAS application is based on building a multi-tenanted and scalable architecture. Successful SAAS applications are built as single instance applications that are shared by multiple clients on a common hardware and software infrastructure to achieve economies of scale. Companies can realize large savings in just licensing and infrastructure costs through a well developed multi-tenanted and scalable architecture. s out of the box architecture allows developers to fully leverage the benefits of multi-tenancy along with a set of essential On Demand Application Services (described below). provides applications with a robust multi-tenant load balanced scale-out architecture that uses standard technologies and infrastructure. This removes tremendous complexity and risks from the SAAS application development process, and has the potential to save companies years of development time, and millions of dollars in development and operational costs. Architectural Diagram Tenant 1 Application Tenant 2 User 1 User 2 Clone Clone User 1 UI & Business Logic Multi-tenant Services Monitoring Security & Audit Integration Logging Messaging Billing Metering Presentation Multi-tenant database persistence Linux & Java/J2EE Datacenter Servers Storage Network Load Balancing Monitoring Redundancy Security

ALICE SERVICES Database Persistence Service multi-tenanted database persistence supports comprehensive database functionality for modern Internet applications. Built over the Oracle relational database, multi-tenant database persistence supports multiple persistence models. These models are: Separate Database per tenant Shared Database, but Separate Schema per tenant Shared Database, Shared Schema and Shared Tables for all tenants Separate database per tenant Multi-Tenant Database Persistence Models Shared database, but separate schema per tenant Isolation Shared database, shared schema, and shared tables for all tenants Resource Pooling Machine Database Schema Tables

Each of the above models has advantages and disadvantages, and based upon the application and scalability requirements tenants can be assigned any particular model. It is important to note that all three models can be supported with in a single application. This allow companies to judiciously use databases resources based upon the data size, price charged, and other application needs like resource pooling, data isolation, security, and scalability. All three models support unlimited customization across all major concerns of an application like security, workflow, business logic, presentations and more. DML, DDL and upgrades are supported across all tenants and full tenant data migration is supported within and across database clusters. Security Security is critical for any organization failures can have devastating consequences for a company and its customers. As a result, companies spend enormous resources to protect their data and networks. At Ekartha, our security paradigm spans three layers of security: Application security (provided through the platform) Network security (provided through collaboration with our data center partners) Facilities security(provided exclusively through our data center partners) We use independent security auditors like Cybertrust to validate our security in all three areas on an annual basis. Routine application and network security scans by independent security companies, like Cybertrust, are conducted on a quarterly basis. Our partner data centers use the latest firewall protection, intrusion detection systems, SSL encryption, and proprietary security products that only a world-class security infrastructure can provide. Protection at the Application Level The On Demand platform supports comprehensive authentication, authorization, and auditing for all applications built using. Furthermore, the application security module can be extended to meet the specific requirements of an application or a particular business domain. Some of the application security features are: Administrators can assign data security rules that determine which users have access to which data based upon Role based Access Control. Application specific sharing models can be defined and data can be accessed based on user defined role hierarchies. All data is encrypted during transfer, and all access is governed by strict password security policies. All passwords are stored in MD-5 hash format. Password complexity rules and password expiration dates can be configured. Applications are continually monitored for security violation attempts. Policies can be set to define number of invalid login attempts allowed, session timeouts etc.

