SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
SecureSpan Solution
  Security and Monitoring for Services Inside the Enterprise and out to the Cloud
  K. Scott Morrison
  CTO & Chief Architect
  Layer 7 Technologies
About Layer 7

  Layer 7 is the leading vendor of security and governance for:
                                                                          Cloud




                                            SOA
Customers




                                                                          Revenue
                   XML




            2003                     2006                          2009


                                                                              Layer 7 Confidential   2
Why Governance?




        Governance is essential. Governance is needed for
                                                                                                               “
        security, planned change and configuration

    “   management, testing, monitoring, and setting of
        quality-of-service requirements.



             Jess Thompson, Research Vice President
             As quoted by CyberMedia India Online Ltd
             (http://www.ciol.com/enterprise/biztech/news-reports/soa-evolving-beyond-traditional-roots/3409118003/0/)




                                                                                                                    Layer 7 Confidential   3
Layer 7’s Approach to Governance


                                 Security
                                 Compliance
                                 Reliability




  Policy Agility
  Deployment Flexibility
  Interoperability




                                        SLAs
                                        Quality of Service
                                        Message Content

                                                              Layer 7 Confidential   4
Achieve Control through Policy Enforcement

Enforce	
  Security	
                                                                                            Ensure	
  Reliability	
  
  Centralized	
  policy	
  enforcement	
  point	
  deployed	
                                                     Ensure	
  data	
  confiden1ality	
  over	
  the	
  
   in-­‐house	
  or	
  in	
  the	
  cloud	
                                                                         wire	
  and	
  at	
  rest	
  
  Policy-­‐driven	
  authen1ca1on	
  and	
  fine-­‐grained,	
                                                      Ensure	
  services	
  remain	
  readily	
  available	
  
   service	
  level	
  authoriza1on	
                                                                              Verify	
  messages	
  to	
  ensure	
  integrity	
  
  Enforce	
  policies	
  according	
  to	
  risk	
  




                                                                        Facilitate	
  Compliance	
  
                                               Generate	
  log	
  and	
  audit	
  files	
  at	
  mul1ple	
  levels	
  
                                               Export	
  of	
  data	
  for	
  correla1on	
  and	
  forensic	
  analysis	
  
                                               Verify	
  messages	
  for	
  compliance	
  to	
  industry	
  or	
  
                                                government-­‐mandated	
  specifica1ons	
  
                                                                                                                                                 Layer 7 Confidential    5
Gain Visibility by Monitoring Services

Ensure	
  SLA	
  Conformance	
                                                                                        Assure	
  Quality	
  of	
  Service	
  
  Monitor	
  and	
  report	
  on	
  SLAs	
  using	
  an	
  agent-­‐less	
                                              Monitor	
  and	
  report	
  on	
  service	
  
   management	
  system	
                                                                                                performance	
  in	
  real-­‐1me	
  
  Ensure	
  you	
  are	
  mee1ng	
  your	
  own	
  SLAs	
  	
                                                          Reroute	
  and	
  throFle	
  services	
  to	
  	
  

  Ensure	
  you’re	
  geMng	
  the	
  value	
  you	
  expect	
  	
                                                      maintain	
  reach-­‐ability	
  and	
  availability	
  
   from	
  3rd-­‐party	
  service	
  providers	
                                                                        Alert	
  or	
  automate	
  ac1ons	
  based	
  on:	
  

                                                                                                                               Throughput,	
  rou1ng	
  failures,	
  
                                                                                                                                   u1liza1on,	
  availability	
  rates,	
  etc	
  




                                                                             Track	
  Message	
  Content	
  
                                                 Iden1fy	
  trends,	
  excep1ons	
  or	
  viola1ons	
  at	
  the	
  message	
  level	
  
                                                 Report	
  on	
  user,	
  client	
  and	
  system	
  access	
  to	
  sensi1ve	
  data	
  

                                                                                                                                                         Layer 7 Confidential        6
React at the Pace of Business Change

Gain	
  Policy	
  Agility	
                                                                                           Gain	
  Deployment	
  Flexibility	
  
