Get Your Head in the Cloud. The Hidden Power of Coupa s True Cloud Solution



Similar documents
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Security Information & Policies

How To Protect Your Cloud Computing Resources From Attack

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Projectplace: A Secure Project Collaboration Solution

The Education Fellowship Finance Centralisation IT Security Strategy

The Rise of the Postmodern ERP: Integrating Coupa with Your Enterprise Applications

White Paper How Noah Mobile uses Microsoft Azure Core Services

Enterprise Architecture Review Checklist

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Secure and control how your business shares files using Hightail

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Famly ApS: Overview of Security Processes

Requirement Priority Name Requirement Text Response Comment

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

INFRASTRUCTURE AS A SERVICE BUYER S CHECKLIST

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Client Security Risk Assessment Questionnaire

Cloud Computing Trends, Examples & What s Ahead

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Security Considerations

Securing the Microsoft Cloud Infrastructure. Reto Häni Chief Security Officer Microsoft Western Europe MEET SWISS INFOSEC!

Using ArcGIS for Server in the Amazon Cloud

A Sumo Logic White Paper. Sumo Logic Security Model. Secure by Design

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure Hosting Solutions For SAGE Energy Management

Infrastructure as a Service (IaaS) Dancik International and Peak 10

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

GoodData Corporation Security White Paper

How Safe are you in your Cloud?

5 Things to Look for in a Cloud Provider When it Comes to Security

SaaS Security for the Confirmit CustomerSat Software

twilio cloud communications SECURITY ARCHITECTURE

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Injazat s Managed Services Portfolio

Securing the Cloud through Comprehensive Identity Management Solution

SOC & HIPAA Compliance

Addressing Cloud Computing Security Considerations

Security & Infra-Structure Overview

ProjectManager.com Security White Paper

Hosted SharePoint: Questions every provider should answer

Security and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

The look and feel of a traditional Dedicated Server, with the on-demand scalability, flexibility and reliability you expect from the Cloud.

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

CA Cloud Overview Benefits of the Hyper-V Cloud

BMC Remedy OnDemand. Product Overview

Enabling Database-as-a-Service (DBaaS) within Enterprises or Cloud Offerings

The Elephant in the Room: What s the Buzz Around Cloud Computing?

Digi Device Cloud: Security You Can Trust

Oracle s Cloud Computing Strategy

AVLOR SERVER CLOUD RECOVERY

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

The last 18 months. AutoScale. IaaS. BizTalk Services Hyper-V Disaster Recovery Support. Multi-Factor Auth. Hyper-V Recovery.

Securing Data in Oracle Database 12c

Why can you trust Google?

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Architecture Guidelines Application Security

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Scalable Architecture on Amazon AWS Cloud

SAS 70 Type II Audits

CSC BizCloud VPE Service Offering Summary. CSC i

Cybersecurity Health Check At A Glance

Chapter 11 Cloud Application Development

BSNL IDC Hosted Firewall Service. Total Network Security

AN IN-DEPTH VIEW. Cleo Cleo Harmony - An In-Depth View

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

SELLING CLOUD. RapidScale 101. Author. RapidScale s CloudIntelligence Team

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

FoundationIP. Your scalable, seamless, state-of-the-art solution

Logicalis Enterprise Cloud Frequently Asked Questions

White Paper. Software as a Service by Yardi. Secure, seamless hosting and support

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Next Generation Now: Red Hat Enterprise Linux 6 Virtualization A Unique Cloud Approach. Jeff Ruby Channel Manager jruby@redhat.com

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Security and Managed Services

Best Practices for Architecting Your Hosted Systems for 100% Application Availability

Transcription:

Get Your Head in the Cloud The Hidden Power of Coupa s True Cloud Solution

INTRODUCTIONS David Williams VP, Technology @metakube Sanket Naik VP, Cloud Operations & Security @SanketNaik Jim Benoit Senior Buyer & Project Lead Coupa Implementation

Who Are Y all?

Our History in the Cloud

True Cloud from Different Perspectives Photo Andrew Lipson, used with permission

A Black Box

The Nuts and Bolts

A collection of People Processes Software Hardware

Abstracted Layers of Complexity

People 10

Processes, or, One Codeline is Awesome rc1 (13.0.0.rc1) rc2 (13.0.0.rc2) Release (13.0.0) 013_release master System/ Integration Testing Regression Test Start Regression Test End Branch New Features Release Tag Deferred SWAT/ Integrations/ Sustaining Pull Requests Accepted SWAT/ Integrations/ Sustaining Pull Requests Fixes for bugs found by QA Milestone 11

But Also Hard Enough Release (12.0.0) rc1 (12.0.1.rc1) rc2 (12.0.1.rc2) Release (12.0.1) rc1 (12.0.2.rc1) rc2 (12.0.2.rc2) Release (12.0.2) 012_release master Regression Test Start Regression Test End 013_release Branch Deferred SWAT/ Integrations/ Sustaining Pull Requests Fixes for bugs found by QA Accepted SWAT/ Integrations/ Sustaining Pull Requests Release Tag Milestone 12

