Microsoft Networking Academy

Size: px
Start display at page:

Download "Microsoft Networking Academy"

Transcription

1 Microsoft Networking Academy with the C+E Global Black Belts Olivier Martin Networking TSP GBB Kevin Lopez ER Partner Sales Executive GBB Jaime Schmidtke ER Partner Sales Executive GBB Eddie Villalba Networking and Open Source TSP GBB Bryan Woodworth Networking TSP GBB

2 Before we get started Welcome customers and partners!!! Material is public information No NDA info here. Use the IM window for questions. Sessions are recorded and posted here :

3 Microsoft Networking Academy Introductory Sessions (200 level) Quick overview or what s new this week (5-10 minutes) Partner Spotlight of the week (35-45 minutes) Q&A (10 minutes) Deep Dive Sessions ( level) Short introduction (5 minutes) Deeper dive topic of the week (35-45 minutes) Q&A (10 minutes) GBB-ANF@microsoft.com to receive detailed schedules for upcoming sessions! Available on Channel 9!

4 Agenda for May 26 th, 2017 Episode #9 Intro Networking from 0-60 Partner Spotlight Security in the Azure cloud using Palo Alto Network s virtual appliances Ask the Experts Q&A

5

6 Seattle Silicon Valley Los Angeles Dublin Toronto Montreal Chicago Quebec City Chicago New York Newport, Wales New York City Washington DC London Las Vegas Washington DC Dallas Dallas US Atlanta Government Germany Berlin Amsterdam Paris Frankfurt Chennai Beijing China ShanghaiOsaka Hong Kong Tokyo Mumbai Singapore Sao Paulo Sydney Melbourne

7

8 Internet Internet Internet Internet Azure load balancer Azure load balancer Azure load balancer Azure load balancer FW FW FW FW FW FW IIS IIS SQL Azure load balancer Azure load balancer Azure load balancer IIS IIS IIS IIS IIS IIS ExpressRoute SQL SQL ExpressRoute SQL Virtual Network Virtual Network Virtual Network Virtual Network Azure subscription Access Control Azure subscription Access Control Azure Active Directory Azure subscription Access Control

9

10

11 Partner Spotlight Palo Alto Networks

12 PALO ALTO NETWORKS NEXT-GENERATION SECURITY PLATFORM

13 Mission To protect our way of life in the digital age by preventing successful cyber attacks. 14

14 Strategic Direction To be the leading independent security company by building the world s most innovative and effective security platform. 15

15 Q2 FY17 Highlights 15,500+ Wildfire Customers 40, Traps Customers More than 1M Nodes Protected 35,000 30,000 25,000 20,000 2,500+ VM-Series Customers 15,000 10,000 5,000-16

16 What s changed? THE EVOLUTION OF THE ATTACKER CYBERCRIME NOW $445 billion industry CYBER WARFARE 100+ nations , Palo Alto Networks. Confidential and Proprietary.

17 Organizational risk What s changed? THE EVOLUTION OF THE ATTACK Mobility threat Identity compromise Zero-day exploits / vulnerabilities Unknown & polymorphic malware Evasive command-and-control Known threats , Palo Alto Networks. Confidential and Proprietary.

18 Failure of legacy security architectures Limited visibility Lacks correlation Manual response DNS protection for outbound DNS DNS protection cloud Endpoint AV Enterprise Network UTM/Blades Anti-APT for port 25 APTs Anti-APT for port 80 APTs Internet Anti-APT cloud Network AV DNS Alert SMTP Alert Web Alert AV Alert Endpoint Alert DNS Alert SMTP Alert AV Alert Endpoint Alert Web Alert AV Alert DNS Alert Web Alert Vendor 1 Vendor 2 Vendor 3 Vendor 4 Internet Connection Malware Intelligence , Palo Alto Networks. Confidential and Proprietary.

19 Requirements for the future DETECT AND PREVENT THREATS AT EVERY POINT ACROSS THE ORGANIZATION Cloud At the mobile device At the internet edge Between employees and devices within the LAN At the data center edge, and between VM s Within private, public and hybrid clouds , Palo Alto Networks. Confidential and Proprietary.

20 Delivering continuous innovation Aperture WildFire Threat Prevention URL Filtering AutoFocus Traps GlobalProtect , Palo Alto Networks. Confidential and Proprietary.

21 A complete security architecture Public cloud Private Cloud Enterprise network , Palo Alto Networks. Confidential and Proprietary.