  Decouple	
  security,	
  SLA,	
  compliance	
  and	
  other	
                                                        Deploy	
  in-­‐house	
  or	
  in	
  the	
  cloud	
  
   shared	
  code	
  from	
  services	
                                                                                 Mul1ple	
  form	
  factors:	
  	
  
  Modify	
  exis1ng	
  or	
  deploy	
  new	
  policies	
  on	
  the	
  fly	
                                                     Hardware	
  appliance	
  
  Out-­‐of-­‐the-­‐box	
  asser1ons	
  facilitate	
  policy	
                                                                   SoRware	
  appliance	
  
   assembly	
  without	
  coding	
  
                                                                                                                                 SoRware	
  
  Custom	
  asser1ons	
  let	
  you	
  meet	
  	
  	
  
                                                                                                                                 Cross-­‐domain	
  client	
  
   specific	
  requirements	
  




                                                                            Facilitate	
  Interoperability	
  
                                                       Out-­‐of-­‐the	
  box	
  integra1on	
  with	
  leading	
  SOA	
  solu1ons	
  
                                                       Standards-­‐based,	
  open	
  APIs	
  facilitates	
  integra1on	
  

                                                                                                                                                            Layer 7 Confidential   7
Separation of Policy Enforcement Layer Using
SecureSpan Gateways
                                                  Service
                                                   Hosts
  Consistency
  Reuse
  Central Control                                         Operator




                             SecureSpan
                            Gateway Cluster




                                              LDAP and/or
                                                 IAM




             Service
            Requester


                                                Layer 7 Confidential   8
Leverage of Existing Identity Assets
       ID, Access Mgmt & STS

  LDAP
  Sun OpenSSO
  RSA Cleartrust
                                                                    Web Services
                                                                      Server
  CA/Netegrity SiteMinder & TxMinder
  IBM TAM, TFIM                                                                        Security
                                                            WS-Trust                  Token Service
  MSAD, Infocard (on VPN client)                                                         (STS)
                                         XML
                                                          LDAP(S)
  Oracle Access Mgr                             Native

  New instances are simple to add


 Web Services
    Client


                                                                             LDAP
                                        Access
                                         Mgmt                  Policy Decision
                                                               Points (PDPs)




                                                                                   Layer 7 Confidential   9
Consistency and Scalability
          Cluster-wide Sharing
  Cluster variables (user configurable)
  Replay
  Policy updates
                                           Horizontal                          Replay attack
  SLA                                     scalability                         prevention
                                                                               across the
                                                                               cluster




                                                          HTTP
                                                          Load
                                                         Balancer
                                                                                Transparent
                                                                                replication of
                                                                                policy across
                                                                                 the cluster

     Web Services
        Client




                                                             Single point of
                                                           management across
                                                                cluster




                                                                                                 Layer 7 Confidential   10
Edge-of-Network, DMZ-based Deployment
                                                                         Internal
                                                                       Applications
                                        Internal
                                        Firewall



                           External
                           Firewall

     SecureSpan
    Gateway Cluster




                                                                                          SecureSpan
                           Internet                                                       Management
                                                                                          Console




                         Message                                          Internal
                                                                          Network




                                                                DMZ
                                                                                 Corporate
                                                                                  Network

           Service
                                                                        May 2009              May 2009
          Requester
                                                                              Layer 7 Confidential     11
                      SecureSpan™ Gateway Overview   Proprietary and Confidential               11
Rich Policy Language




 SecureSpan
Gateway Cluster
       …




                        SecureSpan Management Console
                                                        Layer 7 Confidential   12
Apache                             Message
                                                  +PERL                             Consumers
        Policy Decision
          Point (PDP)
        (IAM, STS, etc)                                                       .NET


