Hit Hanan & Faisal Faruqi Nexscience



Similar documents
NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK

Symantec Mobile Management 7.2

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Mobile device and application management. Speaker Name Date

Citrix XenDesktop Backups with Xen & Now by SEP

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

How Our Cloud Backup Solution Protects Your Network

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

Mobile Admin Architecture

Athena Mobile Device Management from Symantec

REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date Page 1 Public

Symantec Mobile Management 7.2

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Symantec Mobile Management 7.1

BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide

Symantec Mobile Management 7.1

Cisco Virtual Office Express

Only Athena provides complete command over these common enterprise mobility needs.

IBM Endpoint Manager for Mobile Devices

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

Symantec Mobile Management for Configuration Manager 7.2

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Citrix XenServer Backups with Xen & Now by SEP

How To Make Your Computer More Efficient And Reliable

Network Management System (NMS) FAQ

How to Turn the Promise of the Cloud into an Operational Reality

ACCREDITED SOLUTION. EXPLORER Cisco Systems VPN Client

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

Access Your Cisco Smart Storage Remotely Via WebDAV

The next generation of knowledge and expertise Wireless Security Basics

OpManager MSP Edition

Simplifying Desktop Mgmt With Novell ZENworks

Objectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

TSplus White Paper 1

WHITE PAPER OCTOBER CA Unified Infrastructure Management: Solution Architecture

iphone in Business Security Overview

The Ultimate Remote Database Administration Tool for Oracle, SQL Server and DB2 UDB

Symantec Mobile Management Suite

Cloud Managed Printing

KPiSync. By Larry McGhaw, Chief Technology Officer

IT Infrastructure and Emerging Technologies

Ensuring the security of your mobile business intelligence

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

Uni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief

JP1 Version 11: Example Configurations

Mobile Device Management and Security Glossary

Tk20 Network Infrastructure

msuite5 & mdesign Installation Prerequisites

Citrix XenServer Backups with SEP sesam

BENEFITS OF MOBILE DEVICE MANAGEMENT

What We Do: Simplify Enterprise Mobility

Windows 7, Enterprise Desktop Support Technician

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Developing Network Security Strategies

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Good for Enterprise Good Dynamics

Deploying iphone and ipad Security Overview

Citrix XenServer Backups with Xen & Now by SEP

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

If you can't beat them - secure them

Cloud Computing. What is Cloud Computing?

Priority Pro v17: Hardware and Supporting Systems

SECURING TODAY S MOBILE WORKFORCE

HP Service Manager Architecture and Security HP Software-as-a-Service

How To Save Money On Your Computer (For A Company)

ipad in Business Security

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Wyse Device Manager TM

Symantec Backup Exec 2010

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

PortWise 4.7. PortWise Sales FAQ. Sales FAQ & Licensing Guide

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Encryption Policy Version 3.0

Cisco WebEx Meetings Server

Why a Reverse Proxy with My Instant Communicator for mobiles??

Deploying iphone and ipad Virtual Private Networks

activecho Driving Secure Enterprise File Sharing and Syncing

How To Protect Your Data From Harm

+ < We call it Integrated Operations Management. Optimized Processes Assured Customer Satisfaction

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

PMDP is simple to set up, start using, and maintain

ManageEngine (division of ZOHO Corporation) Infrastructure Management Solution (IMS)

The Centrify Vision: Unified Access Management

Daymark DPS Enterprise - Agentless Cloud Backup and Recovery Software

Mobile Device Management for CFAES

Security. TestOut Modules

INFRASTRUCTURE SOLUTIONS OVERVIEW

Dell World Software User Forum 2013

Lenovo Secure Cloud Access Access your files, applications and reports from any device.

ADVANCED TWO-FACTOR AUTHENTICATION VIA YOUR MOBILE PHONE

Propalms TSE Deployment Guide

Whitepaper. Tangible Benefits of Cloud Networking versus the alternative.