22 Security: A Shared Responsibility Customer content Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customers are responsible for their security IN the cloud Encryption Key Management Client & Server Encryption Network Traffic Protection Cloud Infrastructure & Services Compute Storage Database Networking Azure looks after security OF the cloud

23 VM-Series for Microsoft Azure

24 Deployment Use Cases Protect your Azure deployment just as you would your data center Hybrid Segmentation Internet Gateway Remote Access Securely deploy applications in your data center or in the cloud Separate data and applications for compliance and security Protect Internet facing applications Security consistency for your network, your cloud, and your devices

25 Licensing Models: BYOL or PAYG Subscription? Bring your own license (BYOL) Pay as you go (PAYG) Best suited for: Long running, steady-state deployments that may scale over time Comparable to: Buy Rent Costs? CapEx (initial purchase in year 1) Opex (annual renewal after that) Supported environments Licensing, Subscription, Support options? US Gov. Support? All hypervisors supported - move licenses between any supported hypervisor or public cloud Use any combination of capacity SKU (VM- 100, -200, -300, HV), subscriptions and support Yes. Federal Agencies can purchase USG support for the VM-Series On-demand, utility-style, elastic deployments Fixed rate for duration of use, initial annual license and subsequent renewal. OPEX Azure only Bundle 1 or Bundle 2 with no option to mix and match licenses, subscriptions or support programs No. Premium support is included with both bundles; no option to purchase USG Pricing flexibility? High volume purchase discounts apply Fixed pricing in Azure Marketplace: Azure - hourly subscription for Bundle 1 or Bundle 2. No annual option , Palo Alto Networks. Confidential and Proprietary.

26 The VM-Series ELA The VM-Series ELA is an unbounded subscription based model that includes a specific VM-Series model, VM Panorama, subscriptions and support into a single, easy to order and easy to deploy bundle Term VM-Series Support and updates VM-Panorama Subscriptions Launched worldwide in November 2016 Based on existing and projected use of VM-Series firewalls One ELA per model Designed to incent fast adoption Unbounded with no true up within term Designed to account for customer ramp 1 and 3 Year term options Works in all supported environments ~$150k list price is target minimum* New *Minimum still being finalized , Palo Alto Networks. Confidential and Proprietary.

27 What are the benefits of the VM-Series ELA? Consistent security on all supported platforms Cost savings as more of the platform is utilized Predictable opex even if deployments happen faster than planned No true ups and ability to reset plan at term end Greatly simplifies operations with single auth code (vs. 100 s to 1,000 s) , Palo Alto Networks. Confidential and Proprietary.

28 in VNET / User Defined Routes Introduction

29 Zero Trust Assume that no user, interface, application, etc. is automatically trusted Segment the network and force all traffic through a control point for inspection. The cloud makes this easier to do at scale

30 MGMT Private IP: MGMT Subnet: /24 VNET setup in Azure Untrust Private IP: Untrust Subnet: /24 Trust Private IP: Trust Subnet: /24 DMZ Private IP: DMZ Subnet: /24 NAT Private IP: NAT Subnet: /24 Internal-LB Private IP: Internal-LB Subnet: /24 WEB Private IP: WEB Subnet: /24

31 MGMT Private IP: MGMT Subnet: /24 How new VNETers think VNETs work Untrust Private IP: Untrust Subnet: /24 MGMT Subnet: /24 Untrust Subnet: /24 Trust Private IP: Trust Subnet: /24 DMZ Subnet: /24 Trust Subnet: /24 DMZ Subnet: /24 DMZ Private IP: NAT Private IP: NAT Subnet: /24 NAT Subnet: /24 WEB Subnet: /24 Internal-LB Subnet: /24 Internal-LB Private IP: WEB Subnet: /24 NAT Private IP: Internal-LB Subnet: /24 WEB Private IP: WEB Private IP:

32 How new VNETers think VNETs work MGMT Subnet: /24 Untrust Subnet: /24 Trust Subnet: / DMZ Subnet: / NAT Subnet: /24 WEB Subnet: /24 NAT Private IP: Internal-LB Subnet: /24 WEB Private IP:

33 How new VNETers think VNETs work MGMT Subnet: /24 Untrust Subnet: /24 Trust Subnet: / DMZ Subnet: / NAT Subnet: /24 WEB Subnet: /24 NAT Private IP: Internal-LB Subnet: /24 WEB Private IP:

34 How new VNETers think VNETs work MGMT Subnet: /24 Untrust Subnet: /24 Trust Subnet: / DMZ Subnet: / NAT Subnet: /24 WEB Subnet: /24 NAT Private IP: Internal-LB Subnet: /24 WEB Private IP:

35 How VNETs ACTUALLY work MGMT Subnet: /24 Untrust Subnet: /24 Trust Subnet: /24 DMZ Subnet: /24 NAT Subnet: /24 WEB Subnet: /24 Internal-LB Subnet: /24 NAT Private IP: WEB Private IP:

36 User Defined Routes- UDRs.4.4 MGMT Subnet: /24 Trust Subnet: /24 Untrust Subnet: /24 DMZ Subnet: /24 NAT Subnet: /24 WEB Subnet: /24 Internal-LB Subnet: /24 NAT Private IP: WEB Private IP:

37 User Defined Routes- UDRs.4.4 MGMT Subnet: /24 Trust Subnet: /24 Untrust Subnet: /24 DMZ Subnet: /24 NAT Subnet: /24 WEB Subnet: /24 Internal-LB Subnet: /24 NAT Private IP: WEB Private IP:

38 Basic Three-Tier Application

39 Typical Deployment Model Web Subnet: /24 Web Private IP: eth2 -> ethernet1/2 Private IP: Trust Subnet: /24 UDR: /0 -> Untrust Subnet: /24 Internet APP Subnet: /24 APP Private IP: DB Subnet: /24 eth1 -> ethernet1/1 Private IP: Public IP: User IP: DB Private IP: Customer DC Subnet: /16 Express Route Gateway Subnet: /28 Express Route / VPN Tunnel Private Peering

40 Web Private IP: Web Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> APP Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> eth2 -> ethernet1/2 Private IP: Trust Subnet: /24 UDR: /0 -> ,4 eth1 -> ethernet1/1 Private IP: Public IP: Typical Deployment Model UDRs Untrust Subnet: /24 UDR: /0 -> Internet UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /16 -> Express Route. Internet APP Private IP: DB Private IP: DB Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> Routing Table /0 -> /24-> /24-> /24-> /16 -> Express Route UDR Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24-> User IP: Customer DC Subnet: /16 Express Route Gateway Subnet: /28 Express Route / VPN Tunnel Private Peering

41 Web Private IP: Web Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> APP Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> eth2 -> ethernet1/2 Private IP: Trust Subnet: /24 UDR: /0 -> ,4 eth1 -> ethernet1/1 Private IP: Public IP: Typical Deployment Model Express Route Connection Untrust Subnet: /24 UDR: /0 -> Internet UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /16 -> Express Route. Internet APP Private IP: DB Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /16 -> UDR: /0 -> Routing Table /0 -> /24-> /24-> /24-> /16 -> eth1 -> ethernet1/1 Private IP: Express Route Gateway Subnet: /28 Express Route UDR Subnet: /24 UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24 -> UDR: /24-> DB Private IP: Routing Table /0 -> /24-> /24-> /24-> /24-> /16 -> eth2 -> ethernet1/2 Private IP: Domain Trust Subnet: /24 UDR: /0 -> Express Route Private Peering Customer DC Subnet: /16

42 Multi-IP Recommended Architectures

43 Base Infrastructure Egress /24 LB-Egress Untrust /24 Trust / AS-FW-Untrust AS-FW-Trust TCP/22 LB-Public INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 AS-FW-Trust IP-LB-Public User Internet TCP/22 AS-FW-Untrust IP-FW1-Egress IP-FW2-Egress Web /24 RT-Web LB-Web AS-Web INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust / /0 > /16 > /24 > Virtual Network /24 > Virtual Network /32 > Virtual Network HTTP/80 AS-Web INT-Web /2 VM-Web1 SNAT: INT-FWX-Trust DNAT: INT-Web /24 VM-Web2

44 Inbound Request Untrust /24 Trust /24 AS-FW-Untrust AS-FW-Trust LB-Public INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 IP-LB-Public User Internet TCP/22 AS-FW-Untrust IP-FW1-Egress IP-FW2-Egress Web /24 RT-Web LB-Web AS-Web Enable Floating IP INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust / /0 > /16 > /24 > Virtual Network /24 > Virtual Network /32 > Virtual Network HTTP/80 AS-Web INT-Web /2 VM-Web1 SNAT: INT-FWX-Trust DNAT: INT-Web /24 VM-Web2

45 Inbound Response Untrust /24 Trust /24 AS-FW-Untrust AS-FW-Trust LB-Public INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 IP-LB-Public User Internet TCP/22 AS-FW-Untrust IP-FW1-Egress IP-FW2-Egress Web /24 RT-Web LB-Web AS-Web Enable Floating IP The load balancer will transparently SNAT the outbound response to IP-LB-Public INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust / /0 > /16 > /24 > Virtual Network /24 > Virtual Network /32 > Virtual Network HTTP/80 AS-Web INT-Web /2 VM-Web1 SNAT: INT-FWX-Trust DNAT: INT-Web /24 VM-Web2

46 Outbound Request Egress /24 LB-Egress Untrust /24 Trust / AS-FW-Untrust AS-FW-Trust TCP/22 INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 AS-FW-Trust Enable Floating IP User Internet IP-FW1-Egress IP-FW2-Egress Web /24 RT-Web AS-Web INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust / /0 > /16 > /24 > Virtual Network /24 > Virtual Network /32 > Virtual Network INT-Web /2 VM-Web1 SNAT: INT-FWX-Untrust INT-Web /24 VM-Web2

