IBM Watson Content Hub. Architecture Overview

Size: px
Start display at page:

Download "IBM Watson Content Hub. Architecture Overview"

Transcription

1 IBM Watson Content Hub Architecture Overview

2 Watson Content Hub supports a new omni-channel approach with a headless CMS Treat content as a system of record Separated content & presentation Access content via rich REST APIs Deliver consistent content across all customer touchpoints Web Sites and Mobile Web Web Applications, Single Page Apps Mobile Applications Internet of things

3 What you get with Watson Content Hub Authoring Interface Asset management Content management Cognitive tagging Image profiles Authoring APIs for content, content model, and assets Command line client Code samples Global PAYG Platform Akamai CDN included Watson services included Pay for asset storage GB and data transfer GB overage or up-front purchase 99.9% uptime SLA Worldwide Delivery of Assets and Content Akamai delivery of assets and web application resources Delivery APIs for content Powerful search API based on SOLR Code samples

4 With a traditional CMS, a single data store is used for both authoring (read/write) and delivery (read) Read/write Read Information Architects Content Authors Designers Business Owners Data Model Users

5 With Watson Content Hub, the publishing engine generates optimized content on CDN and in a dedicated delivery data store Authoring System Delivery System Read/write Read Information Architects Content Authors Designers Business Owners Authoring Data Model Delivery Data Model CDN Replication Caching Users Worldwide availability

6 Authoring Authoring APIs Delivery Customer Experience WCH Architecture Overview Essentials Edition Standard Edition Custom apps , Devices etc WCH-hosted SPA Akamai CDN Assets Developer assets Site SPA Delivery APIs Search index Content Pages Authoring UI Content/Asset Mgmt Site Management Publishing Content Repository Assets Schedulin g Developer assets Site SPA Data replication for DR/HA IBM ID Content Search index Pages Mata-data enhancement Customer Repository 6 wchtools

7 Delivery via Content Deliver Network IBM World wide distribution/ replication Efficient routing Fast load time for end users Cache control Request Transformation Metering/Billing Security (including DOS protection)

8 Using IBM Watson Content Hub services Samples Fully-documented APIs on developer.ibm.com/api Sample API usage Swagger API documentation Authoring and delivery API IBM Live samples site:

9 Sites Watson Content Hub Standard Edition includes site management and delivery support. The Oslo out-of-the-box starter site provides a rich, modern, Angular 4 based site template. Customize the site with new styles, layouts and content types. Site support builds on top of all the content and asset services and CDN delivery. All site content can be reused in

10 Architecture of a Watson Content Hub site A WCH site consists of two high-level pieces: 1. Site application An Angular 4 application hosted on the Akamai CDN provided with WCH Customized by a web developer working with HTML, CSS, and JavaScript Application source is managed by the web developer in GitHub/etc. Uses an SDK library that provides optimized access to Watson Content Hub services 2. Site content Includes the site page structure, the site content and images, the content model, and the choices for layouts and styles for the site Site content is created and managed by non-developers in the Watson Content Hub user interface 10

11 Architecture of a Watson Content Hub site Akamai CDN Site Application (Angular 4 application) Navigation support Layouts for content and pages Header and footer components CSS styles JS libraries Site images/resources WCH Cloud Services SDK Site Content Site structure and pages Content and assets Content model (content types, image profiles, categories) Front-end Developer Choice of Tooling Marketer or Content Specialist Business User Interface

12 Modern Micro-Services Architecture Engineered for Cloud. Secure, multi tenant micro service architecture that provides performance, auto scaling, monitoring, and metering IBM Micro Services Flexible, powerful content managed micro services allow content authoring, publishing and run-time componetns to be easily consumed, maintained, scaled, updated and perform to expectations Secure All customer logging/tracing information is encrypted, only the customer can read their data with dedicated encryption key. Data is also encrypted at REST calls per tenant and all communication is completed via HTTPs. Meets industry security norms (ISO27k) and can integrate with customer compliance practices. Resilient and High-Performing Built using Docker containers, robust data store in IBM Cloudant and access to secure WW IBM Data Centers customers can build content experiences that are delivered via Akamai and auto-scale to meet their business needs Extensible Customers and business partners to customize tooling (e.g. extending drop down options) or add-on functionality (e.g. additional editors) to providing specific added value. Power APIs and RESTful services allow integration into 3 rd party solutions Framework Agnostic Being framework and template agnostic allows for maximum flexibility for designers and developers. Native support for common solutions such as Bootstrap, Angular and Foundation with out of the box templates using Handlebar and Moustache Publishing A pluggable rendering framework allows customers the freedom and flexibility to publish their omni-channel content that will meet the channel needs by publishing content as full sites, single web pages, HTML Snippets, or though a Content as a Service (CaaS) model that renders customized JSON or XML

