Etisalat Digital Enhancing Security in the Cloud
|
|
- Shawn Jenkins
- 5 years ago
- Views:
Transcription
1 solution brief Telecommunications Secure Cloud Services Etisalat Digital Enhancing Security in the Cloud To improve the security of public, private, and hybrid cloud services, Etisalat Digital designed and developed a robust, resilient platform, reinforced against data breaches and hypervisor attacks. Through collaborative work with Intel, Etisalat Digital has developed a strong, secure cloud service offering the Etisalat Digital OneCloud* Platform that features deeper, hardware-level protection capable of meeting the more rigorous requirements of government entities and enterprises operating across geopolitcal boundaries. Miguel Angel Villalonga Vice President/Cloud & Data Center Etisalat Digital Executive Summary Etisalat Digital is a business unit of Etisalat helping to drive digital transformation by enabling enterprises and governments to improve decision-making and efficiency through the use of the latest technologies. The unit focuses on providing digital solutions in various domains, including cloud, cybersecurity, digital marketing, mobile commerce, Internet of Things (IoT), and big data and analytics. In today s virtualized computing environments, where breaches in the security of IT infrastructures present a substantial challenge, the reinforcement of platforms against hypervisor attacks and other intrusions is essential. Etisalat Digital has responded to this challenge by engineering its cloud services with multiple layers of security, centered on Intel Trusted Execution Technology (Intel TXT). Etisalat Digital is collaborating with Intel and providing cloud infrastructure powered by Intel Xeon processors and Intel technologies. Etisalat Digital plans to expand its catalog offerings of public cloud offerings and target a number of industry verticals in the competitive UAE marketplace and surrounding regions. Etisalat Digital s expanding involvement with government bodies and global enterprises has also heightened the need to ensure data sovereignty to comply with privacy laws and regulations in force within the country in which the data resides. That requirement and the need for stronger hardware-based security protection led Etisalat Digital to integrate Intel TXT capabilities into its latest service offerings. Intel TXT delivers stronger security by verifying vital system components at startup, including the system BI, firmware, and hypervisor operation. As an integral feature of select Intel Xeon processors in the E3, E5, and E7 families, Intel TXT helps establish trusted compute pools, protecting the cloud environments of virtualized data centers against external attacks. The result is improved platform integrity through a verifiable hardware root of trust and greater visibility into operations and auditing of virtualization components. Through this and other cloud computing technologies from Intel, Etisalat Digital can deliver and maintain secure, proven, optimized cloud solutions for customers. This paper discusses the advanced technologies helping Etisalat Digital expand into new markets, the National Election Voting Project in which Etisalat Digital was engaged, and the Intel technologies that Etisalat Digital has integrated into its infrastructure to enhance the performance, security, and reliability of its service offerings.
2 Solution Brief Etisalat Digital Enhancing Security in the Cloud 2 Etisalat Background From its headquarters in Abu Dhabi, Etisalat actively provides services for more than 300,000 organizations in the United Arab Emirates (UAE), ranging from small-to-midsize businesses (SMBs) to large enterprises and government organizations. As the leading telecommunications operator in the UAE, Etisalat continues to expand its focus on enhancing the customer experience, moving ahead to further differentiate its service offerings. Recent initiatives have focused on optimizing performance, improving reliability, and strengthening security across its infrastructure. Growth through Digital Transformation Etisalat Digital has a skilled team of digital experts, solution architects, project managers, and digital engineers. Available digital assets and platform technologies include data centers, cloud platforms, big data and analytics engines, digital and mobile payments platforms, security operation centers, IoT platforms, and command and control centers. Etisalat Digital combines the scale, strength, and robust network of the leading regional telco with deep expertise in digital technologies. The company is well positioned to provide end-to-end solutions, applying the latest digital technologies to enhance education, healthcare, city government, smarter transportation, resource