XD Framework (XDF) Overview. For More Information Contact BlueSpace at Tel: (512) Web:

Size: px
Start display at page:

Download "XD Framework (XDF) Overview. For More Information Contact BlueSpace at Tel: (512) Web:"

Transcription

1 XD Framework (XDF) Overview For More Information Contact BlueSpace at Tel: (512) Web:

2 Contents 1 INTRODUCTION CASE STUDY PROBLEM STATEMENT SOLUTION XDF WHAT S IN THE BOX? XDF COMMON SERVICES XDF IDENTITY SERVICE XDF ORCHESTRATOR DEVELOPMENT ENVIRONMENT XDF BENEFITS COSTS DEVELOPMENT COST COMPONENTS DEPLOYMENT COST COMPONENTS OTHER COST CONSIDERATIONS XDF SERVICES XDF SETUP SERVICES XDF DEVELOPMENT SERVICES XDF SUPPORT SERVICES /11

3 1 Introduction The BlueSpace XD Framework (XDF) was created to rapidly deliver cross domain applications that are more capable, flexible, easier to certify and more secure than current cross domain applications. XDF incorporates technology called SmartXD. SmartXD is: An architecture for cross-domain applications, A technology platform for integration, A set of design principles, and A set of certification principles Traditional approaches to cross-domain applications result in tightly coupled stovepipe applications that are tied to a specific cross-domain solution (guard) and specific accreditations. SmartXD breaks apart these components into a specialized service oriented architecture designed for cross-domain environments. This approach has the following benefits: Reuse of existing applications. Cross-domain application development is enormously expensive and typically results in applications with fewer capabilities and much longer release cycles. SmartXD allows you to use existing COTS or GOTS applications in a cross-domain environment, including applications you already have in operation within each network. Guard independence. SmartXD applications can leverage any approved data guard, avoiding vendor lock-in and increasing the number of available options for fielding cross-domain applications. Already have a fielded data guard in operation? SmartXD can greatly reduce your cost and accreditation time by using the guard you already have. Enhanced user experience. SmartXD can take advantage of any operational environment, from a single high side desktop to a multi-level desktop spanning multiple domains, to provide the most seamless experience to your users. Rapid integration. SmartXD greatly accelerates solution development. See the Network Monitoring Case Study in this paper for more information. 3/11

4 2 Case Study A customer using an existing commercial network monitoring solution from SolarWinds ( wanted to extend their monitoring console to work across domains. Using XDF, BlueSpace added cross-domain capability to their solution without any changes to their commercial products or environment. 2.1 Problem Statement SolarWinds sell a networking monitoring solution called Orion and a network monitoring console called the Enterprise Operation Console (EOC). A single EOC can provide a dashboard view of multiple Orion instances running within different networks. The customer wished to extend their high side EOC to their low side Orion networks, but faced two seemingly insurmountable challenges. First, the EOC used proprietary communication protocols that were unsupported by UCDMO listed data guards. Second, in this customer s environment, the only available guard was a file transfer guard from the low domain to the high domain. Unfortunately the EOC is designed only to pull information from Orion servers. There is no capability to push information into an EOC from a file. The customer approached BlueSpace for potential solutions. 2.2 Solution BlueSpace was able to design and build a proxy Orion server in the high side network that represented the Orion server in the low side network. Using its SmartXD technology, BlueSpace was also able to quickly integrate with the low side Orion server, poll it for network status, and convert that information into a file format acceptable by the guard. The guard transfers this file to the high side network where the SmartXD Orion proxy server reads it. This proxy server maintains the information in a cache until the EOC polls for it. From the EOC s point of view it looks as it if is directly polling the low side Orion server. 4/11

5 High Domain SolarWinds EOC VM Smart XD Active Directory SolarWinds Orion Guard Smart XD VM SolarWinds Orion Active Directory Low Domains The XD framework has capabilities that helped: Handle network failure conditions Corrupted files Out of order or duplicate files Partial and full network status updates Data integrity checks Figure 1: XD Network Monitoring Use-Case Built using XDF, this solution is independent of the actual guard installed. In fact, the development team was not even told which guard was being used. The customer can move the solution to a different guard without changing the application. Furthermore, XDF offers the customer future advantages, such as the ability to directly launch low side Orion applications. 5/11

