What does it mean to you? Jim Metzler
|
|
- Adam Nathan Webster
- 5 years ago
- Views:
Transcription
1 Application Delivery 2.0 What is it? What does it mean to you? Jim Metzler
2 Goals and Non-Goals Goals of the Presentation: h Identify factors that currently impact application delivery h Describe how a new generation of technology is impacting application delivery Non-Goals: h Read every bullet on every slide
3 Agenda Application Delivery 1.0 A New Generation of Challenges & Solutions Summary
4 Factors That Make Application Delivery Difficult Today Consolidation of IT resources Distribution of employees The deployment of protocols that are: hchatty; e.g., CIFS hcomputationally p y intense; e.g., SSL The prevalence of hacking
5 Factors That Make Application Delivery Difficult Today Lack of visibility Stovepipes & MTTI Applications have different characteristics Complexity n-tier applications
6 Today s Complex N-Tier IT Environment End Users End Users LAN WAN ADC Web Servers Web Servers Application Servers Application Servers Database Servers Database Servers ADC refers to an Application Delivery Controller
7 Application and Infrastructure Complexity Increases The Probability y of a performance problem Time it takes to identify the root cause of performance problems Probability y of a security intrusion Time, cost, difficulty and risk of evolving the infrastructure
8 The Application Delivery Framework The four components of the application delivery framework are: hplanning & Design hmanagement hcontrol hnetwork and Application Optimization
9 Key Planning & Design Tasks Include: Create a roadmap for each major component of IT Identify the interdependencies Identify the critical applications and services Establish goals for the performance of the key applications and services Design for the appropriate levels of availability and performance Develop a management architecture
10 Application Performance Management Framework Automatically map the business critical applications to the relevant components of the infrastructure. Quantify how the performance of the infrastructure impacts the performance of the applications. Employ predictive and proactive monitoring of the infrastructure and applications to identify the components that are causing the degradation. I l t id t l i Implement rapid root cause analysis capabilities.
11 Control hclassify traffic based on myriad criterion hprioritize traffic that is business critical and delay sensitive hperform traffic management and dynamically allocate network resources hdetermine who has access to which assets hblock unauthorized access at the perimeter of the company hidentify and shut down attacks
12 Application Response Time Equation 1 R: Application Response Time Payload: Amount of data to be transmitted App Turns: Required number of round trips RTT: Round Trip Time Concurrent Requests: # Simultaneous sessions Cs: Server Side Compute time Cc: Client Compute time 1: Variation of an equation in Why Centralizing Microsoft Servers Hurts Performance, Peter Sevcik and Rebecca Wetzel,
13 Common Optimization Techniques To Reduce Payload: hcompression hcaching hde-duplication To Increase Goodput: hforward Error Correction To Reduce the Impact of RTT: hprotocol acceleration To Reduce Apps Turns: hrequest Prediction hrequest Spoofing To Reduce Server Side Compute Time: htcp Multiplexing hssl Offload To Reduce the Impact of Congestion: hqosq S
14 Characteristics of the Current Optimization Solutions There are three general classes of solutions: hwan Optimization Controllers (WOCs) & soft WOCs happlication Delivery Controllers (ADCs) & soft ADCs happlication Delivery Services (ADSs) The goal of a WOC is to improve the performance of applications delivered from the data center to users in the branch office over a WAN such as ATM or MPLS. ADCs provide functionality such as reverse caching and compression and also offload computational intense tasks off the servers; i.e., TCP multiplexing, processing of SSL
15 Structure of an Application Delivery Service (ADS)
16 ADS Functionality Unlike a WOC or an ADC, an ADS improves the performance of the WAN by providing: hroute Optimization htransport Optimization hhttp Optimization i hcontent Offload hfirewall-like Security
17 Agenda Application Delivery 1.0 A New Generation of Challenges & Solutions Summary
18 Computer Crime: More Organized and More Sophisticated McAfee estimated that the global damage from data loss to exceed $1 trillion. Credit card fraud is now a cash cow and cyber criminals are now focusing on intellectual property. Some malware writers now have R&D departments and test labs. A black market has evolved - botnets are available for rent; malware authors who sell their code and provide support.