Device Independence - BYOD -

Readiness Assessments: Vital to Secure Mobility

Transcription:

Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience

Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart phones and Web-enabled phones will shoot past 1.82 billion units and continue to climb after that. (Gartner) Leading Players By 2012, Symbian s market share will shrink to 39% while Android is projected to surge to 14% of the global Smartphone market followed by iphone (Gartner) Nexscience

IT Problems Harmfully Impact the Entire Enterprise

Managing in a Mobile World Managing complex systems in multiple locations remotely is the key benefit of mobile software to the enterprise. It will be a key tool in reducing the cost of managing the enterprise while increasing both productivity and quality of life for IT professionals. --Database Trends & Applications, October 2002

The Confluence of IT Tools Mobile IT Management is a Best Practice and is becoming the norm for IT shops Cell Phones Pagers Laptops Wireless Handheld + IT Management Software

Why Database Management Is important? "Average database downtime costs vary considerably across industries, from approximately $90,000 per hour in the media sector to about $6.48 million per hour for large online brokerages."... (source:information-management.com).

How Much A Downtime Cost

What s different about mobile? Key security challenges for mobile devices Flash memory Device is constantly connected to the Internet Combines highly sensitive personal and corporate data, making perfect device to target Operating system is in constant state of fluxrace to the next feature Security is an afterthought (corporate user/pass example) Traditional security techniques useful but more advanced ones are needed to secure mobile

Mobile Management Value Proposition Increase Productivity Administrators have the tools to be both reactive and proactive End-user productivity increases as down-time decreases Service Level Agreements (SLAs) are met or exceeded Avoid Revenue Loss Under-performing systems slow down revenue flow Disabled systems stop revenue altogether Simplify IT Management Heterogeneous IT management: Manage any database, server or network device throughout the enterprise Single console any form-factor: Dynamically adjusts to any screen size including wireless handheld, tablet, laptop, subnotebook or desktop In summary, with mobile management, organizations can economize on people, on skills and get more out of established equipment and software

Existing Mobile IT Management Options Network Layer Cisco 3Com Routers Hubs Firewalls Server Layer Windows 2000 Domain Controller Windows 2003 Domain Controller Unix Linux 2000 / XP Professional Exchange Server Exchange Server 2000 / XP Professional Domain Domain Database Layer SQL Server Oracle DB2 UDB Teradata

A Mobile Enterprise Integrates with Alerting and Monitoring Tools 2 System sends alert to IT Admin 3. Admin receives alert from the field 1. Alert Notification 4. Mobile software used to identify and resolve the issue (for databases, networks, servers) 5 System is aware event has been resolved / averted

Mobile Management Architecture Deployment Models Software-as-a-Service (SaaS) Model A hosted solution model Multiple users belonging to different companies accessing multiple databases through a single SaaS server. A Multi-layer security model required to ensure end-to-end security Enterprise Model Multiple users belonging to same company accessing databases through the enterprise server.

SaaS Deployment Model

SaaS Deployment Model

Security in SaaS Model Client Device to SaaS Server Connection from mobile client to SaaS server secured through industry standard encryption. Client application need to encrypt/decrypt May use AES 256-bit hardware encryption to protect all data at rest (supported by most smart phone devices). SaaS Server to Databases Access to database from SaaS Server secured through VPN Server maintains pool of VPN connections. Additional layer of security by encrypting server side data using standard 128 bit encryption. (V 2.0).

Enterprise Deployment Model

Enterprise Deployment Model

Security in Enterprise Model Client Connection from mobile client secured through VPN (SSL VPN, WPA2 Enterprise Wi-Fi and IPSec). Leverages certificate-based authentication to make connecting to VPN servers transparent to users. May use AES 256-bit hardware encryption to protect all data at rest (on client device). Server Server is installed within customer s corporate network and can be configured according to their corporate security policies and standards. Access calls to/from the back-end server can be monitored or audited by system administrator at any Additional layer of security by encrypting server side data using standard 128 bit encryption. (V 2.0).

If you secure it, they won t come

Top Issues with Mobile monitoring Solutions Security Real Estate Current Solutions are built for regular web interface ssh clients on PDA are not really an option to perform the work.

Questions? Comments? We are happy to help you! hanan@nexscience.com faisal@nexscience.com