management, and the cashless economy. Etisalat is also a member of the Intel Network Builder ecosystem, working collaboratively to advance the key technologies used by communications services providers and to help enhance technology integration and high-volume networking development. Protecting Data Sharing In response to the evolution and rising importance of cloud computing, the Dubai Data Law has been implemented to streamline data sharing between government organizations and the private sector. The intention is to expand the opportunities for collaboration, innovation, and entrepreneurial ventures, but the law also lays down strict measures for retaining data within specific geographical boundaries and protecting sensitive data. To avoid breaches and software attacks that could violate regulations, the security of the cloud infrastructure is vital and ongoing auditing and tracking of infrastructure components must be accomplished in a visible, accessible manner. Etisalat Digital is responding to these developments by ensuring that all necessary protections are incorporated into its cloud computing infrastructure and that security audit trails can be established to demonstrate compliance. On a larger scale, the Smart Dubai initiative, instituted by Sheikh Mohammed bin Rashid, vice president of the UAE in 2014, is moving toward making Dubai the smartest city in the world by 2017, by employing Internet of Things (IoT) technologies and other technological advances. Etisalat Digital is exploring opportunities that are opening as new technologies are needed to foster the goals of this initiative. Use Case: National Election Voting Project The National Election Voting Project has been a key, high visibility project for Etisalat Digital during 2015, elevating the importance of security protection to ensure the integrity and legitimacy of the voting process. This engagement with the UAE government emphasized the necessity of preventing any breaches of the cloud-based infrastructure engineered by Etisalat Digital, maintaining continuous tracking and auditing of all server activities and minimizing the risks of illicit software hacking that could compromise voter registration or the voting results. The National Election Voting Project was launched to develop an advanced, secure platform for country-wide voting. Etisalat s OneCloud* solution was selected to be the main platform, an Infrastructure as a Service (IaaS) offering built on Intel architecture components. The platform met all necessary requirements of the Ministry of Federal National Council Affairs (MFNCA). The MFNCA issues certified personal identification for voters, which is linked to the e-voting system. Voters can visit the MFNCA s website to ensure they are listed and can then vote during an early voting period or on Election Day. Without the traditional guarantees of physical separation of workloads granted by a non-virtualized infrastructure, shared infrastructures residing in the cloud need to maintain the isolation of workloads across the virtualized environment. A key aspect of this requirement is ensuring that multiple workloads within a multi-tenant environment cannot tamper or interact with each other in any way. The MFNCA required a solution in which a trusted launch with defined platform policy could be established, preventing unauthorized software from running on the platform and isolating and protecting process execution from data. A means of providing full platform and network attestation was also required to protect against unauthorized network access. The MFNCA implementation favored a number of characteristics of the OneCloud solution, including the security provisions, high availability, system performance, disaster recovery, and certification compliance with industry standards. As the UAE marketplace for cloud services has grown and evolved, greater emphasis has been placed on security and data sovereignty, requiring new technologies to support regulatory compliance, conduct automated security review and audits, and provide a protected environment for cloud infrastructures. Intel Trusted Execution Technology (Intel TXT), a key component of the Etisalat OneCloud solution, establishes a trusted platform that encompasses hardware, software, and firmware. The Intel TXT-enabled platform deployed by Etisalat Digital measures the execution environment to shield vital data against software-based attacks and enables attestation, operating in combination with a trusted platform module (TPM). Intel TXT provides the root of trust for measurement and the TPM, an industry standard device for secure archiving, provides the root of trust for reporting and storage. Together, these components represent the foundational elements of fully realized platform trust.