19 Virtualization Defined Virtualization typically y involves a logical abstraction of physical systems that allows one of the following: h A single physical system to be partitioned to appear as multiple independent logical systems; e.g., multiple VLANs defined on a single physical LAN. h Multiple physical systems to appear as single logical system; e.g., a compute cluster with a single system image or RAID disk array appearing to be a single large, reliable disk.
20 Virtual Servers Application 1 Guest OS 1 Application N Guest OS N Virtual Virtual Machine 1 Machine N VM Monitor/Hypervisor Physical Machine
21 Management Challenges Associated with Server Virtualization Loss of insight into inter-vm traffic VM sprawl Effective capacity planning The ease of (automatically) creating and/or moving a VM creates challenges: hensuring the VM has the same security, storage access, and QoS configurations and policies. hkeeping track of where an application is running.
22 Virtual Desktops A VM on a data center server hosts a complete user desktop including all its applications, configurations, and privileges. il On the client device, the enterprise desktop is isolated from whatever else is running on the PC. Client-side virtualization applications are delivered to the end system s isolation environment, often using a protocol such as CIFS. Server-side virtualization ti the application and the data remain at the central side and are accessed using protocols such as Microsoft s Remote Desktop Protocol (RDP), Citrix s ICA, and/or Teradici s PCoIP.
23 The Challenges of Virtual Desktops Cost of the extra servers in the data center. Virtual desktop systems need to be tightly integrated with policy management systems and user authorization to ensure that the desktop characteristics match the users' needs and permission profiles. Delivering acceptable application performance to the virtual desktop over the WAN. The inefficiencies associated with LAN-centric remote display protocols, such as RDP, limit the performance of these protocols over the WAN.
24 Virtual Appliances A Virtual Appliance (VA) is based on network appliance software, together with its operating system. A VA runs in a virtual machine (VM) over the hypervisor in a virtualized server. A VA can include WOCs, ADCs, firewalls, routers and performance monitoring solutions among others. A VA can alleviate some of the management burdens if the key management tasks can be automated and centralized at the data center.
25 Silly Things That Get Said About Cloud Computing Providing IT is like providing electricity You know, it is like Salesforce.com You no longer need to know how services are provided You will always save a lot of money It is a fundamentally new approach to IT
26 Cloud: A Lot of Things Old Time sharing Virtualized computers Out-tasking Renting applications
27 Cloud: A Few Things New Dynamic i Movement of Virtual Machines and the associated functionality On demand provisioning of IT resources New implementation ti models
28 So, what is cloud computing? Definition: iti Depends upon who you talk to. Goal: A significant improvement in the cost-effective, elastic provisioning of IT services.
29 Key Characteristics of a Cloud Computing Solution Dynamic y creation & movement of resources Virtualization of IT resources Automation of IT processes Centralization of IT resources Simplification of IT services Increased reliance on the WAN/Internet
30 Classes of Cloud Computing Public hsoftware as a Service hinfrastructure as a Service hplatform as a Service Private Hybrid
31 Planning for Cloud Computing Determine your cost structure Identify what you will provide yourself and what will be provided by a third party Perform due diligence on potential third parties Simplify the services and applications you provide Standardize the infrastructure Identify how your implementation of server Identify how your implementation of server virtualization impacts other aspects of IT
32 Next Generation Management Need visibility into inter-vm traffic Focus management tasks at the VM level Not just applications, but also services Automate processes such as change and configuration management Integrate processes such as fault and performance management Manage over multiple management domains
33 Next Generation Control Implement virtualized desktops and mobile devices Ensure that business managers do not bypass IT Guarantee that you can: hcontrol where your data is stored hpass compliance audits hget your data back whenever you want it Ensure that any third party provider will: hkeep K your data safe from security intrusions i hhave adequate disaster recovery capabilities Defense in Depth
34 Next Generation Network Acceleration & Optimization Resigned g data center LAN and branch offices Is the network good enough? Increased use of ADCs, WOCs some of which are virtualized Increased use of Application Delivery Services for performance and distributed security More distributed access to the Internet
35 Agenda Application Delivery 1.0 A New Generation of Challenges & Solutions Summary
36 Summary Ensuring acceptable application delivery is challenging today. A new generation of challenges and solutions will dramatically impact application delivery. IT organizations MUST plan for the challenges and solutions associated with Application Delivery 2.0.