6 3 XDF What s In the Box? XDF includes the software and documentation to create robust, high performing, cross-domain applications that leverage COTS and GOTS applications on multiple security domains. 3.1 XDF Common Services XDF Common Services enable rapid integration of existing COTS and GOTS applications into cross-domain solutions: Configuration based upon standard Enterprise Integration Patterns (EIP) Cross-domain identity mapping Cross-domain application session management Secure application state transition validation Audit trail generation Cross-domain application monitoring Data masking capabilities to mask or replace sensitive data and optionally restore that data in response messages. Guard connectors that abstract the details of different guard connection management and communication implementations Protocol conversion for guards that do not natively support the application protocols (for example, SOAP web services or RESTful web services). Message exchange pattern conversion (for example, request-response message mapping to guard unidirectional threads) Content pre-validation that checks each cross-domain message prior to deliver to the guard to prevent misconfigured or misbehaving applications from unnecessarily loading a guard and possibly triggering a guard shutdown Volume and frequency filters Behavior filters XDF Common Services features an event processing engine that is easily configured to alter or extent the processing logic and to add or remove processing steps. Process flows are represented graphically as directed graphs, making process documentation, communication, training, testing, and certification much easier compared to logic embedded in program code. 3.2 XDF Identity Service The XDF Identity Service manages cross-domain identities and performs delegated authentication. Users often have different identities in different domains. Furthermore, crossdomain security policies often prohibit identities and credentials from being passed from one domain to another. The XDF Identity Service maps identities between different domains and facilitates delegated credentials. For example, a user wishing to perform a cross-domain federated search from one domain to another may need to first authenticate with the search services in the other domain. The XDF Identity Service provides a way to 6/11

7 map the cross-domain request to the correct local identity and authenticate to those services. 3.3 XDF Orchestrator Recently, client hypervisor technologies such as AFRL s SecureView have made it possible to access multiple networks from a single computer. In addition, products like SecureView contain windowing technology that allows applications running in different domains to reside on a single desktop. XDF Orchestrator is a technology that orchestrates applications running in different domains as if they were a single seamless multilevel application, but without any actual trusted application code or multi-level data storage. Figure 2: XD Orchestrator Example In Figure 2, XDF Orchestrator is used to launch low side browsers onto search results displayed in a single high-side window. No URLs or web pages are actually passed between domains. XDF Orchestrator replaces search results returned to the high side with unique numbers and then restores the actual URLs on the low side when a user clicks to open an item. The desktop allows windows from different domains to appear on the same desktop on the same screen. The result appears to be a seamless multi-level search capability but is in fact are separate single level applications controlled by XDF Orchestrator. 3.4 Development Environment XDF works in any standard Java environment. Apache Maven. BlueSpace uses Eclipse and 7/11

8 4 XDF Benefits SmartXD applications developed using XDF offer a number of benefits over traditional, guard specific, point solutions. Those benefits include the following: 1. Accelerate Adoption of Cloud and Tagged Data work seamlessly with cloud environments, tagged data and existing environments. 2. Flexible and Non-Disruptive plug n play with guards and make existing applications cross domain capable. 3. Accelerate Capability Delivery lower the cost, time and risk to deliver solutions. 4. Simplify Certification lower the cost, time and risk of C&A by leveraging existing guards and cross domain guard services. 5. Extendable add new data sources, data processing, user capabilities, information views, and integration points. 6. Improve Security intelligently process data to eliminate unnecessary duplication and transfer of complex data across domains. Cross domain transfers are limited to highly constrained XML. 7. Low TCO deploy on modern technologies that are easy to configure, deploy and manage in the cloud or on traditional networks. 8/11

9 5 Costs 5.1 Development Cost Components The cost components of XDF for development purposes are the following: 1. XDF License and Maintenance Fees the fees for SmartXD are typically small in comparison to the overall project. 2. Development and Test System HW / SW typically at least one development system and one test system. 3. Data guard this is required if operational testing is going to be performed on a production network. XDF provides a guard stub for development and testing on non-production networks. 4. Setup and Support Services this is required if development and / or testing are going to be performed on premises other than BlueSpace. These services are for the install, training and developer support of XDF. 5. Development Services BlueSpace services to design, develop, and test the application. 6. Operational Test the license allows for an operational test in a production environment. If this is part of the development effort, the cost of resources and services to perform certification and support the operational test must be included. 5.2 Deployment Cost Components 1. Application Server HW / SW the necessary capacity needs to be in place to host the SmartXD application appliances in each of the security domains. 2. Data Guard HW / SW if an existing data guard with adequate capacity for the XML transfers does not exist, hardware and software will need to be purchased as part of the data guard deployment. 3. Deployment Services Services to deploy the applications and the data guard including supporting the ST&E process. 4. Data Guard Annual Maintenance Fees if an existing data guard is not being used, the fees for annual maintenance and support must be included. 5. Internal Resources resources to support the planning, deployment, operation and maintenance of the system must be included. 5.3 Other Cost Considerations SmartXD helps keep costs low. Consider the following: 1. SmartXD applications do not replace existing systems, they extend them to be cross domain capable. 9/11