47 Outbound Response Egress /24 LB-Egress Untrust /24 Trust / AS-FW-Untrust AS-FW-Trust TCP/22 INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 AS-FW-Trust User Internet IP-FW1-Egress IP-FW2-Egress Web /24 RT-Web AS-Web INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust / /0 > /16 > /24 > Virtual Network /24 > Virtual Network /32 > Virtual Network INT-Web /2 VM-Web1 SNAT: INT-FWX-Untrust INT-Web /24 VM-Web2

48 Health Probes Untrust /24 Trust /24 AS-FW-Untrust AS-FW-Trust LB-Public INT-FW1-Untrust /24 AS-FW VM-FW1 INT-FW1-Trust /24 LB-Egress IP-LB-Public TCP/22 AS-FW-Untrust TCP/22 AS-FW-Trust INT-FW2-Untrust /24 VM-FW2 INT-FW2-Trust /24 The Problem: Health checks always source from A virtual router can only route an IP address one direction

49 High Availability Notes

50 Challenges - Speed - Connectivity

51 Solutions (Hint: Think Cloudy ) - Use services with high reliability and redundancy - Scale out instead of up - Spread the risk

52 Templates

53 ARM template Two JSON files Build the entire resource group, or create specific resources You can use more to separate resources and make it modular ResGp1.parameters.json: User needs to fill in: VM size, username, password ResGp1.json: Main resources file { "$schema": " "contentversion": "", "parameters": { }, "variables": { }, "resources": [ ], "outputs": { } // user-assigned label or version number of the template file // declare stuff from the.parameters.json file // define static values you use repeatedly in the file // this is where you ask for stuff: VM, NIC, IP... can configure their properties // output of this deployment request sent to Azure } For more see:

54 Overview Review ARM template for deploying VM-Series vmseries.json and vmseries.parameters.json Deploy via Azure CLI azure group deployment create -g <ResourceGroup> -n <DeploymentName> \ f vmseries.json \ -e vmseries.parameters.json -v Monitor progress of deployment in Azure web portal and on CLI Play around the Azure portal: resource group, VNET, subnets, VM s Connect into VM-Series, configure DHCP on dataplane interfaces Review UDR route tables in Azure portal Learn basic debugging in Azure portal

55 Miscellaneous

56 Features Not Supported (Yet) (native) VM Monitoring Customers can create Azure PowerShell scripts to feed in DAGs for this VM Monitoring will be available in future as an addon component (scripts) similar to support for KVM/OpenStack

57 Questions?

58 Resources

59 Open Q&A

60 Thank you! Session recording will be posted shortly here

ExpressRoute Fridays. with the C+E Black Belts

ExpressRoute Fridays. with the C+E Black Belts ExpressRoute Fridays with the C+E Black Belts Olivier Martin (@omartin) Azure Networking Black Belt Kevin Lopez (@kevlopez) ER Partner Sales Executive Jaime Schmidtke (@jaimesc) ER Partner Sales Executive

More information

Microsoft Networking Academy

Microsoft Networking Academy Microsoft Networking Academy with the C+E Global Black Belts Olivier Martin (@omartin) Networking TSP GBB Kevin Lopez (@kevlopez) ER Partner Sales Executive GBB Jaime Schmidtke (@jaimesc) ER Partner Sales

More information

Microsoft Networking Academy

Microsoft Networking Academy Microsoft Networking Academy with the C+E Global Black Belts Olivier Martin (@omartin) Networking TSP GBB Kevin Lopez (@kevlopez) ER Partner Sales Executive GBB Jaime Schmidtke (@jaimesc) ER Partner Sales

More information

Microsoft Networking Academy

Microsoft Networking Academy Microsoft Networking Academy with the C+E Global Black Belts Olivier Martin (@omartin) Networking TSP GBB Kevin Lopez (@kevlopez) ER Partner Sales Executive GBB Jaime Schmidtke (@jaimesc) ER Partner Sales

More information

Microsoft Networking Academy

Microsoft Networking Academy Microsoft Networking Academy with the C+E Global Black Belts Olivier Martin (@omartin) Networking TSP GBB Jaime Schmidtke (@jaimesc) ExpressRoute Partners GBB Bryan Woodworth (@brwoodwo) Networking TSP

More information

Next-Generation Security Platform on Azure Reference Architecture

Next-Generation Security Platform on Azure Reference Architecture t n e g i l l e nt i ES UR T C E T I ARCH Next-Generation Security Platform on Azure Reference Architecture Release 2 February 2018 Contents. Introduction................................................