3 Solution Brief Etisalat Digital Enhancing Security in the Cloud 3 Implementing the Solution Working closely with a team at MFNCA, the engagement went through these distinct phases: Analyze and design phase. The high-level design, to be deployed in the new data center, encompassed dedicated servers, storage, backup, a local area network, infrastructure, and security. Infrastructure deployment. As part of the infrastructure deployment, these tasks took place: Configuration of the data center server, storage backup, LAN, infrastructure, security, and the OneCloud Platform. Installation of the Oracle Real lication Clusters* (RAC) engine with provisioning for virtual machines. Collaboration with the MFNCA operational teams to physically construct the design environment. Testing carried out in cooperation with MFNCA to confirm operational integrity, user acceptance, and system performance. During the early development of the OneCloud Platform, Intel served as technical advisor, ensuring alignment of the Intel Xeon processor roadmap with the roadmap for the Etisalat OneCloud Platform. Technology demonstrations presented by Intel highlighted the capabilities of many of the key technologies used in OneCloud, including Intel TXT, Intel Data Center Manager, Apache Hadoop*, as well as others. Early access to Intel technology and reference architectures also proved valuable in the design and development stages of the project, giving Etisalat Digital a blueprint for integrating the latest Intel Xeon processors, as well as Intel-based network interface cards and solid-state drives. The project demonstrated the effectiveness of the OneCloud solution for handling very secure transactions in a consistent, reliable way to meet the high standards of MFNCA and the requirements and acceptance of the voting public. The inclusion of Intel TXT as part of the solution strengthens the overall security of the cloud services and ensures a root of trust for measurement, reporting, and storage. Intel TXT identifies any code that has been modified or compromised so that immediate measures can be taken to correct the problem or intrusion before a server launch is completed. Etisalat OneCloud Platform Solution Components The Etisalat OneCloud Platform, shown in Figure 1, functions as both a cloud broker and orchestration service. Built on an Intel architecture framework, OneCloud provides support for three cloud-service models: public, private, and hybrid. The digital transformation taking place globally across enterprises and government organizations calls for agile hybrid cloud management, easily provisioned within a secure multi-tenant computing environment, and the capability of scaling to a wide range of workloads from small-scale pilot projects to massive application server clusters. The OpenCloud Platform supports open standards and runs on a combination of advanced Tier 1 vendor hardware and standard high-volume servers from Intel powered by the Intel Xeon processor family. To provide highly scalable platform security in physical and virtual infrastructures, Intel Self-Service, Governance, Orchestration, Reporting Super Admin Admin Full Service Integration Security Networking Servers Anti-DDoS Anti-Virus NLBs VPN Windows PXE Firewall WAF SDN WAN Linux Customer A Customer B Customer C Hybrid Customer A Users Storage Block Backup Object Archive Shared Servers Shared Storage Dedicated Servers Dedicated Storage Ready to use from different UAE Datacenters (DR Ready) Subscription model from monthly to daily resource consumption Different performance QoS and SLAs Available in Etisalat DC or Customer Premises Remotely Managed and Custom sizing Integrates with Public for Unified Hybrid Cloud deployment Figure 1. Components of the Etisalat OneCloud* Platform Public Cloud Private Cloud
4 Solution Brief Etisalat Digital Enhancing Security in the Cloud 4 TXT works in concert with the servers and the software stack installed on top of the server systems. The trusted, compliant cloud infrastructure offered by Etisalat Digital delivers reliable on-demand subscription services well suited to a wide range of enterprise and government applications. With multi-layered security and the agility to respond rapidly to changing business needs and workload demands, the OneCloud platform effectively supports the growth of digital businesses across mobile, social, and big data implementations. The Security Value of Intel Trusted Execution Technology Threats to the integrity of IT infrastructures and the potential risks of security breaches pose a challenge that chief security officers (CSOs) and chief information security officers (CISOs) must address to protect cloud-based data centers. To this end, Intel developed Intel TXT to help strengthen platforms against hypervisor attacks, root kit installations, and firmware attacks. The physical isolation that is provided by traditional hardware infrastructures is no longer available in virtualized environments. Enhancements available through Intel TXT help ensure virtual machine (VM) isolation and protect applications and data from evolving security threats. Intel TXT also provides a hardware-based means of verifying and complying with industry regulations and government standards that apply to data protection. Building a Chain of Trust, Visibility, and Control The foundation of trust and security in a cloud-based IT infrastructure starts with the servers and systems in use. To ensure optimal security, Intel TXT includes the basic building blocks of the infrastructure encompassing hardware, firmware, and software to create a balance between functionality and protection against intrusions. During the initial system boot, Intel TXT creates an