All login/logouts are monitored, and applications can have individual password/username reset rules. All applications using maintain a complete audit trail of all changes made to application data. For example, in default mode when a user makes a change, the application records the old value, the new value, the user that submitted the change, and a time stamp. All data changes can be reversed and all data and metadata can be restored to old values. Protection at the Network Level We select only data center partners that maintain the highest level of network security. All our data center partners use multilevel security products from leading security vendors and proven security practices to ensure network security. Following are some of the network security features provided by our partner data centers: To prevent malicious attacks through unmonitored ports, external firewalls allow only http and https traffic on ports 80 and 443. Switches ensure that the network complies with the RFC 1918 standard, while address translation technologies further enhance network security. IDS sensors protect all network segments. Internal software systems are protected by two-factor authentication, along with the extensive use of technology that controls points of entry. All networks are certified through third-party vulnerability assessment programs. Protection at the Facilities Level The security standards of our partner data centers are on par with the best civilian data centers in the world, including the world s most security-conscious financial institutions. Authorized personnel must pass through multiple levels of biometric scanning to reach system cages. All buildings hosting server cages are anonymous, with bullet-resistant exterior walls and embassy-grade concrete posts and planters around the perimeter. All exterior entrances feature silent alarm systems that notify law enforcement in the event of suspicion or intrusion. Presentation and User Interface The multi-tenanted presentation service allows developers to build rich user interfaces using standard technologies like HTML, Flash, JavaScript, JSP and XML. Developers can use Adobe Flex, Google GWT, Openlazlo, and other libraries and tools to build re-usable GUI components.

The presentation service uses metadata to weave the GUI components into a complete user interface. This supports non-code based customization of page layouts, page flows, forms, view security, and customization of GUI elements at the portlet and page level. Thus, enables developers to build highly customizable user interfaces that can be customized and configured for the specific needs of each and every tenant and, not just the application. Furthermore, concerns like security and multi-tenancy are automatically weaved in, thus no security or multi-tenancy code needs to be written or mixed in with GUI code. This allows for clean separation of concerns, and also allows developers to focus on the task at hand. Messaging Asynchronous process communication is an important part of many modern internet applications, since many system communications are asynchronous in nature. multi-tenant messaging service enables high performance, scalable, clustered messaging for internet applications. utilizes the Jboss, Java Message Service (JMS) implementation for asynchronous messaging requirements. messaging supports two main message paradigms: Point-to-point (or queue-based) messaging. Publish-and-subscribe (or topic-based) messaging. Furthermore, traditional messaging implementation involves steps like JNDI lookups for the queue connection factory and queue resources, and creating a JMS session before actually sending or receiving a message. simplifies the task of working with the messaging system by hiding the details of a typical messaging implementation so developers can concentrate on the actual task of processing messages instead of worrying about how to create, access, or clean up messaging resources. Integration The integration service provides a comprehensive set of technologies that makes it easy for companies to build a comprehensive integration infrastructure for their applications. All application s using automatically have a full featured and straightforward Web services API that can provide programmatic access to almost all of the features and data of the application for each individual tenant.

Furthermore, the integration service supports a wide array of technology options, that allow companies to use the tools and skills of their choice when implementing integrations. Integration Service offers pre-built connectors to standard enterprise applications like SAP (upcoming), and Oracle. The integration service also provides pre-built connectors for many desktop applications like Microsoft Excel, Word (upcoming), Outlook (upcoming). Developers can easily write new connectors for as many applications as they need. All connectors built using automatically support full multi-tenancy including the associated security needs and exception handling mechanisms. Billing and Metering The Billing and Metering service, aka Nexus is a highly flexible billing and metering service that allows On Demand companies to develop and bill for simple or complex pricing plans whether they are based on simple subscription models or complex multi-transaction pricing. The metering systems can be configured to meter all application usage, and companies can monetize any part of the application. Nexus also offers advanced functionality such as: Revenue management, partner revenue sharing, invoicing and bill presentment, integration with multiple payment gateways, and automated payment processing. Logging and Application Monitoring Logging and Application monitoring are critical to the successful deployment and management of distributed internet applications. In, all application activities can be monitored and logged. Standard application monitoring includes: Feature monitoring to determine usage of specific application features for each tenant. Monitoring request/response times to determine application performance for each tenant. Security monitoring, like session monitoring, login/logout monitoring etc. Database monitoring to determine database resource utlization for each tenant. Webservices utilization monitoring for each tenant. The logging and application monitoring service is also a crucial tool in tracking application bugs in the both the development and production environments. Application logging can be integrated with third party alert generation and management, so that specific alerts can be generated in response to application bugs and exceptions.