10 2. SmartXD applications can be entirely browser based. No client code is required making it easy to deploy and maintain and well suited to cloud architectures. Users can use their applications from any workstation with a browser and system access. 3. SmartXD applications use any certified data guard. This means existing guards can be leveraged, different guards can be used and future guards can be installed without affecting the application or the user. 4. SmartXD applications are flexible (investment protection). They can support application data, traditional databases and tagged data. They can run on virtually any data guard. They can be deployed in the cloud. They can be easily extended. 5. SmartXD applications are easy to certify. They are deployed as PL2 virtual application appliances in each security domain. Typically PL4 certification requires only the approval of an XML schema which defines the cross domain traffic for each SmartXD application. 6. SmartXD applications are easy to manage. They are based on standard, modern technologies. Management functions are part of each SmartXD application including the ability to monitor SmartXD application appliance and connections to data guards and other applications. 10/11

11 6 XDF Services 6.1 XDF Setup Services BlueSpace provides a set of setup services that include the following: 1. Install XDF 2. SmartXD Architecture and Design Training 3. SmartXD Application Development Training 4. SmartXD Build Environment Training 5. SmartXD Joint Development and Support Training 6.2 XDF Development Services Typically BlueSpace will leverage its expertise and resources to develop or assist in the development of the application. In the case of a joint effort, BlueSpace will work with the government to establish a joint development process. The BlueSpace development process is an iterative, agile process supported by a set of open source tools that enable full process support from requirements capture to testing and validation. 6.3 XDF Support Services BlueSpace provides 5 x 10 remote technical and developer support. 11/11

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE Table of Contents Component Design: VMware Identity Manager Architecture Design Overview VMware Identity Manager Connector

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

Presentation Title 11/13/2013

Presentation Title 11/13/2013 Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013

More information

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009

High Assurance Platform (HAP) High Assurance Challenges. Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 High Assurance Platform (HAP) High Assurance Challenges Rob Dobry Trusted Computing NSA Commercial Solutions Center 04 & 05 August 2009 What is HAP? HAP is being developed to provide users with two primary

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

7 Things ISVs Must Know About Virtualization

7 Things ISVs Must Know About Virtualization 7 Things ISVs Must Know About Virtualization July 2010 VIRTUALIZATION BENEFITS REPORT Table of Contents Executive Summary...1 Introduction...1 1. Applications just run!...2 2. Performance is excellent...2

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

Increase user productivity and security by integrating identity management and enterprise single sign-on solutions.

Increase user productivity and security by integrating identity management and enterprise single sign-on solutions. Security management solutions White paper Increase user productivity and security by integrating identity management and enterprise single sign-on solutions. April 2006 2 Contents 2 Overview 3 Rely on

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

Build application-centric data centers to meet modern business user needs

Build application-centric data centers to meet modern business user needs Build application-centric data centers to meet modern business user needs Citrix.com Table of contents Meeting current business challenges...3 Device package integration...5 Policy-based service insertion...6

More information

ENTERPRISE MOBILE APPLICATION DEVELOPMENT WITH WAVEMAKER

ENTERPRISE MOBILE APPLICATION DEVELOPMENT WITH WAVEMAKER ENTERPRISE MOBILE APPLICATION DEVELOPMENT WITH WAVEMAKER Abstract This whitepaper talks about the requirements of modern day Enterprise Mobile Applications and how WaveMaker can simplify and speed up the

More information

TRANSFORM YOUR NETWORK

TRANSFORM YOUR NETWORK TRANSFORM YOUR NETWORK SIMPLIFY MODERNIZATION WITH AN INNOVATIVE ECOSYSTEM OF CERTIFIED SOLUTIONS AND PARTNERS TELECOMMUNICATIONS ECOSYSTEM E-BOOK TABLE OF CONTENTS Adapt to growing network demand...3

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

BUILDING the VIRtUAL enterprise

BUILDING the VIRtUAL enterprise BUILDING the VIRTUAL ENTERPRISE A Red Hat WHITEPAPER www.redhat.com As an IT shop or business owner, your ability to meet the fluctuating needs of your business while balancing changing priorities, schedules,

More information

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.