environment for comparing each of the vital start-up elements against a verified baseline reference. This reference is known as the Measured Launch Environment (MLE). A unique identifier cryptographically based is assigned to every approved component involved in the launch. Any code that attempts to run that does not match the approved code in the baseline is blocked by the hardware. Because this mechanism is grounded in hardware, it helps establish a trusted foundation that protects against a variety of software attacks that can occur in the earliest stages of the system boot process. Avoiding this type of attack minimizes the risk and expense associated with data breaches and helps prevent the need for system shutdown and remediation. The Intel TXT processes that take place at system launch are: Verified Launch. The chain of trust based on the hardware enables launch of the MLE if a known good state can be confirmed. If changes to the MLE are detected through cryptographic analysis, the system start-up is blocked. Launch Control policy. The Launch Control policy maintains lists of approved executable code and uses a policy engine to enforce rules and control the launch sequence. Secret Protection. Hardware mechanisms purge residual data in the event of an improper MLE shutdown. This measure helps protect data from memory-snooping software and reset attacks. Attestation. Platform measurement credentials are sent to local or remote users or systems, completing the verification process and providing an audit trail of the process to better support regulatory mandates and compliance. Ensuring Customer Confidence in the Cloud In a number of mission-critical sectors including financial services, government services, and healthcare end-to-end security in the cloud is an absolute necessity. Several specific Intel solutions help provide security in cloud environments: Enhancing data protection efficiency. Intel Advanced Encryption Standard New Instructions (Intel AES-NI) are instructions in the processor that accelerate encryption based on the widely used Advanced Encryption Standard (AES) algorithm. These instructions enable fast and secure data encryption and decryption, removing the performance barrier to allow more extensive use of this vital data protection mechanism. With this performance penalty reduced, cloud providers are starting to embrace Intel AES-NI to promote the use of encryption. Enhancing data protection strength. Intel Data Protection Technology with Intel AES-NI and Secure Key is the foundation for cryptography without sacrificing performance. These solutions can enable faster, higher quality cryptographic keys and certificates than pseudorandom, software-based approaches in a manner better suited to shared, virtual environments. Protecting the systems used in the cloud or compute infrastructure. Intel TXT is a set of hardware extensions to Intel processors and chipsets with security capabilities such as measured launch and protected execution. Intel TXT provides a hardware-enforced, tamper-resistant mechanism to evaluate critical, lowlevel system firmware and /Hypervisor components from power-on. With this, malicious or inadvertent code changes can be detected, helping assure the integrity of the underlying machine that the data resides on. Financial services customers, government organization, communications service providers, and other organizations around the world are incorporating these solutions into their systems to provide added security at both the platform and data level in public, private, and hybrid cloud deployments. Learn more about the capabilities of Intel TXT in this white paper: Intel Trusted Execution Technology: Hardware- Based Technology for Enhancing Server Platform Security
5 Solution Brief Etisalat Digital Enhancing Security in the Cloud 5 Enabling a Trusted Public or Private High- Performance Cloud Cloud infrastructure powered by Intel Xeon processors and Intel technologies helps enable trust in cloud servers by improving visibility into virtualized components and providing greater control of resources. Strengthening Cloud Security With data security a prime consideration security for telecommunications service providers worldwide, enhancements built into select Intel Xeon processors and chipsets help establish an infrastructure that meets rigorous security policies. These enhancements contribute to greater acceptance and adoption of cloud technologies, helping overcome misperceptions about privacy and data protection. Public cloud usage has been somewhat slow to gain momentum, partially because of misperceptions around security, as illustrated in Figure 2. 1 Ongoing Collaboration The collaboration between Etisalat Digital and Intel makes a number of opportunities available for expanded cloud services with stronger security, enhanced reliability, and proven industry acceptance. The combination of Etisalat s market leadership in the Middle East and cloud infrastructure powered by Intel Xeon processors create a winning situation for both companies to strengthen market reach and extend the customer base into new geographies. Factors Preventing More Pervasive Public Cloud Usage Security concerns 48% Data protection concerns/challenges 33% Performance concerns 29% Figure 2. Factors preventing more pervasive public cloud usage