13 Modern Micro-Services Architecture Authoring and Authoring UI Publishing API Command Line Dev Tools End User UI Content Services API Akamai, Gateway, Dispatcher, Login Content, Types, Assets, Categories, Designs Shell UI Search Sites Page Assemblies Publishing Manager Core Publishing Rendering Preview File Storage Proxy File Access Search Content Access Targeted Content Content Model Content DAM Assets File Resources Configuration Content DAM Assets Generated HTML File Resources 13 Infrastructure Services Service Registry, Message Bus, Cloudant, Monitoring, Logging, Tenant & User Services, Configuration Service

14 Resilient and Scalable Infrastructure SaaS, cloud only and multi-tenant Delivered across multiple datacenters Worldwide distribution Integrated with content delivery networks Stateless, session-less micro-services Dynamic scaling of services Secure platform Datacenters comply with SSAE-16 and are ISO27001 certified Secured by IBM Blue ID Full set of managed public APIs Deliver content to any kind of consuming client IBM

15 Akamai Edge Sserver Akamai NetStorage Content Hub System Architecture PUBLIC NETWORK Client SSL Termination V Y A TV TY A AT T Already trusted Akamai SSL Termination F 5 HTTP IBM SOFTLAYER VHOST Iem.adm01.ibm.com SSP Marathon/Mesos (PROD01-WDC04) Content Hub Microservices consul WDC04 search auth publish delivery V Y A V T Y T A T A T CLOUD SERVICES IBMID A SENTINEL WEBSERVER (HAPROXY) A HTTP S GLOBAL IP PRIVATE NETWORK WATSON V Y A TV TY A AT T F 5 HTTP VHOST Iem.adm01.ibm.com FRA01 SSP Marathon/Mesos (PROD01-FRA01) Content Hub Microservices consul search auth publish delivery V Y A V T Y T A T A T CLOUDANT Iem.cloudant.com A A Akamai SSL Termination SENTINEL WEBSERVER (HAPROXY) NEW RELIC prod key

16 IBM Watson Content Hub micro-services are independently developed, deployed and managed one service can be deployed without affecting others multiple versions of one service can be active at a given time each service runs in its own docker runtime independently scaled, fully resilient and self healing independent of their deployment location, state-less and cache-less using their own persistence layer, which is completely independent from other services implemented in the best suited programming language for their purpose Java, NodeJS, exposed via public REST interfaces through an API gateway dependency between micro services is limited to usage of exposed APIs IBM

17 Integrating Akamai Content Delivery Network Delivery of published content and assets via CDN is tightly integrated into the IBM Watson Content Hub architecture Worldwide distribution of content and assets for fast access by end users Managing caching policies (e.g. expiration) Configuration of Akamai services (Edge Configuration Service) Manage Custom Domain Names for individual tenants Metering and Billing of Watson Content Hub usage Security gateway at the edge (e.g. to prevent Denial of Service Attacks) o Akamai Edge is the main entry point/proxy into the system and dispatches between cached resources stored by the CDN Netstorage and dynamic API calls to Content Hub microservices IBM

18 Security and Compliance 18 Data-in-transit protection TLS (Version 1.2 or above) TLS VPN gateway Asset Protection Watson Content Hub is EU-US Privacy Shield certified Datacenter and Cloud Platform Operation are ISO27K certified and comply with SSAE-16 Operational security ISO27001 and SSAE-16 compliant operation in SoftLayer Datacenters. Regular automated vulnerability scans during development, test and production to assess potential security impacts. IBM internal security policies cover SaaS operation, secure engineering, and incident response (CSIRT). Regular reporting of the status and approvals go up to the executive management level. Management responsibility, annual training for all employees, internal and external audits ensure that policies are followed. Secure development 2016 IBM The Secure Engineering Framework at IBM includes education and awareness, project planning, risk assessment and threat modelling, security requirements, secure coding, test and vulnerability assessment, documentation, and incident response. Product Security Incident Response teams ensure the timely identification, analysis, resolution and reporting of security vulnerabilities in IBM products. More information at