More information

The Modern Web Access Management Platform from on-premises to the Cloud

The Modern Web Access Management Platform from on-premises to the Cloud The Modern Web Access Management Platform from on-premises to the Cloud Single Sign On, Access Controls, Session Management and how to use Access Management to protect applications both on premises and

More information

Solution Brief: Commvault HyperScale Software

Solution Brief: Commvault HyperScale Software Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Exam C Foundations of IBM Cloud Reference Architecture V5

Exam C Foundations of IBM Cloud Reference Architecture V5 Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

SolarWinds Orion Platform Scalability

SolarWinds Orion Platform Scalability TECH TIPS SolarWinds Orion Platform Scalability SolarWinds provides enterprise-class infrastructure management software designed to help manage and monitor data centers and IT infrastructure. With products

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

Introducing IBM WebSphere CloudBurst Appliance and IBM WebSphere Application Server Hypervisor Edition

Introducing IBM WebSphere CloudBurst Appliance and IBM WebSphere Application Server Hypervisor Edition Introducing IBM WebSphere CloudBurst Appliance and IBM WebSphere Application Server Hypervisor Edition Reduced cost and time-to-value; increased correctness and agility R.Vinoth Industry Solution Architect

More information

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize

More information

AWS Reference Design Document

AWS Reference Design Document AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South

More information

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

Quest vworkspace. What s New. Version 7.5

Quest vworkspace. What s New. Version 7.5 Quest vworkspace What s New Version 7.5 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described in this

More information

Jitterbit is comprised of two components: Jitterbit Integration Environment

Jitterbit is comprised of two components: Jitterbit Integration Environment Technical Overview Integrating your data, applications, and other enterprise systems is critical to the success of your business but, until now, integration has been a complex and time-consuming process

More information

Private Cloud Database Consolidation Name, Title

Private Cloud Database Consolidation Name, Title Private Cloud Database Consolidation Name, Title Agenda Cloud Introduction Business Drivers Cloud Architectures Enabling Technologies Service Level Expectations Customer Case Studies Conclusions

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

Smarter Business Agility with WebSphere DataPower Appliances Introduction

Smarter Business Agility with WebSphere DataPower Appliances Introduction Mike Masterson Worldwide Executive WebSphere Appliances 14 October 2010 Smarter Business Agility with WebSphere DataPower Appliances Introduction Smarter Business Agility with WebSphere DataPower Appliances

More information

White Paper. Why Remake Storage For Modern Data Centers

White Paper. Why Remake Storage For Modern Data Centers White Paper Why Remake Storage For Modern Data Centers Executive Summary Managing data growth and supporting business demands of provisioning storage have been the top concern of IT operations for the

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Problem Manager Release 1.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Oracle Identity and Access Management

Oracle Identity and Access Management Oracle Identity and Access Management AGENDA Overview Features Components Customizations APIs Oracle Identity Manager Connectors High Availability Concepts High Availability Architecture OVERVIEW Identity

More information

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement AppController 2.6 2014-03-18 13:21:56 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents AppController 2.6... 6 About This Release... 8 Getting Started...

More information

Enabling Red Hat Virtualization for the Hybrid Cloud

Enabling Red Hat Virtualization for the Hybrid Cloud Enabling Red Hat Virtualization for the Hybrid Cloud RHV 4 integration with CloudForms and Ansible Scott Herold Director, Product Management - Virtualization Business Red Hat Forum Israel November 2016

More information

Cisco Cloud Application Centric Infrastructure

Cisco Cloud Application Centric Infrastructure Cisco Cloud Application Centric Infrastructure About Cisco cloud application centric infrastructure Cisco Cloud Application Centric Infrastructure (Cisco Cloud ACI) is a comprehensive solution for simplified

More information

MASERGY S MANAGED SD-WAN

MASERGY S MANAGED SD-WAN MASERGY S MANAGED New Performance Options for Hybrid Networks Business Challenges WAN Ecosystem Features and Benefits Use Cases INTRODUCTION Organizations are leveraging technology to transform the way

More information

Mediaocean Aura Technical Overview

Mediaocean Aura Technical Overview Mediaocean Aura Technical Overview January 2017 Samir Sadikhov +61 (2) 9879 8200 apac_operations@mediaocean.com Contents INTRODUCTION... 2 APPLICATION ARCHITECTURE OVERVIEW... 3 DATA LAYER...3 APPLICATION