6 Solution Brief Etisalat Digital Enhancing Security in the Cloud 6 The complexities of today s cloud infrastructures create challenges that must be met if overall trust in security and data integrity are to be ensured. Visibility into processes across virtualized environments, integration with existing IT systems, and automated security reviews and audits are all necessary to build trust. Etisalat Digital, working closely with Intel, has developed an exceptionally secure cloud infrastructure, using hardware-based security and platform attestation to protect the data privacy and integrity. - Miguel Angel Villalonga, Vice President/Cloud & Data Center, Etisalat Digital Learn More Learn more about Etisalat: Learn more about Intel Cloud Technology: Explore the features and capabilities of Intel Trusted Execution Technology Discover the best practices for securing the cloud in the Intel Trusted Execution Technology Deployment Guide. 1 Source: I Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2016 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. * Other names and brands may be claimed as the property of others. 1116/MH/MESH/PDF
Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms
EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Novell* Cloud Manager Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Novell* Cloud Manager Intel
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationFIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates
Case Study FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates World s largest global provider dedicated to banking
More informationAgenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2
GRC3386BUS GDPR Readiness with IBM Cloud Secure Virtualization Raghu Yeluri, Intel Corporation Shantu Roy, IBM Bill Hackenberger, Hytrust #VMworld #GRC3386BUS Agenda GDPR Overview & Requirements IBM Secure
More informationIntel s Architecture for NFV
Intel s Architecture for NFV Evolution from specialized technology to mainstream programming Net Futures 2015 Network applications Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationThe Intel SSD Pro 2500 Series Guide for Microsoft edrive* Activation
The Intel SSD Pro 2500 Series Guide for Microsoft edrive* Activation Solutions Blueprint January 2015 Order Number: 330880-002US INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationDelivering Complex Enterprise Applications via Hybrid Clouds
Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked
More informationDrive Recovery Panel
Drive Recovery Panel Don Verner Senior Application Engineer David Blunden Channel Application Engineering Mgr. Intel Corporation 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationEvolving Small Cells. Udayan Mukherjee Senior Principal Engineer and Director (Wireless Infrastructure)
Evolving Small Cells Udayan Mukherjee Senior Principal Engineer and Director (Wireless Infrastructure) Intelligent Heterogeneous Network Optimum User Experience Fibre-optic Connected Macro Base stations
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationBUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY
SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationSOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK
RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility
More informationIntel Cache Acceleration Software for Windows* Workstation
Intel Cache Acceleration Software for Windows* Workstation Release 3.1 Release Notes July 8, 2016 Revision 1.3 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
More informationAccelerate Your Cloud Journey
Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension
More informationSoftware Evaluation Guide for WinZip* esources-performance-documents.html
Software Evaluation Guide for WinZip* 14 http://www.intel.com/content/www/us/en/benchmarks/r esources-performance-documents.html INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationSMART DUBAI TOWARDS BECOMING THE HAPPIEST CITY ON EARTH WESAM LOOTAH, CEO, DUBAI SMART GOVERNMENT ESTABLISHMENT
SMART DUBAI TOWARDS BECOMING THE HAPPIEST CITY ON EARTH WESAM LOOTAH, CEO, DUBAI SMART GOVERNMENT ESTABLISHMENT Our ambition is to touch the life of every individual to achieve a happier life for all.
More informationMerging Enterprise Applications with Docker* Container Technology
Solution Brief NetApp Docker Volume Plugin* Intel Xeon Processors Intel Ethernet Converged Network Adapters Merging Enterprise Applications with Docker* Container Technology Enabling Scale-out Solutions
More informationIntel vpro Technology Virtual Seminar 2010
Intel Software Network Connecting Developers. Building Community. Intel vpro Technology Virtual Seminar 2010 Getting to know Intel Active Management Technology 6.0 Fast and Free Software Assessment Tools
More informationData Center Energy Efficiency Using Intel Intelligent Power Node Manager and Intel Data Center Manager
Data Center Energy Efficiency Using Intel Intelligent Power Node Manager and Intel Data Center Manager Deploying Intel Intelligent Power Node Manager and Intel Data Center Manager with a proper power policy
More informationA guide for IT professionals. implementing the hybrid cloud
A guide for IT professionals implementing the hybrid cloud A guide for IT professionals implementing the hybrid cloud Cloud technology is maturing and advancing rapidly. And for schools today, hybrid cloud
More informationCloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel
Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications
More informationWatson Developer Cloud Security Overview
Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationDELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing
DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat
More informationEnterprise Cloud Computing. Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur
1 Enterprise Cloud Computing Eddie Toh Platform Marketing Manager, APAC Data Centre Group Cisco Summit 2010, Kuala Lumpur Agenda 2 Fundamentals of Enterprise Cloud Computing IT & Cloud Computing Requirements