More information

ExpressRoute Fridays. with the C+E Black Belts

ExpressRoute Fridays. with the C+E Black Belts ExpressRoute Fridays with the C+E Black Belts Olivier Martin (@omartin) Azure Networking Black Belt Kevin Lopez (@kevlopez) ER Partner Sales Executive Jaime Schmidtke (@jaimesc) ExpressRoute Specialist

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move Onur Dogruoz Agenda Provide an introduction to Azure Infrastructure as a Service (IaaS) Walk through the Azure portal Help you understand role-based access control Engage in an overview of the calculator

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

VM-SERIES ON GOOGLE CLOUD DEPLOYMENT GUIDELINES

VM-SERIES ON GOOGLE CLOUD DEPLOYMENT GUIDELINES SERIES ON GOOGLE CLOUD DEPLOYMENT GUIDELINES Organizations are adopting Google Cloud Platform to take advantage of the same technologies that drive common Google services. Many business initiatives, such

More information

Nuts & Bolts of Networking in Azure. Pracheta Budhwar Technology Evangelist, Microsoft

Nuts & Bolts of Networking in Azure. Pracheta Budhwar Technology Evangelist, Microsoft Learn. Connect. Explore. Nuts & Bolts of Networking in Azure Pracheta Budhwar Technology Evangelist, Microsoft India @prachetab Agenda Must know concepts of networking on Azure Scenarios - Most commonly

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Check Point vsec for Microsoft Azure

Check Point vsec for Microsoft Azure Check Point vsec for Microsoft Azure Test Drive User Guide 2017 Check Point Software Technologies Ltd. All rights reserved Page 1 Learn More: checkpoint.com Content 1 INTRODUCTION... 3 2 TEST DRIVE OVERVIEW...

More information

Hybrid Cloud and Connecting to MS Azure

Hybrid Cloud and Connecting to MS Azure Hybrid Cloud and Connecting to MS Azure Michael Schofield, Sr. Global Solutions Architect November, 2016 2016 Equinix Inc. #EQIXAD16 Agenda Who is Equinix Cloud Technology Overview Hybrid Cloud Connecting

More information

Azure Compute. Azure Virtual Machines

Azure Compute. Azure Virtual Machines Azure Compute Azure Virtual Machines Virtual Machines Getting started Select image and VM size New disk persisted in storage Management portal Windows Server Boot VM from new disk >_ Scripting (Windows,

More information

The IBM Platform Computing HPC Cloud Service. Solution Overview

The IBM Platform Computing HPC Cloud Service. Solution Overview The IBM Platform Computing HPC Cloud Service Solution Overview Industry-leading workload management 20 years managing distributed scale-out systems with 2000+ customers in many industries High performance

More information

NGFWv and ASAv in Public Cloud

NGFWv and ASAv in Public Cloud and ASAv in Amazon Web Services (AWS) and Azure Jesper Rathsach jrathsac@cisco.com Consulting cybersecurity systems engineer, Cisco Systems 29 th August 2018 Introduktion til public cloud Overblik over,

More information

Building Interconnection 2017 Steps Taken & 2018 Plans

Building Interconnection 2017 Steps Taken & 2018 Plans Building Interconnection 2017 Steps Taken & 2018 Plans 2017 Equinix Inc. 2017 Key Highlights Expansion - new markets Launch - Flexible DataCentre Hyperscaler edge Rollout - IXEverywhere - SaaS, IoT & Ecosystems

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration Security: A Driving Force Behind Moving to the Cloud Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration 2017, Amazon Web Services, Inc. or its affiliates.

More information

NGFWv & ASAv in Public Cloud (AWS & Azure)

NGFWv & ASAv in Public Cloud (AWS & Azure) & in Public Cloud (AWS & Azure) Anubhav Swami, CCIE# 21208 Technical Marketing Engineer Your Speaker Anubhav Swami answami@cisco.com Technical Marketing Engineer 5 years in Cisco TAC 2 years in ASA BU

More information

PROTECT WORKLOADS IN THE HYBRID CLOUD

PROTECT WORKLOADS IN THE HYBRID CLOUD PROTECT WORKLOADS IN THE HYBRID CLOUD SPOTLIGHTS Industry Aviation Use Case Protect workloads in the hybrid cloud for the safety and integrity of mission-critical applications and sensitive data across

More information

Cybersecurity, Trade, and Economic Development

Cybersecurity, Trade, and Economic Development Cybersecurity, Trade, and Economic Development G7 ICT Priorities: Technology, Innovation, and the Global Economy UNCTAD E-Commerce Week Danielle Kriz Senior Director, Global Policy Palo Alto Networks April

More information

VPN Solutions for Zerto Virtual Replication to Azure. SoftEther Installation Guide

VPN Solutions for Zerto Virtual Replication to Azure. SoftEther Installation Guide VPN Solutions for Zerto Virtual Replication to Azure SoftEther Installation Guide VERSION 1.0 JULY 2017 Table of Contents 1. Overview... 2 1.1 Use Cases... 2 2. Proofs of Concept and Lab Usage... 2 2.1

More information

Sichere Applikations- dienste

Sichere Applikations- dienste Sichere Applikations- dienste Innovate, Expand, Deliver Manny Rivelo Für SaaS und traditionelle Service-Modelle EVP, Strategic Solutions Carsten Langerbein Field Systems Engineer c.langerbein@f5.com Es