37 References The 2009 Application Delivery Handbook A Guide to Understanding Cloud Computing Cloud Computing: A Guide to Risk Mitigation p check-guide-to-risk-mitigation.html The Challenges of Managing Virtualized Server Environments
38 Thank you. Jim Metzler
Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationWHITE PAPER. Applying Software-Defined Security to the Branch Office
Applying Software-Defined Security to the Branch Office Branch Security Overview Increasingly, the branch or remote office is becoming a common entry point for cyber-attacks into the enterprise. Industry
More informationNetwork+ Guide to Networks 6 th Edition
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access Objectives 1. Explain virtualization and identify characteristics of virtual network components 2. Create and configure
More informationVirtualization: Benefits, Challenges and Solutions By Dr. Jim Metzler
Virtualization: Benefits, Challenges and Solutions By Dr. Jim Metzler Sponsored in part by: Produced by Table of Contents Executive Summary... 3 Introduction... 6 Server Virtualization... 6 The Adoption
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationUnity EdgeConnect SP SD-WAN Solution
As cloud-based application adoption continues to accelerate, geographically distributed enterprises increasingly view the wide area network (WAN) as critical to connecting users to applications. As enterprise
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationJim Metzler. Introduction. The Role of an ADC
November 2009 Jim Metzler Ashton, Metzler & Associates jim@ashtonmetzler.com Introduction In any economic environment a company s senior management expects that their IT organization will continually look
More informationPowering Transformation With Cisco
Shape Your Business For the Future: Powering Transformation With Cisco Cisco VXI : Delivering The Next Generation of Virtualized Environment Herdiman Eka Wijaya 12 June 2012 Agenda What is Desktop Virtualization?
More informationFlex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Flex Tenancy 2015-04-28 17:48:27 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Flex Tenancy... 3 Flex Tenancy... 4 Understanding the Flex Tenancy
More informationDeliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps
Use Case Brief Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps Overview Cloud-hosted collaboration and productivity suites
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationCerteon s acelera Virtual Appliance for Acceleration
Certeon s acelera Virtual Appliance for Acceleration Product Brief Dr. Jim Metzler Ashton, Metzler & Associates Rolf McClellan McClellan Consulting June 2008 Certeon s acelera Virtual Appliance for Acceleration
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationBuild application-centric data centers to meet modern business user needs
Build application-centric data centers to meet modern business user needs Citrix.com Table of contents Meeting current business challenges...3 Device package integration...5 Policy-based service insertion...6
More informationVMWARE CLOUD FOUNDATION: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017
: INTEGRATED HYBRID CLOUD PLATFORM WHITE PAPER NOVEMBER 2017 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation 4 Deploying on Premises 6
More informationCisco Wide Area Application Services: Secure, Scalable, and Simple Central Management
Solution Overview Cisco Wide Area Application Services: Secure, Scalable, and Simple Central Management What You Will Learn Companies are challenged with conflicting requirements to consolidate costly
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationWAN Application Infrastructure Fueling Storage Networks
WAN Application Infrastructure Fueling Storage Networks Andrea Chiaffitelli, AT&T Ian Perez-Ponce, Cisco SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationCYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments
CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) 2010 October 25 29, 2010 Kuala Lumpur Convention Centre Securing Virtual Environments Raimund Genes CTO Trend Micro The Changing Datacenter
More informationImproving VDI with Scalable Infrastructure
Improving VDI with Scalable Infrastructure As virtual desktop infrastructure (VDI) has become more prevalent, point solutions have emerged to address associated delivery issues. These solutions burden
More informationVMware vsphere Clusters in Security Zones