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More information4th Generation Intel Core vpro Processors with Intel VMCS Shadowing
white paper 4th Generation Intel Core vpro Processors with Intel VMCS Shadowing Enhancing the Performance of Citrix XenClient and McAfee Deep Defender* Contents Executive Summary... 1 Hardware-Assisted
More informationDriving Business Outcomes: Cisco Data Center Innovation and Solutions
Driving Business Outcomes: Data Center Innovation and Solutions Connect 2014 Riyadh, Saudi Arabia Frank Palumbo Senior Vice President Global Data Center @fpalumbo Unified Computing System, UCS, Invicta,
More informationTransformation Through Innovation
Transformation Through Innovation A service provider strategy to prosper from digitization People will have 11.6 billion mobile-ready devices and connections by 2020. For service providers to thrive today
More informationGLOBAL PKI TRENDS STUDY
2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the
More informationIntel Unite Solution 3.0 and Protected Guest Access. Security Development Summary
Intel Unite Solution 3.0 and Protected Guest Access Security Development Summary June 2016 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationIntel Learning Series Developer Program Self Verification Program. Process Document
Intel Learning Series Developer Program Self Verification Program Process Document Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationSmart Data Center Solutions
Smart Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing,
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationIBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights
IBM PowerSC Designed for Enterprise Security & Compliance in Cloud and Virtualised environments Highlights Simplify management and measurement for security & compliance Quickly view security compliance
More informationIntroduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview
IBM Watson on the IBM Cloud Security Overview Introduction IBM Watson on the IBM Cloud helps to transform businesses, enhancing competitive advantage and disrupting industries by unlocking the potential
More informationINTEL PERCEPTUAL COMPUTING SDK. How To Use the Privacy Notification Tool
INTEL PERCEPTUAL COMPUTING SDK How To Use the Privacy Notification Tool LEGAL DISCLAIMER THIS DOCUMENT CONTAINS INFORMATION ON PRODUCTS IN THE DESIGN PHASE OF DEVELOPMENT. INFORMATION IN THIS DOCUMENT
More informationNetwork Visibility and Segmentation
Network Visibility and Segmentation 2019 Cisco and/ or its affiliates. All rights reserved. Contents Network Segmentation A Services Approach 3 The Process of Segmentation 3 Segmentation Solution Components
More informationOracle Exadata Statement of Direction NOVEMBER 2017
Oracle Exadata Statement of Direction NOVEMBER 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationCloud Services. Infrastructure-as-a-Service
Cloud Services Infrastructure-as-a-Service Accelerate your IT and business transformation with our networkcentric, highly secure private and public cloud services - all backed-up by a 99.999% availability
More informationIntel Desktop Board DZ68DB
Intel Desktop Board DZ68DB Specification Update April 2011 Part Number: G31558-001 The Intel Desktop Board DZ68DB may contain design defects or errors known as errata, which may cause the product to deviate
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More informationSTRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationExecutive brief Create a Better Way to Work: OpenText Release 16
Executive brief Create a Better Way to Work: OpenText Release 16 Over the next five years, executives expect digital disruption to displace four out of 10 incumbents or 40 percent of established market
More informationHow do you decide what s best for you?
How do you decide what s best for you? Experience Transparency Leadership Commitment Cost reduction Security Trustworthiness Credibility Confidence Reliability Compliance Privacy Expertise Flexibility
More informationPasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP
Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure
More informationIncreasing Security and Compliance in the Cloud
Reference Architecture Data Center Cloud and Software-Defined Infrastructure Increasing Security and Compliance in the Cloud Utilizing solutions from HyTrust, VMware, and Intel to enable a trusted virtualized
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationVMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment
VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES
More informationIntel RealSense Depth Module D400 Series Software Calibration Tool
Intel RealSense Depth Module D400 Series Software Calibration Tool Release Notes January 29, 2018 Version 2.5.2.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
More informationEnsuring business continuity with comprehensive and cost-effective disaster recovery service.
Singtel Business Product Brochure Managed Disaster Recovery-as-a-Service Ensuring business continuity with comprehensive and cost-effective disaster recovery service. Singtel Managed Disaster Recovery-as-a-Service
More informationSmarter Computing at Sogeti
Smarter Computing at Sogeti How IBM Smarter Computing technologies enabled a leading global IT service provider to address emerging business needs Introduction: New IT challenges in a changing world The
More informationSimple and Secure Micro-Segmentation for Internet of Things (IoT)
Solution Brief Simple and Secure Micro-Segmentation for Internet of Things (IoT) A hardened network architecture for securely connecting any device, anywhere in the world Tempered Networks believes you
More informationCopyright 2015 EMC Corporation. All rights reserved. Published in the USA.