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme LHC2384BU VMware Cloud on AWS A Technical Deep Dive Ray Budavari @rbudavari Frank Denneman - @frankdenneman #VMworld #LHC2384BU Disclaimer This presentation may contain product features that are currently

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways

Agenda. This Session: Azure Networking Basics, On-prem connectivity options DEMO Create VNET/Gateway Cost-estimation for VNET/Gateways Onur Dogruoz Agenda Previous Sessions: Introduction to Azure Infrastructure as a Service (IaaS), Azure portal, role-based access control (RBAC), calculator overview VM Types, Azure Hybrid Use Benefits(AHUB),

More information

Cross premise connectivity with Microsoft Azure & Windows Server. Rasmus Hald

Cross premise connectivity with Microsoft Azure & Windows Server. Rasmus Hald Cross premise connectivity with Microsoft Azure & Windows Server Rasmus Hald [Microsoft] @RasmusHaldDK Unique Azure value It all starts with networking Customer site Azure site S2S Connect. Session Demo

More information

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Automated Response in Cyber Security SOC with Actionable Threat Intelligence Automated Response in Cyber Security SOC with Actionable Threat Intelligence while its biggest weakness is lack of visibility: SOCs still can t detect previously unknown threats, which is a consistent

More information

A deep-dive into Azure Networking!

A deep-dive into Azure Networking! A deep-dive into Azure Networking! Karim Vaes Karim Vaes Former Azure MVP, Now TSP AppDev @ Microsoft or Cloud Solution Architect with a focus on Application Development on Azure @kvaes https://blog.kvaes.be/

More information

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview

Course Outline. Module 1: Microsoft Azure for AWS Experts Course Overview Course Outline Module 1: Microsoft Azure for AWS Experts Course Overview In this module, you will get an overview of Azure services and features including deployment models, subscriptions, account types

More information

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018 How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure Last Updated: May 16, 2018 Table of Contents How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure 1 Introduction

More information

THE ACCENTURE CYBER DEFENSE SOLUTION

THE ACCENTURE CYBER DEFENSE SOLUTION THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly

More information

Microsoft Azure Course Content

Microsoft Azure Course Content Cloud Computing Trainings @ STUCORNER & SHARPENCLOUD Microsoft Azure Course Content Lesson 1: Introduction to Azure 1. Overview of On-premise infrastructure 2. Transition from On-premise to datacenter

More information

Paloalto Networks PCNSA EXAM

Paloalto Networks PCNSA EXAM Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:

More information

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure VNS3 Configuration Quick Launch for first time VNS3 users in Azure Table of Contents Setup 3 Notes 9 Create a Static IP 12 Create a Network Security Group 14 Launch VNS3 from Marketplace 19 VNS3 Unencrypted

More information

MarkLogic Server. MarkLogic Server on Microsoft Azure Guide. MarkLogic 9 January, 2018

MarkLogic Server. MarkLogic Server on Microsoft Azure Guide. MarkLogic 9 January, 2018 MarkLogic Server on Microsoft Azure Guide 1 MarkLogic 9 January, 2018 Last Revised: 9.0-4, January, 2018 2018 MarkLogic Corporation. MarkLogic and the MarkLogic logo are trademarks or registered trademarks

More information

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Security Platform Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Enterprise Security Platform Core Value Proposition An Enterprise Security

More information

THE PLATFORM EQUINIX VISION

THE PLATFORM EQUINIX VISION THE PLATFORM EQUINIX VISION Build Here, and Go Anywhere SUMMARY Key trends are driving the need for a single interconnection platform for digital business On the Equinix global interconnection platform

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

Azure Everywhere. Brandon Murray, Cami Williams, David Haver, Kevin Carter, Russ Henderson

Azure Everywhere. Brandon Murray, Cami Williams, David Haver, Kevin Carter, Russ Henderson Azure Everywhere Brandon Murray, Cami Williams, David Haver, Kevin Carter, Russ Henderson Agenda Azure Everywhere Workshop Brief Overview of Azure Azure Infrastructure Azure DevOps SQL in Azure SharePoint

More information

One Planet. One Network. Infinite Possibilities.

One Planet. One Network. Infinite Possibilities. One Planet. One Network. Infinite Possibilities. IPv6 in the Global Crossing IP Network May 26, 2005 Ed Bursk, Vice President Government Global Crossing Overview Global Crossing was founded seven years

More information

Agenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra

Agenda Basecamp The Journey So Far Enhancements Into the Fear Zone Climbing The VM-Series Performance Peak New VM-Series Models and Licensing Best Pra SAI3317BES What s New in Palo Alto Networks VM-Series Integration with VMware NSX A Deep Dive VMworld 2017 Sudeep - Product Line Manager Sai - Product Marketing Content: Not for publication Agenda Basecamp