SOLUTION OVERVIEW VMware vsan VMware vsphere Clusters in Security Zones A security zone, also referred to as a DMZ," is a sub-network that is designed to provide tightly controlled connectivity to an organization
More informationCS 356 Operating System Security. Fall 2013
CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database
More informationMitigating Branch Office Risks with SD-WAN
WHITE PAPER Mitigating Branch Office Risks with SD-WAN 1 M itigating Branch Office Risks with SD-WAN Branch Security Overview The branch or remote office stands out as a point of vulnerability in an increasingly
More informationvsan Security Zone Deployment First Published On: Last Updated On:
First Published On: 06-14-2017 Last Updated On: 11-20-2017 1 1. vsan Security Zone Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Security Zone Deployment 3 1.1 Solution Overview VMware vsphere
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationStop Cyber Threats With Adaptive Micro-Segmentation. Chris Westphal Head Of Product Marketing
Stop Cyber Threats With Adaptive Micro-Segmentation Chris Westphal Head Of Product Marketing Agenda Why Are We Here? What Is Adaptive Micro-Segmentation? How Adaptive Micro-Segmentation Is Used Why Visibility
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationDeliver Office 365 Without Compromise
USE CASE BRIEF Deliver Office 365 Without Compromise Ensure successful deployment and ongoing manageability of Office 365 and other SaaS apps Cloud-hosted collaboration and productivity suites like Office
More informationNETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.
NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationVMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018
VMWARE CLOUD FOUNDATION: THE SIMPLEST PATH TO THE HYBRID CLOUD WHITE PAPER AUGUST 2018 Table of Contents Executive Summary 3 A Single Architecture for Hybrid Cloud 4 Introducing VMware Cloud Foundation
More informationVirtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC
Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /
More informationSecuring Your Virtual World Harri Kaikkonen Channel Manager
Securing Your Virtual World Harri Kaikkonen Channel Manager Copyright 2009 Trend Micro Inc. Virtualisation On The Rise 16,000,000 Virtualized x86 shipments 14,000,000 12,000,000 10,000,000 8,000,000 6,000,000
More informationWhat s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics
What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market
More informationhcloud Deployment Models
hcloud Deployment Models Drew Dietrich Director, Oracle Managed Cloud Services 1 The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes
More informationWAN Optimization. Overview KNOW YOUR NETWORK
KNOW YOUR NETWORK DATA SHEET WAN Optimization Acceleration and Compression Overview Enterprise productivity requires that all employees have a high-quality user experience when accessing business applications,
More informationMASERGY S MANAGED SD-WAN
MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationRet h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s
I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationF5 Synthesis Information Session. April, 2014
F5 Synthesis Information Session April, 2014 Agenda Welcome and Introduction to Customer Technology Challenges Software Defined Application Services Reference Architectures for Today s Customer Challenges
More informationCisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center
Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing
More informationSAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD. May 2012
SAFEGUARDING YOUR VIRTUALIZED RESOURCES ON THE CLOUD May 2012 THE ECONOMICS OF THE DATA CENTER Physical Server Installed Base (Millions) Logical Server Installed Base (Millions) Complexity and Operating
More informationTALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE
DATASHEET THUNDER SOFTWARE FOR BARE METAL YOUR CHOICE OF HARDWARE A10 Networks application networking and security solutions for bare metal raise the bar on performance with an industryleading software
More informationArchitecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal
Architecture: Consolidated Platform Eddie Augustine Major Accounts Manager: Federal Current DoD Situation Stovepipes of Technology icontrol Customization irules Solutions Security Access Availability Load
More informationSecuring the Data Center against
Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and
More informationCloudBridge 7.3 and the Windows Server Appliances
CloudBridge 7.3 and the Windows Server Appliances Simeon Bosshard, Systems Engineer Citrix Systems International GmbH 06.11.2014 Release 7.3 Visibility Enhanced Optimization Usability & Manageability Field-enabler
More informationRiverbed and VMware Deliver Optimized Cloud Solutions
Riverbed and VMware Deliver Optimized Cloud Solutions VMWARE VIRTUALIZATION AND RIVERBED WAN OPTIMIZATION Companies all over the world are turning to wide area network (WAN) optimization and virtualization
More informationNetwork Virtualization Business Case
SESSION ID: GPS2-R01 Network Virtualization Business Case Arup Deb virtual networking & security VMware NSBU adeb@vmware.com I. Data center security today Don t hate the player, hate the game - Ice T,
More informationOrchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud
Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud 2 Orchestrate the Cloud Infrastructure Business Drivers for Cloud Long Provisioning Times for New Services o o o Lack
More informationRethinking Security CLOUDSEC2016. Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team
Rethinking Security CLOUDSEC2016 Ian Farquhar Distinguished Sales Engineer Field Lead for the Gigamon Security Virtual Team Breaches Are The New Normal Only The Scale Surprises Us OPM will send notifications
More informationAchieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER
Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationMicrosoft Windows Embedded Server Overview
Microsoft Windows Embedded Server Overview Comprehensive cloud platform Complete, built-in virtualization platform Industry-leading scalability and performance, so you can virtualize every application
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationCisco Intelligent WAN with Akamai Connect
Data Sheet Cisco Intelligent WAN with Akamai Connect Deliver consistent, LAN-like user experiences using application acceleration and WAN optimization while lowering bandwidth costs. Users get world-class
More informationNetwork. Arcstar Universal One
Network Universal One ARCSTAR UNIVERSAL ONE Universal One Enterprise Network NTT Communications' Universal One is a highly reliable, premium-quality network service, delivered and operated in more than
More informationSecurity Considerations for Cloud Readiness
Application Note Zentera Systems CoIP Platform CoIP Defense-in-Depth with Advanced Segmentation Advanced Segmentation is Essential for Defense-in-Depth There is no silver bullet in security a single solution
More informationDynamic Network Segmentation
Dynamic Network Segmentation Innovative network security protection to stop cyber attacks and meet compliance. 1 Isolate and flexibly segment your networks Introduction As organizational structures and
More informationCopyright 2011 Trend Micro Inc.
Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF
More informationCitrix XenDesktop 2.0. Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH
Citrix XenDesktop 2.0 Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH XenDesktop Citrix XenDesktop makes the delivery of Windows desktops from your datacenter simple, secure
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationData Center 3.0: Transforming the Data Center via the Network
Data Center 3.0: Transforming the Data Center via the Network Douglas A. Gourlay Senior Director - Data Center Solutions Group Peter Linkin Marketing Manager - Data Center Architecture August 1, 2007 1
More informationAcceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC)
Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC) Conducted by Certeon for IBM Ready for Rational CCRC Certification November 28 PAGE 1 Table of Contents Certeon Acceleration
More informationFive Essential Capabilities for Airtight Cloud Security
Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.
More informationvsan Remote Office Deployment January 09, 2018
January 09, 2018 1 1. vsan Remote Office Deployment 1.1.Solution Overview Table of Contents 2 1. vsan Remote Office Deployment 3 1.1 Solution Overview Native vsphere Storage for Remote and Branch Offices
More informationINTEGRATED APPLICATION ASSURANCE
INTEGRATED APPLICATION ASSURANCE Layer 7 Visibility Application and Internet Control Policy Based WAN Optimization INTEGRATED ASSURANCE SUITE Increase the speed and efficiency of your wide area network.