More information

ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM

ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM JOINT SOLUTION BRIEF ENHANCE APPLICATION SCALABILITY AND AVAILABILITY WITH NGINX PLUS AND THE DIAMANTI BARE-METAL KUBERNETES PLATFORM DIAMANTI PLATFORM AT A GLANCE Modern load balancers which deploy as

More information

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810 Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

BUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite

BUILDING A PATH TO MODERN DATACENTER OPERATIONS. Virtualize faster with Red Hat Virtualization Suite BUILDING A PATH TO MODERN DATACENTER OPERATIONS Virtualize faster with Red Hat Virtualization Suite TABLE OF CONTENTS Modernize your IT with virtualization....page 2 Red Hat Virtualization Suite overview....page

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions Corporate Headquarters 2821 Mission College Blvd. Santa Clara, CA 95054 USA Application Server CPU CPU Core Database Database Instance Entity File Submission Daily

More information

Convergence is accelerating the path to the New Style of Business

Convergence is accelerating the path to the New Style of Business Convergence is accelerating the path to the New Style of Business HP Hyper-Converged Systems Franz Weberberger Presales Consultant HP Servers Copyright 2012 Hewlett-Packard Development Company, L.P. The

More information

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Copyright 2011, Oracle and/or its affiliates. All rights reserved. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief

Innovative Solutions. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Solutions. Technology Brief Innovative. Trusted Performance. Intelligently Engineered. Comparison of SD WAN Technology Brief Comparison of SD WAN SD-WAN Overview By the end of 2019, 30% of enterprises will use SD-WAN products in

More information

Certeon s acelera Virtual Appliance for Acceleration

Certeon s acelera Virtual Appliance for Acceleration Certeon s acelera Virtual Appliance for Acceleration Product Brief Dr. Jim Metzler Ashton, Metzler & Associates Rolf McClellan McClellan Consulting June 2008 Certeon s acelera Virtual Appliance for Acceleration

More information

The Now Platform Reference Guide

The Now Platform Reference Guide The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service

More information

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5 Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Incident Manager Release 1.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

Easily Managing Hybrid IT with Transformation Technology

Easily Managing Hybrid IT with Transformation Technology White Paper White Paper Managing Public Cloud Computing in the Enterprise Easily Managing Hybrid IT with Transformation Technology A Quick Start Guide 1 Table of Contents Abstract... 3 Traditional Approaches

More information

THE FUTURE IS HYBRID. Patrick Harr. Global Vice President, Cloud Strategy and Solutions Hewlett-Packard Company

THE FUTURE IS HYBRID. Patrick Harr. Global Vice President, Cloud Strategy and Solutions Hewlett-Packard Company THE FUTURE IS HYBRID Patrick Harr Global Vice President, Cloud Strategy and Solutions Hewlett-Packard Company 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service

VMWARE HORIZON 7. End-User Computing Today. Horizon 7: Delivering Desktops and Applications as a Service DATASHEET VMWARE 7 AT A GLANCE 7 delivers virtualized or hosted desktops and applications through a single platform to end users. These desktop and application services including Remote Desktop Services

More information

Iron Networks, Inc. Turnkey Converged Infrastructure-as-a-Service Platforms

Iron Networks, Inc. Turnkey Converged Infrastructure-as-a-Service Platforms Iron Networks, Inc. Turnkey Converged Infrastructure-as-a-Service Platforms Iron Networks builds turnkey converged cloud infrastructure platforms on industry-standard hardware that are optimized for faster,

More information

Bringing DevOps to Service Provider Networks & Scoping New Operational Platform Requirements for SDN & NFV

Bringing DevOps to Service Provider Networks & Scoping New Operational Platform Requirements for SDN & NFV White Paper Bringing DevOps to Service Provider Networks & Scoping New Operational Platform Requirements for SDN & NFV Prepared by Caroline Chappell Practice Leader, Cloud & NFV, Heavy Reading www.heavyreading.com

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back

BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE. These Common Misconceptions Could Be Holding You Back BUSTED! 5 COMMON MYTHS OF MODERN INFRASTRUCTURE These Common Misconceptions Could Be Holding You Back 2 IT Is Facing a New Set of Challenges As technology continues to evolve, IT must adjust to changing

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

What s New in VMware vcloud Automation Center 5.1

What s New in VMware vcloud Automation Center 5.1 What s New in VMware vcloud Automation Center 5.1 Feature Overview Technical White paper october 2012 Table of Contents vcloud Automation Center Overview.... 3 VMware vsphere 5.1 Support.... 3 VMware vcloud

More information

Enterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours.