More information

Microsoft Azure for AWS Experts

Microsoft Azure for AWS Experts Microsoft Azure for AWS Experts OD40390B; On-Demand, Video-based Course Description This course provides an in-depth discussion and practical hands-on training of Microsoft Azure Infrastructure Services

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

EdgeConnect for Amazon Web Services (AWS)

EdgeConnect for Amazon Web Services (AWS) Silver Peak Systems EdgeConnect for Amazon Web Services (AWS) Dinesh Fernando 2-22-2018 Contents EdgeConnect for Amazon Web Services (AWS) Overview... 1 Deploying EC-V Router Mode... 2 Topology... 2 Assumptions

More information

Architecting Microsoft Azure Solutions (proposed exam 535)

Architecting Microsoft Azure Solutions (proposed exam 535) Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and

More information

Microsoft AZ-101 Exam

Microsoft AZ-101 Exam Volume: 124 Questions Topic 1: Humongous Insurance 7 Questions Topic 2: Contoso Case Study A 5 Questions Topic 3: Mix Questions 108 Questions Topic 4: Contoso Case Study B 4 Questions Topic 1, Humongous

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 70-533 Title : Implementing Microsoft Azure Infrastructure Solutions Vendor : Microsoft Version : DEMO Get

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Getting started with Oracle Cloud Infrastructure Level 100

Getting started with Oracle Cloud Infrastructure Level 100 Getting started with Oracle Cloud Infrastructure Level 100 Rohit Rahi November 2018 1 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information

More information

CloudEdge Deployment Guide

CloudEdge Deployment Guide Hillstone Networks, Inc. CloudEdge Deployment Guide Version 5.5R3P1 Copyright 2016Hillstone Networks, Inc.. All rights reserved. Information in this document is subject to change without notice. The software

More information

Lab Guide. Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501

Lab Guide. Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501 Barracuda NextGen Firewall F-Series Microsoft Azure - NGF0501 Lab Guide Official training material for Barracuda certified trainings and Authorized Training Centers. Edition 2018 Revision 1.0 campus.barracuda.com

More information

Firebox Cloud. Deployment Guide. Firebox Cloud for AWS and Microsoft Azure

Firebox Cloud. Deployment Guide. Firebox Cloud for AWS and Microsoft Azure Firebox Cloud Deployment Guide Firebox Cloud for AWS and Microsoft Azure About This Guide The Firebox Cloud Deployment Guide is a guide for deployment of a WatchGuard Firebox Cloud virtual security appliance.

More information

Networking Lecture 11

Networking Lecture 11 Networking Lecture 11 Deep.Azure@McKesson Zoran B. Djordjević @Zoran B. Djordjević, Nishava, Inc. 1 Azure Networking Azure provides a variety of networking capabilities: Connectivity between Azure resources:

More information

Grow Your Business & Expand Your Service Offerings

Grow Your Business & Expand Your Service Offerings Grow Your Business & Expand Your Service Offerings White Label Cloud PRIVATE LABEL HOSTING SOLUTIONS FOR MSP PARTNERS CREATE NEW MONTHLY RECURRING REVENUE Becoming a White Label Cloud Partner allows you

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

MEDIA KIT 2018 CLOUDSCENE.COM

MEDIA KIT 2018 CLOUDSCENE.COM MEDIA KIT 2018 CLOUDSCENE.COM THE WORLD'S LARGEST CLOUD DIRECTORY Founded by serial tech entrepreneur, Bevan Slattery, Cloudscene is the world's largest cloud directory and industry resource for the data

More information

SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE. Joey Lau 9 November 2017

SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE. Joey Lau 9 November 2017 SERVERS TO SERVICES HOW MICROSOFT AZURE CAN MODERNISE YOUR IT INFRASTRUCTURE Joey Lau 9 November 2017 jlau@infoxchange.org 1 Technology for social justice www.infoxchange.org Sign up for your $5000 Azure

More information

Introduction to Amazon Cloud & EC2 Overview

Introduction to Amazon Cloud & EC2 Overview Introduction to Amazon Cloud & EC2 Overview 2015 Amazon Web Services, Inc. and its affiliates. All rights served. May not be copied, modified, or distributed in whole or in part without the express consent

More information

Disclaimer CONFIDENTIAL 2

Disclaimer CONFIDENTIAL 2 Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Deploying and Using ArcGIS Enterprise in the Cloud. Bill Major

Deploying and Using ArcGIS Enterprise in the Cloud. Bill Major Deploying and Using ArcGIS Enterprise in the Cloud Bill Major Quick Survey Your role in your organization - Developer? - Cloud Admin? Already a cloud user Running Esri deployment on AWS Running Esri deployment

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

THE PLATFORM EQUINIX VISION

THE PLATFORM EQUINIX VISION THE PLATFORM EQUINIX VISION Build Here, and Go Anywhere SUMMARY Key trends are driving the need for a single interconnection platform for digital business On the Equinix global interconnection platform