19 Security: authentication Watson Content Hub uses IBMid for authentication IBMid is used for access to all of IBM's applications, communities, support and more Federated authentication can be used to enable IBMid authentication to your organization's identity provider Security Assertion Markup Language 2.0 (SAML 2.0) is used for this See Federated authentication documentation IBM

20 Security: authorization user roles Watson Content Hub supports the following roles: Administrator: set up a content hub and its privileges, manage hub usage, and manage user privileges in addition to working with content types, content items, and assets Manager: work with content types in addition to working with content items and assets Editor: work only with content items and assets Viewer: API-only read access to authoring services for content, assets, and search Anonymous: retrieve content and assets from delivery only IBM

21 Security: roles and user tasks IBM Task Admin. Manager Editor Viewer Search Manage users Hub settings Content model: types, image profiles, and categories Content items Assets Search in UI Authoring search using API Add/Remove User Change user role Manage Locales Manage categories View usage data Create, update, delete content types, image profiles, and categories Create, update, delete content items Read Authoring content items using API Import, tag, and classify Assets Define image renditions Set start and end points for videos

22 Security: managing users and assigning roles IBM

23 Security: CORS (Cross-Origin Resource Sharing) CORS can be enabled for Watson Content Hub APIs for specific trusted domains This may be needed for Ajax requests from web applications that are not hosted on Watson Content Hub Add or remove trusted domains on the Security tab under General Settings IBM

24 Resilient and Scalable Infrastructure Datacenters: Softlayer Orchestration: Marathon / Mesos Containerization: Docker Storage: Cloudant (JSON) & Akamai NetStorage (Assets) API Gateway/Management :Papillion, IBM API Connect Service Registry: Consul Message Bus: Kafka Search: Solr Configuration: Zookeeper HTML templating: Handlebars and Angular Logging: Kafka, Graylog2 Monitoring: New Relic IBM

25 Graylog Logging

26 Monitoring and Alerting: New Relic IBM

27 More information for developers Developer Center: Live samples site: Code samples on GitHub: Slide deck on Developing With Content Services: Slide deck on Sites Development Overview: 27

28 Sign up for free trial 30-day free trial IBM

29 29

Watson Content Hub Content Management in the Cloud. Dr. Thomas Stober Dr. Thomas Stober STSM, IBM STSM, IBM

Watson Content Hub Content Management in the Cloud. Dr. Thomas Stober Dr. Thomas Stober STSM, IBM STSM, IBM Watson Content Hub Content Management in the Cloud Dr. Thomas Stober Dr. Thomas Stober STSM, IBM STSM, IBM 1 Please Note: IBM s statements regarding its plans, directions, and intent are subject to change

More information

Technical Deep Dive. IBM Watson Content Hub UI & APIs

Technical Deep Dive. IBM Watson Content Hub UI & APIs Technical Deep Dive IBM Watson Content Hub UI & APIs WCH Terms A glimpse at the UI... Search Content Types Image Profiles Content Items Taxonomies Assets 4 Important terms to know Content Model Content

More information

IBM Watson Content Hub

IBM Watson Content Hub IBM Watson Content Hub Carlos Garcia de Miguel Europe Digital Experience Sales Leader Email: carlos.garcia.de.miguel@be.ibm.com 2014 International Business Machines Corporation 1 Who am I? So what is Watson

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the

More information

IBM Advantage: IBM Watson Compare and Comply Element Classification

IBM Advantage: IBM Watson Compare and Comply Element Classification IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Security and Compliance at Mavenlink

Security and Compliance at Mavenlink Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure

More information

Oracle API Platform Cloud Service

Oracle API Platform Cloud Service Oracle API Platform Cloud Service Oracle API Platform Cloud Service provides a foundation for Digital Transformation through the first API Management offering that comprises the Full API Lifecycle. Encompassing