Enterprise Private Cloud. Fully managed private cloud as a service in your data centre or ours. Enterprise Private Cloud Fully managed private cloud as a service in your data centre or ours. Introduction With the proliferation of applications over a multitude of platforms, demand for high-availability

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Technical Overview. Elastic Path Commerce

Technical Overview. Elastic Path Commerce Technical Overview Elastic Path Commerce Extensible, Easy-to-Integrate, Scalable and More 7 Reasons Why Elastic Path Commerce Is The Best Fit For Your Unique Business 1. API is the Core of Digital Commerce

More information

Switch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp

Switch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp Switch to Parallels Remote Application Server and Save 60% Compared to Citrix XenApp White Paper Parallels Remote Application Server 2017 Table of Contents Executive Summary... 3 Introduction... 4 Who

More information

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response

More information

Introduction and Datacenter Topology For Your System

Introduction and Datacenter Topology For Your System Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

Introduction and Data Center Topology For Your System

Introduction and Data Center Topology For Your System Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 10 (2.1.2.1.0) E14542-01 April 2009 Microsoft Active Directory, which is included with Microsoft

More information

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com

More information

The journey to the cloud often begins with consolidation and virtualization as first steps. Rapid virtualization deployment for private clouds

The journey to the cloud often begins with consolidation and virtualization as first steps. Rapid virtualization deployment for private clouds loud computing Rapid virtualization deployment for private clouds y Marc Stitt and Deepak Kanwar Many IT decision makers are stepping up virtualization efforts to cost-effectively pave the way toward a

More information

Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service

Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service E85144-11 April 2018 Oracle Cloud Getting Started with Oracle WebCenter Portal Cloud Service, E85144-11 Copyright 2017, 2018, Oracle

More information

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authority Integration with JCCH You can find the most up-to-date technical documentation

More information

Going cloud-native with Kubernetes and Pivotal

Going cloud-native with Kubernetes and Pivotal Going cloud-native with Kubernetes and Pivotal A guide to Pivotal Container Service (PKS) by role Fast, low-risk enterprise-grade Kubernetes has arrived With Pivotal Container Service (PKS), organizations

More information

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS Managing the Complexity of IT Modernization Constructing and modernizing a new campus is a complex undertaking, requiring

More information

Deploying Cisco SD-WAN on AWS

Deploying Cisco SD-WAN on AWS How to Guide Deploying Cisco SD-WAN on AWS Introduction: Why use an SD-WAN solution for the cloud? Organizations leveraging branch office locations, IoT devices, and distributed network devices face a

More information

PEACHTECH PEACH API SECURITY AUTOMATING API SECURITY TESTING. Peach.tech

PEACHTECH PEACH API SECURITY AUTOMATING API SECURITY TESTING. Peach.tech PEACH API SECURITY AUTOMATING API SECURITY TESTING Peach.tech Table of Contents Introduction... 3 Industry Trends... 3 API growth... 3 Agile and Continuous Development Frameworks... 4 Gaps in Tooling...

More information

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: UNIFIED ACCESS GATEWAY ARCHITECTURE Table of Contents Component Design: Unified Access Gateway Architecture Design Overview Network Deployment Options Authentication

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information

Multi-Domain exchange (MDeX) System

Multi-Domain exchange (MDeX) System Multi-Domain exchange (MDeX) System Cross Domain (aka Assured Information Sharing) for Tactical Coalition, Disaster Recovery, and Service-Based Assured Information Sharing Insert Your Name Insert Your

More information

by Cisco Intercloud Fabric and the Cisco

by Cisco Intercloud Fabric and the Cisco Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted

More information

Service Description VMware Workspace ONE

Service Description VMware Workspace ONE VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described

More information

SailPoint IdentityIQ 6.4

SailPoint IdentityIQ 6.4 RSA Ready Implementation Guide for Administrative Interoperability Partner Information Last Modified: May 13, 2015 Product Information Partner Name SailPoint Web Site www.sailpoint.com Product Name IdentityIQ

More information

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

How Security Policy Orchestration Extends to Hybrid Cloud Platforms How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com

More information

Migrating a Business-Critical Application to Windows Azure

Migrating a Business-Critical Application to Windows Azure Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,

More information