More information

Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Portal

Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Portal Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Deploying and Provisioning the Barracuda Web Application Firewall Using the Azure Resource Manager

More information

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination

More information

Developer s Guide to Azure RemoteApp Hybrid Collection Deployment

Developer s Guide to Azure RemoteApp Hybrid Collection Deployment Developer s Guide to Azure RemoteApp Hybrid Collection Deployment ABSTRACT I. II. ABSTRACT AZURE REMOTEAPP 1. What is Azure RemoteApp? 2. How It Works Behind the Scene 3. Advantages of Azure RemoteApp

More information

How to Deploy the Barracuda Security Gateway in the New Microsoft Azure Management Portal

How to Deploy the Barracuda  Security Gateway in the New Microsoft Azure Management Portal How to Deploy the Barracuda Email Security Gateway in the New Microsoft Azure Management Portal This guide walks you through the steps to deploy and provision the Barracuda Email Security Gateway on Microsoft

More information

How to Configure Azure Route Tables (UDR) using Azure Portal and ARM

How to Configure Azure Route Tables (UDR) using Azure Portal and ARM How to Configure Azure Route Tables (UDR) using Azure Portal and ARM Azure Route Tables, or User Defined Routing, allow you to create network routes so that your F-Series Firewall VM can handle the traffic

More information

Lifesize Cloud-based Service Architecture. A comprehensive guide

Lifesize Cloud-based Service Architecture. A comprehensive guide Lifesize Cloud-based Service Architecture A comprehensive guide Reference Paper November 2017 A service built to provide a connected experience, running on a platform built to perform that s the Lifesize

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3060 PA-3050 PA-3020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large

More information

Palo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010

Palo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010 Palo Alto Networks Stallion Spring Seminar -Tech Track Peter Gustafsson, June 2010 About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and

More information

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Palo-Alto PCNSE7. Palo Alto Networks Certified Network Security Engineer.

Palo-Alto PCNSE7. Palo Alto Networks Certified Network Security Engineer. Palo-Alto PCNSE7 Palo Alto Networks Certified Network Security Engineer http://killexams.com/exam-detail/pcnse7 Answer: B, E (https://www.paloaltonetworks.com/documentation/60/panorama/panorama adminguide/se

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-5050 PA-5020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,

More information

Managed Hosting Services

Managed Hosting Services PRODUCT OVERVIEW Managed Hosting Services A Portfolio of Managed Hardware, Application and Monitoring Services Tailored to Your Unique IT Requirements 1 CenturyLink VoIP Solutions 2 PRODUCT OVERVIEW Managed

More information

Cloud Operations Using Microsoft Azure. Nikhil Shampur

Cloud Operations Using Microsoft Azure. Nikhil Shampur Cloud Operations Using Microsoft Azure Nikhil Shampur Agenda - Overview - ArcGIS Enterprise on Azure strategy - Deployment Options - What s new - 10.6-10.6.1 - Automation, Upgrades - Tips and Tricks -

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner

Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner Overview of IBM Cloud Services and Academic Initiatives Driving Better Student Outcomes from a Better Cloud and Technology Partner Lysa Banks Lead Architect and Program Manager for Industry Cloud Solutions

More information

Cloud Security Best Practices

Cloud Security Best Practices Cloud Security Best Practices Cohesive Networks - your applications secured Our family of security and connectivity solutions, VNS3, protects cloud-based applications from exploitation by hackers, criminal

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Palo Alto Networks PCNSE7 Exam

Palo Alto Networks PCNSE7 Exam Volume: 96 Questions Question: 1 Which three function are found on the dataplane of a PA-5050? (Choose three) A. Protocol Decoder B. Dynamic routing C. Management D. Network Processing E. Signature Match

More information

Feature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

Feature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Performance Feature *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS, antivirus

More information

40390: Microsoft Azure for AWS Experts

40390: Microsoft Azure for AWS Experts Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

Security & Management

Security & Management Common Identity Data Platform Security & Management Unified Development Category Azure Technology On-Premise Technology Hybrid Storage Azure Storage StorSimple Hybrid Backup & DR Azure Backup + Azure Site

More information

NOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave

NOAA TICAP. Robert Sears NOAA/OCIO/SDD/N-Wave NOAA TICAP Robert Sears NOAA/OCIO/SDD/N-Wave N-Wave Program N-Wave is a program of Federal and contract staff that manage the NOAA Enterprise Network known as N-Wave, and also supports/aligns and executes

More information

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Course AZ-100T01-A: Manage Subscriptions and Resources

Course AZ-100T01-A: Manage Subscriptions and Resources Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

Cogeco Peer 1 Mission Critical Cloud

Cogeco Peer 1 Mission Critical Cloud Cogeco Peer 1 Mission Critical Cloud Enterprise-ready, policy driven cloud Many IT and application development organizations have struggled to embrace the Cloud in a meaningful and beneficial way. To gain

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. VM-300 VM-200 VM-100 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information