More information

Let s say that hosting a cloudbased application is like car ownership

Let s say that hosting a cloudbased application is like car ownership Let s say that hosting a cloudbased application is like car ownership Azure App Service App Service Features & Capabilities All features and capabilities are shared across all of App Service application

More information

IBM Case Manager on Cloud

IBM Case Manager on Cloud Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud

More information

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential

More information

The Now Platform Reference Guide

The Now Platform Reference Guide The Now Platform Reference Guide A tour of key features and functionality START Introducing the Now Platform Digitize your business with intelligent apps The Now Platform is an application Platform-as-a-Service

More information

Layer Security White Paper

Layer Security White Paper Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY

More information

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

SoftLayer Security and Compliance:

SoftLayer Security and Compliance: SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

Getting Started with AWS Security

Getting Started with AWS Security Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

To Kill a Monolith: Slaying the Demons of a Monolith with Node.js Microservices on CloudFoundry. Tony Erwin,

To Kill a Monolith: Slaying the Demons of a Monolith with Node.js Microservices on CloudFoundry. Tony Erwin, To Kill a Monolith: Slaying the Demons of a Monolith with Node.js Microservices on CloudFoundry Tony Erwin, aerwin@us.ibm.com Agenda Origins of the Bluemix UI Demons of the Monolith Slaying Demons with

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE Table of Contents Introduction... 2 Architecture Overview... 2 Supported Browser Versions and Technologies... 3 Firewalls and Login Sessions...

More information

Qualys Cloud Platform

Qualys Cloud Platform 18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Architecting for Greater Security in AWS

Architecting for Greater Security in AWS Architecting for Greater Security in AWS Jonathan Desrocher Security Solutions Architect, Amazon Web Services. Guy Tzur Director of Ops, Totango. 2015, Amazon Web Services, Inc. or its affiliates. All

More information

Architecting Microsoft Azure Solutions (proposed exam 535)

Architecting Microsoft Azure Solutions (proposed exam 535) Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and

More information

Application Centric Microservices Ken Owens, CTO Cisco Intercloud Services. Redhat Summit 2015

Application Centric Microservices Ken Owens, CTO Cisco Intercloud Services. Redhat Summit 2015 Application Centric Microservices Ken Owens, CTO Cisco Intercloud Services Redhat Summit 2015 Agenda Introduction Why Application Centric Application Deployment Options What is Microservices Infrastructure

More information

Docker CaaS. Sandor Klein VP EMEA

Docker CaaS. Sandor Klein VP EMEA Docker CaaS Sandor Klein VP EMEA The Docker mission Build Ship Run Distributed Applica ons Anywhere Docker Driving the Containerization Movement Build, Ship, Run Distributed Applications Anywhere Docker

More information

How to Keep UP Through Digital Transformation with Next-Generation App Development

How to Keep UP Through Digital Transformation with Next-Generation App Development How to Keep UP Through Digital Transformation with Next-Generation App Development Peter Sjoberg Jon Olby A Look Back, A Look Forward Dedicated, data structure dependent, inefficient, virtualized Infrastructure

More information

API s in a hybrid world. Date 28 September 2017

API s in a hybrid world. Date 28 September 2017 API s in a hybrid world Date 28 September 2017 So, What is this API Economy thing? A mutually beneficial ecosystem of suppliers & consumers of APIs. Suppliers use APIs to securely provide specific types

More information

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,

More information

Moving WebSphere Portal Themes into Watson Content Hub. WebSphere Portal Lab Services (SEAL) Team IBM

Moving WebSphere Portal Themes into Watson Content Hub. WebSphere Portal Lab Services (SEAL) Team IBM Moving WebSphere Portal Themes into Watson Content Hub Sarah Hall WebSphere Portal Lab Services (SEAL) Team IBM 01/08/2018 Contents Contents... 1 Purpose... 2 Creating a Simple Theme in WebSphere Portal...