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationVirtualizing Application Delivery for the Cloud. Paul Nicholson Sr. Product Marketing Manager
Virtualizing Application Delivery for the Cloud Paul Nicholson Sr. Product Marketing Manager www.a10networks.com Agenda Application Delivery Controllers hcloud Computing hvirtualization Finding the right
More informationIntroducing CloudGenix Clarity
SOLUTION OVERVIEW Introducing CloudGenix Clarity Brilliant network and app insights from the world s leading SD-WAN solution CLOUDGENIX SOLUTION OVERVIEW CLARITY 2 CloudGenix Clarity is the most complete
More informationThe McAfee MOVE Platform and Virtual Desktop Infrastructure
The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized
More informationF5 comprehensive protection against application attacks. Jakub Sumpich Territory Manager Eastern Europe
F5 comprehensive protection against application attacks Jakub Sumpich Territory Manager Eastern Europe j.sumpich@f5.com Evolving Security Threat Landscape cookie tampering Identity Extraction DNS Cache
More informationData Center Network Infrastructure
Data Center Network Infrastructure Data Center Definition A data center is a facility used for housing a large amount of electronic equipment, typically computers and communications equipment. is usually
More informationExam: : VPN/Security. Ver :
Exam: Title : VPN/Security Ver : 03.20.04 QUESTION 1 A customer needs to connect smaller branch office locations to its central site and desires a more which solution should you recommend? A. V3PN solution
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationSichere Applikations- dienste
Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es
More informationNext-Generation HCI: Fine- Tuned for New Ways of Working
www. Govtech.com Next-Generation HCI: Fine-Tuned for New Ways of Working - p. 1 February 21, 2018 Next-Generation HCI: Fine- Tuned for New Ways of Working Traditional data center management focuses mainly
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-401 Exam Name: Designing Citrix XenDesktop 7.6 Solutions Version: Demo DEMO QUESTION 1 Which option requires the fewest components to implement a fault-tolerant, load-balanced
More informationFeature Comparison Summary
Feature Comparison Summary,, and The cloud-ready operating system is the cloud-ready operating system that delivers new layers of security and Azure-inspired innovation for the applications and infrastructure
More informationAKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview
AKAMAI WHITE PAPER Enterprise Application Access Architecture Overview Enterprise Application Access Architecture Overview 1 Providing secure remote access is a core requirement for all businesses. Though
More informationNative vsphere Storage for Remote and Branch Offices
SOLUTION OVERVIEW VMware vsan Remote Office Deployment Native vsphere Storage for Remote and Branch Offices VMware vsan is the industry-leading software powering Hyper-Converged Infrastructure (HCI) solutions.
More informationHow Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server
How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationFundamentals of Windows Server 2008 Network and Applications Infrastructure
COURSE OVERVIEW This five-day instructor-led course introduces students to network and applications infrastructure concepts and configurations provided by Window Server 2008. Students will be able to acquire
More information10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control
10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationSD-WAN Solution How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right SD-WAN Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations are Choosing SD-WAN 4 CH. 2 What
More informationUnderstanding of basic networking concepts (routing, switching, VLAN, firewall functionality)
Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based
More informationAcceleration Performance Tests for IBM Rational ClearTeam Explorer
Acceleration Performance Tests for IBM Rational ClearTeam Explorer Conducted by Array Networks for IBM Ready for Rational ClearTeam Explorer Certification Table of Contents White Paper Executive Summary
More informationThe Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed
The Role of WAN Optimization in Cloud Infrastructures Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
More information1Y Designing Citrix XenDesktop 7.6 Solutions
1Y0-401 - Designing Citrix XenDesktop 7.6 Solutions 1. Scenario: CGE acquires a small energy company that is running MGMT, a proprietary 16-bit application. A Citrix Architect is tasked with deploying
More information