Quality Throughout the Process Reviews Designs are reviewed for correctness and consistency All check- ins are code reviewed by func:onal experts Aspect- oriented developer checklists Automated tests Mandatory unit tests for all model changes Tests are run automa:cally all the :me System (integra:on) tests are automated Non- func4onal concerns Analysis of API, and CSV interfaces Performance and scalability studies Con:nuous security and penetra:on tes:ng Pla8orm reliability Version updates on dependent libraries and sohware PlaIorm security updates Code analysis in con:nuous integra:on 13

Software & Hardware: A High-Level Map

More Specifically Load Balancer Firewall Web Server 1/ App Server 1 Web Server 2/ App Server 2 Application Tier Firewall Firewall Backup Firewall MySQL Master/Slave 1 MySQL Master/Slave 2 Database Tier Utility Server 1 Utility Server 2 Utility Tier Primary Data Center Secondary Data Center

Your Driver of Savings as a Service

What Do You Need from the Cloud?

We think you need Dependability Security Interoperability Simplicity

Dependability

Dependability Designed for Failure Resilient & Elastic Monitored 24 x 7 x 365

Designed for Failure Backups Every hour 3 Levels of Failover Data Center Region Backup Real-time Database Replication RTO = 0-1hr RPO = 0-1hr

Resilient & Elastic at a Global Scale 24x7 Cloud Operations Defense in Depth Security & Compliance State of the Art Facilities Active Active Hot Replication Global Support Model Best in Class SLAs 99.999% Availability Power & HVAC

Always Up

Monitored 24 x 7 x 365 Transaction Monitoring App Performance CPU Utilization Disk Space Memory Consumption Intrusion Detection Background Queue Execution SFTP Connectivity Exception Handling Inbound & Outbound Email Integration Connectors Throughput

Security & Compliance

Security Physical Electronic People Process & Auditing

Physical Security

Electronic Security

Security Operations & Tools Firewalls Intrusion Detection Systems Anti-virus Security Scanning Penetration testing Static code analysis Single Sign-on (SSO) Encryption Threat Intelligence 24 x 7 monitoring Data lifecycle management

Security Operations & Tools contd. Single sign-on (SSO) Support for SAML 2.0 Integrated authentication to Active Directory Integration Security Integration Method Security Mechanism IDoc, Flat File SFTP dropoff Per customer SFTP user SSH keys authentication and Host key verification REST API SSL API key for authentication IP whitelisting (coming soon)

People

Process & Auditing SSAE 16 Type II SOC 1 6+ years of auditable and materially clean reports HIPAA Compliant US/EU Safe Harbor Certified FedRAMP (Q4, 2015) SOC 2 (Q4 2015) ISO 27001 (Q3, 2016) PCI (Q4, 2016)

Interoperability

Interoperability Integrated Cloud Agnostic Partner-Oriented Self-Service Transparent

Simplicity at Scale

Let s Talk Practice

General Mills

One more thing

What s New New hosting in Sydney for Australian customers Second region in Frankfurt for European customers coming soon Launching Enterprise Stack (ES) 4.0.2 Reliability More resilience to failures for infrastructure components Zero downtime upgrades for most infrastructure components Elasticity Auto-scaling of utility services like email processing and background job processing Performance Bigger and faster hardware CPUs, memory, SSD, IOPS Average response time improved by up to 50% Throughput increased by up to 100% Security Full data at rest encryption (DARE) Data in transit security for email (Opportunistic TLS)

THANK YOU!

Photo Credits Surveyor - https://www.flickr.com/photos/usoceangov/13266228925 Nuts & Bolts - https://www.flickr.com/photos/microassist/6990640490 ENIAC - https://www.flickr.com/photos/8136496@n05/2196367188 LEGO Tower - https://www.flickr.com/photos/paulspace/2967861316 LEGO Minifigs - https://www.flickr.com/photos/hyku/380020264 (modified) Golden Collosseum by Juan de Dios Santander Vela https://www.flickr.com/photos/juandesant/210777110 Library by Jeremy Noble https://flic.kr/p/48wfpp Icy Roads by Wilson Hui https://flic.kr/p/eoidbu Key & Circuit board perspecsys.com Day 87 by Pascal https://flic.kr/p/7dazzy Horse racing by Paul https://flic.kr/p/63qeif Serious Scaffolding by Dan DeLuca https://flic.kr/p/5ydz2c Flying a bit close by Mark Lehmann https://flic.kr/p/9lmb2a Anchor Chain - https://www.flickr.com/photos/chefranden/4777900975 Poodle - http://flickr.com/photos/92305862@n00/422417777 Lego Dimensions - http://en.wikipedia.org/wiki/lego#/media/file:lego_dimensions.svg Relativity by Andrew Lipson - http://www.andrewlipson.com/escher/relativity.html RFID closed - https://www.flickr.com/photos/amagill/34762677 Elgin Pocket Watch - https://www.flickr.com/photos/gozalewis/3257641860