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

App Gateway Deployment Guide

App Gateway Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical

More information

Developing ASP.NET MVC Web Applications (486)

Developing ASP.NET MVC Web Applications (486) Developing ASP.NET MVC Web Applications (486) Design the application architecture Plan the application layers Plan data access; plan for separation of concerns, appropriate use of models, views, controllers,

More information

ASP.NET MVC Training

ASP.NET MVC Training TRELLISSOFT ASP.NET MVC Training About This Course: Audience(s): Developers Technology: Visual Studio Duration: 6 days (48 Hours) Language(s): English Overview In this course, students will learn to develop

More information

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture

More information

Exam C Foundations of IBM Cloud Reference Architecture V5

Exam C Foundations of IBM Cloud Reference Architecture V5 Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles

More information

En partenariat avec CA Technologies. Genève, Hôtel Warwick,

En partenariat avec CA Technologies. Genève, Hôtel Warwick, SIGS Afterwork Event in Geneva API Security as Part of Digital Transformation Projects The role of API security in digital transformation Nagib Aouini, Head of Cyber Security Services Defense & Cyber Security

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201 Paperspace Security Primer & Architecture Overview Copyright 2017 Paperspace, Co. All Rights Reserved - 1 - Business Whitepaper Paperspace www.paperspace.com Paperspace Virtual Desktops: A foundation for

More information

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and

More information

The Modern Web Access Management Platform from on-premises to the Cloud

The Modern Web Access Management Platform from on-premises to the Cloud The Modern Web Access Management Platform from on-premises to the Cloud Single Sign On, Access Controls, Session Management and how to use Access Management to protect applications both on premises and

More information

Intelligent Enterprise Digital Asset Management

Intelligent Enterprise Digital Asset Management Intelligent Enterprise Digital Asset Management New Updated for Cumulus 11 Protect brand assets and increase productivity with Canto s award-winning DAM platform. Integrate and configure Cumulus to support

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Trends and Best Practices from Digital Experience projects around the world

Trends and Best Practices from Digital Experience projects around the world Trends and Best Practices from Digital Experience projects around the world 20. 21. Juni 2017 IBM Labor Böblingen 1 Agenda Recent sample service projects Project Planning Architecture Versions and Maintenance

More information

App Service Overview. Rand Pagels Azure Technical Specialist - Application Development US Great Lakes Region

App Service Overview. Rand Pagels Azure Technical Specialist - Application Development US Great Lakes Region App Service Overview Quickly create powerful cloud apps using a fully-managed platform Rand Pagels Azure Technical Specialist - Application Development US Great Lakes Region Security & Management Platform

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

Course 20486B: Developing ASP.NET MVC 4 Web Applications

Course 20486B: Developing ASP.NET MVC 4 Web Applications Course 20486B: Developing ASP.NET MVC 4 Web Applications Overview In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Developing ASP.NET MVC 4 Web Applications Duration: 5 Days Course Code: 20486B About this course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5

More information

A10 HARMONY CONTROLLER

A10 HARMONY CONTROLLER DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for

More information

20486: Developing ASP.NET MVC 4 Web Applications

20486: Developing ASP.NET MVC 4 Web Applications 20486: Developing ASP.NET MVC 4 Web Applications Length: 5 days Audience: Developers Level: 300 OVERVIEW In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework

More information

API Best Practices. Managing APIs holistically across the enterprise

API Best Practices. Managing APIs holistically across the enterprise API Best Practices Managing APIs holistically across the enterprise APIs are critical to evolving application architectures Public clouds Microservices Distributed apps μservice μservice μservice μservice

More information

Build an open hybrid cloud and paint it red and blue

Build an open hybrid cloud and paint it red and blue Build an open hybrid cloud and paint it red and blue Khaled Elbedri Technical sales lead, Microsoft Ismail Dhaoui EMEA Senior Specialist Solutions Architect, Red Hat Tuesday, May 8, 2018 Agenda RH & MS

More information

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection

More information

Designing MQ deployments for the cloud generation

Designing MQ deployments for the cloud generation Designing MQ deployments for the cloud generation WebSphere User Group, London Arthur Barr, Senior Software Engineer, IBM MQ 30 th March 2017 Top business drivers for cloud 2 Source: OpenStack user survey,