This Reference Architecture Guide describes, in summary, a solution that enables IT organizations to quickly and effectively provision and manage Oracle Database as a Service (DBaaS) on Federation Enterprise
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE Education Edition 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationIBM and Juniper Networks
IBM and Juniper Networks Transforming and simplifying your network infrastructure S O L U T I O N B R I E F Enabling strategic advantage in a changing world A less expensive energy bill, a package that
More information7 Things ISVs Must Know About Virtualization
7 Things ISVs Must Know About Virtualization July 2010 VIRTUALIZATION BENEFITS REPORT Table of Contents Executive Summary...1 Introduction...1 1. Applications just run!...2 2. Performance is excellent...2
More informationE X E C U T I V E B R I E F
Create a Better Way to Work: OpenText Suite 16 & OpenText Cloud 16 Over the next five years, executives expect digital disruption to displace four out of 10 incumbents or 40 percent of established market
More informationSOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationHALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.
HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD Automated PCI compliance anytime, anywhere. THE PROBLEM Online commercial transactions will hit an estimated
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationIntel Core vpro Processors Common-Use Guide
Intel Core vpro Processors Common-Use Guide For LabTech Software* (Revision 1.1 December 6, 2011) Table of Contents Introduction... 3 Setup and Assumptions... 3 Common Use Cases Covered in this Guide...
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationDeliver Data Protection Services that Boost Revenues and Margins
FAMILY BROCHURE Gemalto s SafeNet Identity and Data Protection Solutions for Service Providers Deliver Data Protection Services that Boost Revenues and Margins Today, your customers and prospects are facing
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationHighly accurate simulations of big-data clusters for system planning and optimization
White Paper Highly accurate simulations of big-data clusters for system planning and optimization Intel CoFluent Technology for Big Data Intel Rack Scale Design Using Intel CoFluent Technology for Big
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationLED Manager for Intel NUC
LED Manager for Intel NUC User Guide Version 1.0.0 March 14, 2018 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO
More informationWorld s Most Secure Government IT Solution
SOLUTION BRIEF World s Most Secure Government IT Solution Secure and control highly-classified data access with Teradici PCoIP Solutions Government organizations worldwide depend on PCoIP remote desktops
More informationSample for OpenCL* and DirectX* Video Acceleration Surface Sharing
Sample for OpenCL* and DirectX* Video Acceleration Surface Sharing User s Guide Intel SDK for OpenCL* Applications Sample Documentation Copyright 2010 2013 Intel Corporation All Rights Reserved Document
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationModelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer
Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationGo Cloud. VMware vcloud Datacenter Services by BIOS
Go Cloud VMware vcloud Datacenter Services by BIOS Is your IT infrastructure always in tune with your business? If a market opportunity suddenly arises, can your business respond in time? Or is the opportunity
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationIntel vpro Technology Virtual Seminar 2010
Intel Software Network Connecting Developers. Building Community. Intel vpro Technology Virtual Seminar 2010 Getting to know Intel Active Management Technology 6.0 Remote Encryption Management Andy Schiestl
More informationSimplify Hybrid Cloud
Simplify Hybrid Cloud Innovate With Cloud Agility and Economics BEST PRACTICES GUIDE Organizations Are Looking To Embrace Hybrid IT for Improved Business Agility and Lower TCO In this digital age, leaders
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationIntel Atom Processor E3800 Product Family Development Kit Based on Intel Intelligent System Extended (ISX) Form Factor Reference Design
Intel Atom Processor E3800 Product Family Development Kit Based on Intel Intelligent System Extended (ISX) Form Factor Reference Design Quick Start Guide March 2014 Document Number: 330217-002 Legal Lines
More informationHow to Create a.cibd File from Mentor Xpedition for HLDRC
How to Create a.cibd File from Mentor Xpedition for HLDRC White Paper May 2015 Document Number: 052889-1.0 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
More information