More information

Building a More Secure Cloud Architecture

Building a More Secure Cloud Architecture Building a More Secure Cloud Architecture Jerry Archer SVP and CSO Let s Make College Happen Security Guiding Principles in the Cloud Secure Perimeter Micro-segmentation -- isolating applications and data

More information

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity 2x 50% 5x Microsoft 365 A complete, intelligent, secure solution to empower employees Unlocks creativity Built for teamwork Integrated for simplicity Intelligent security Inner Loop Files Sites Content

More information

SIEBEL 15 RELEASE & UPGRADE SUMMARY

SIEBEL 15 RELEASE & UPGRADE SUMMARY SIEBEL 15 RELEASE & UPGRADE SUMMARY Eagle Creek Software Services H UPGRADING SIEBEL WITHOUT SKIPPING A BEAT UPGRADING SIEBEL WITHOUT SKIPPING A BEAT Siebel 15 Release and Upgrade Summary IP2015, also

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.

More information

API MANAGEMENT WITH WEBMETHODS

API MANAGEMENT WITH WEBMETHODS API MANAGEMENT WITH WEBMETHODS Subhash Ramachandran SVP, Product Management & Marketing DIGITAL TRANSFORMATION #WITHOUTCOMPROMISE 2017 Software AG. All rights reserved. WEBMETHODS API MANAGEMENT PLATFORM

More information

MODERN APPLICATION ARCHITECTURE DEMO. Wanja Pernath EMEA Partner Enablement Manager, Middleware & OpenShift

MODERN APPLICATION ARCHITECTURE DEMO. Wanja Pernath EMEA Partner Enablement Manager, Middleware & OpenShift MODERN APPLICATION ARCHITECTURE DEMO Wanja Pernath EMEA Partner Enablement Manager, Middleware & OpenShift COOLSTORE APPLICATION COOLSTORE APPLICATION Online shop for selling products Web-based polyglot

More information

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview AKAMAI WHITE PAPER Enterprise Application Access Architecture Overview Enterprise Application Access Architecture Overview 1 Providing secure remote access is a core requirement for all businesses. Though

More information

Apigee Edge Cloud - Bundles Spec Sheets

Apigee Edge Cloud - Bundles Spec Sheets Apigee Edge Cloud - Bundles Spec Sheets Description Apigee Edge Cloud is an API management platform to securely deliver and manage all APIs. Apigee Edge Cloud manages the API lifecycle with capabilities

More information

LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017

LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017 LiveEngage Messaging Platform: Security Overview Document Version: 2.0 July 2017 Contents Introduction... 3 Supported Platforms... 3 Protecting Data in Transit... 3 Protecting Data at Rest... 3 Encryption...

More information

August, HPE Propel Microservices & Jumpstart

August, HPE Propel Microservices & Jumpstart August, 2016 HPE Propel s & Jumpstart Jumpstart Value Quickly build modern web applications Single page application Modular microservices architecture app generator Modularity provides better upgradeability

More information

Securing the Cloud Today: How do we get there?

Securing the Cloud Today: How do we get there? Samson Tai, Chief Technologist, IBM Innovation Network Securing the Cloud Today: How do we get there 9/15/2009 What is Cloud Computing Cloud is a new consumption and delivery model for many IT-based services,

More information

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect Serverless Architecture Hochskalierbare Anwendungen ohne Server Sascha Möllering, Solutions Architect Agenda Serverless Architecture AWS Lambda Amazon API Gateway Amazon DynamoDB Amazon S3 Serverless Framework

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group

A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group A Closer Look at XPages in IBM Lotus Domino Designer 8.5 Ray Chan Advisory I/T Specialist Lotus, IBM Software Group 2008 IBM Corporation Agenda XPage overview From palette to properties: Controls, Ajax

More information

W H IT E P A P E R. Salesforce Security for the IT Executive

W H IT E P A P E R. Salesforce Security for the IT Executive W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login

More information

SaaS. Public Cloud. Co-located SaaS Containers. Cloud

SaaS. Public Cloud. Co-located SaaS Containers. Cloud SaaS On-prem Private Cloud Public Cloud Co-located SaaS Containers APP SERVICES ACCESS TLS/SSL DNS NETWORK WAF LOAD BALANCING DNS ACCESS CONTROL SECURITY POLICIES F5 Beside the Cloud Why Get Closer to

More information

COURSE 20486B: DEVELOPING ASP.NET MVC 4 WEB APPLICATIONS

COURSE 20486B: DEVELOPING ASP.NET MVC 4 WEB APPLICATIONS ABOUT THIS COURSE In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus will be on coding activities that enhance the

More information

IEEE Sec Dev Conference

IEEE Sec Dev Conference IEEE Sec Dev Conference #23, Improving Attention to Security in Software Design with Analytics and Cognitive Techniques Jim Whitmore (former) IBM Distinguished Engineer Carlisle, PA jjwhitmore@ieee.org

More information

Example Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT)

Example Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT) Example Azure Implementation for Government Agencies Indirect tax-filing system By Alok Jain Azure Customer Advisory Team (AzureCAT) June 2018 Example Azure Implementation for Government Agencies Contents

More information

Enterprise Node.js Support

Enterprise Node.js Support Enterprise Node.js Support From One Practitioner To The Next As a founding member of the We began our journey with Node.js in 2010, having found a runtime Cloud Native Computing that would allow us to

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS

More information

20486: Developing ASP.NET MVC 4 Web Applications (5 Days)

20486: Developing ASP.NET MVC 4 Web Applications (5 Days) www.peaklearningllc.com 20486: Developing ASP.NET MVC 4 Web Applications (5 Days) About this Course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine Table of Contents Overview Containers, Docker, Registries vsphere Integrated Containers Engine Management Portal Registry Roles and Personas 1.1 1.1.1 1.1.2 1.1.2.1 1.1.2.2 1.1.2.3 1.1.2.4 2 Overview of

More information

The IBM MobileFirst Platform

The IBM MobileFirst Platform The IBM MobileFirst Platform Curtis Miles IBM MobileFirst Solution Architect April 14, 2015 What is the IBM MobileFirst Platform? A modular set " of libraries, tools, and runtimes " that help you " easily

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT ArcGIS Enterprise Security: An Introduction Randall Williams Esri PSIRT Agenda ArcGIS Enterprise Security for *BEGINNING to INTERMIDIATE* users ArcGIS Enterprise Security Model Portal for ArcGIS Authentication

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

MSB to Support for Carrier Grade ONAP Microservice Architecture. Huabing Zhao, PTL of MSB Project, ZTE

MSB to Support for Carrier Grade ONAP Microservice Architecture. Huabing Zhao, PTL of MSB Project, ZTE MSB to Support for Carrier Grade ONAP Microservice Architecture Huabing Zhao, PTL of MSB Project, ZTE ONAP Architecture Principle: Microservices ONAP Architecture Principle: ONAP modules should be designed

More information

Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy

Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy Good Fences Make Good Neighbors: Rethinking Your Cloud Selection Strategy SESSION ID: CSV-W01 Bryan D. Payne Director of Security Research Nebula @bdpsecurity Cloud Security Today Cloud has lots of momentum

More information

What's New in IBM WebSphere Portal Version 8? Open Mic November 6, 2012

What's New in IBM WebSphere Portal Version 8? Open Mic November 6, 2012 What's New in IBM WebSphere Portal Version 8? Open Mic November 6, 2012 Stefan Liesche Web Experience Solution and Platform Chief Architect, STSM Stefan Koch Chief Programmer - WebSphere Portal IBM Collaboration

More information

AD105 Introduction to Application Development for the IBM Workplace Managed Client

AD105 Introduction to Application Development for the IBM Workplace Managed Client AD105 Introduction to Application Development for the IBM Workplace Managed Client Rama Annavajhala, IBM Workplace Software, IBM Software Group Sesha Baratham, IBM Workplace Software, IBM Software Group

More information

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ Best Practices for Cloud Security at Scale Phil Rodrigues Security Solutions Architect Web Services, ANZ www.cloudsec.com #CLOUDSEC Best Practices for Security at Scale Best of the Best tips for Security

More information

Developing ASP.NET MVC 4 Web Applications

Developing ASP.NET MVC 4 Web Applications Developing ASP.NET MVC 4 Web Applications Course 20486B; 5 days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5

More information