                                                                                              J2EE



                                                                                                     Applications




                                                                        Message




                                                           Pros
                                                             Consistent security for all systems
                                                             Centrally managed
                                   Centralized               High performance, hardware accelerated document
                                  Gateway PEP              processing and cryptography
                                    Cluster                Cons
Message Producer                                             Need rudimentary last mile security
                                                                    SSL typically, SAML, WS-S
                                                             Must cluster for high availability




                                                                                                                May 2009

                          SecureSpan™ Gateway Overview             Proprietary and Confidential                       13
Centralized Gateway Co-
  Accelerated XML transform                                                                      processor Cluster
  Accelerated XML schema val
  Signing services (notary pattern)                                                                                  Virtual
                                                                                                                     Loopback
  Encryption services
  Filtering for compliance
  Threat detection



                                                                                                       Transformed
                                                                                                      XML document
                                       Input XML
                   Apache              document
                   +PERL




                                         .NET


                                                      J2EE
                                                                                                             ESB
                 Message Producer/Consumers                    Applications



                                                                                                                     May 2009

                                SecureSpan™ Gateway Overview           Proprietary and Confidential                        14
WSDL




                                           WSDL +
                                           Security                                                             Web Services
                                           Changes
                                                                                                                  Server

           Which API do you
             program to?




Web Services                                            Shift of burden to
   Client                                                                                                   Administrative
                                                               client                                       changes to policy
                                                                                                            change API




                       Security implemented in code
                           is difficult to change                 Very programmer
                                                                  intensive


                                                                                                                                May 2009

                                  SecureSpan™ Gateway Overview               Proprietary and Confidential                             15
WS-Policy
                      Document




SecureSpan XML
   VPN Client



                     SOAP message
                      “decorated” to
                      current policy




                                                                               May 2009

                 SecureSpan™ Gateway Overview   Proprietary and Confidential         16
Gateway acts as
                                                 certificate
                                                 authority                             Web Services
                                                                                         Server




                                       Secure
                                        CSR




                                                 Secure
                                                Certificate
                                                Download
Web Services
   Client




                                                                                                      May 2009

               SecureSpan™ Gateway Overview                   Proprietary and Confidential                  17
Trusted
                                        Certificates



                                                                                     Web Services
                                                                                       Server




                                                                                                        LDAP or HTTP
                                                                          HTTP(S)
                                                                                                           Server
                                                                           LDAP(S)
                                                        OCSP




                                                                                                           CRLs
                                       Administrative
Web Services
   Client           Secure Message
                                          Import
                                                                                                    
                                                         PKI System
                                                                                          Certs




                                                                                                                  May 2009

               SecureSpan™ Gateway Overview                Proprietary and Confidential                                 18
  Protecting & monitoring your

                                               ?
applications in the cloud
  Giving your cloud apps access to
on-premises data sources


                                                          ?
  Big picture view of the distributed
application network




                                         Enterprise On-
                                          Premise IT
Hardware PEP                   Virtual PEP



                                                 ?
                 Identical


                                                               ?
               Functionality




                                                        Application-Layer
                                                      Isolation, Monitoring,
                                                             & Control




                                             NetOps
Virtual
             Application
              Instance

  Virtual
SecureSpan
 Instance
                   Separate
                   Instances                      Protected
                                                 Application
                                                    Stack




                                                                        Combined
                                                                         Instance




                                                                                    May 2009

                  SecureSpan™ Gateway Overview     Proprietary and Confidential           21
Some of our Partners



      Virtual
    SecureSpan
     Instance




                       Layer 7 Confidential   22
Some of our Customers




                        Layer 7 Confidential   23
Summary
  Cloud should be viewed as a deployment pattern for SOA
  -  This means you should leverage SOA technology in the cloud
  -  Virtual SOA gateways, like SecureSpan, provide you with a means to secure cloud
  SOA best practices for federation can be transferred into the cloud
  -  Avoid key material in the cloud
  -  Use distributable token validation strategy
    -  SAML, Kerberos
  -  Employ authorization based on attributes, not concrete identities
    -  These have persistence




                                                                         Layer 7 Confidential   24
For further information:


  K. Scott Morrison
  Layer 7 Technologies
  405 – 1100 Melville St.
  Vancouver, B.C. V6E 4A6
  Canada
  (800) 681-9377


  smorrison@layer7tech.com
  http://www.layer7tech.com

Mais conteúdo relacionado

Mais procurados

Understanding REST
Understanding RESTUnderstanding REST
Understanding RESTNitin Pande
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Amazon Web Services
 
Bringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsBringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsApigee | Google Cloud
 
ARC319_Multi-Region Active-Active Architecture
ARC319_Multi-Region Active-Active ArchitectureARC319_Multi-Region Active-Active Architecture
ARC319_Multi-Region Active-Active ArchitectureAmazon Web Services
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & GuidelinesPrabath Siriwardena
 
The never-ending REST API design debate
The never-ending REST API design debateThe never-ending REST API design debate
The never-ending REST API design debateRestlet
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower securityShiu-Fun Poon
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldAmazon Web Services
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice ArchitectureMatt McLarty
 
Amazon API Gateway
Amazon API GatewayAmazon API Gateway
Amazon API GatewayMark Bate
 
What is an API Gateway?
What is an API Gateway?What is an API Gateway?
What is an API Gateway?LunchBadger
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best PracticesAmazon Web Services
 
The Elastic Stack as a SIEM
The Elastic Stack as a SIEMThe Elastic Stack as a SIEM
The Elastic Stack as a SIEMJohn Hubbard
 
Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface) Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface) Vibhawa Nirmal
 

Mais procurados (20)

Understanding REST
Understanding RESTUnderstanding REST
Understanding REST
 
Apigee Products Overview
Apigee Products OverviewApigee Products Overview
Apigee Products Overview
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
 
Bringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered BackendsBringing API Management to AWS Powered Backends
Bringing API Management to AWS Powered Backends
 
Apigee Edge: Intro to Microgateway
Apigee Edge: Intro to MicrogatewayApigee Edge: Intro to Microgateway
Apigee Edge: Intro to Microgateway
 
ARC319_Multi-Region Active-Active Architecture
ARC319_Multi-Region Active-Active ArchitectureARC319_Multi-Region Active-Active Architecture
ARC319_Multi-Region Active-Active Architecture
 
API Security Best Practices & Guidelines
API Security Best Practices & GuidelinesAPI Security Best Practices & Guidelines
API Security Best Practices & Guidelines
 
The never-ending REST API design debate
The never-ending REST API design debateThe never-ending REST API design debate
The never-ending REST API design debate
 
ELK Stack
ELK StackELK Stack
ELK Stack
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Amazon API Gateway
Amazon API GatewayAmazon API Gateway
Amazon API Gateway
 
4 palo alto licenses
4 palo alto licenses4 palo alto licenses
4 palo alto licenses
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
What is an API Gateway?
What is an API Gateway?What is an API Gateway?
What is an API Gateway?
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best Practices
 
The Elastic Stack as a SIEM
The Elastic Stack as a SIEMThe Elastic Stack as a SIEM
The Elastic Stack as a SIEM
 
Apigee Demo: API Platform Overview
Apigee Demo: API Platform OverviewApigee Demo: API Platform Overview
Apigee Demo: API Platform Overview
 
Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface) Introduction to APIs (Application Programming Interface)
Introduction to APIs (Application Programming Interface)
 

Destaque

5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Trends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonTrends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonCA API Management
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityCA API Management
 
IBM Datapower Gateways - Devops with UrbanCode Deploy
IBM Datapower Gateways - Devops with UrbanCode DeployIBM Datapower Gateways - Devops with UrbanCode Deploy
IBM Datapower Gateways - Devops with UrbanCode DeployJared Putman
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway
 

Destaque (6)

5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Trends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonTrends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop London
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
 
IBM Datapower Gateways - Devops with UrbanCode Deploy
IBM Datapower Gateways - Devops with UrbanCode DeployIBM Datapower Gateways - Devops with UrbanCode Deploy
IBM Datapower Gateways - Devops with UrbanCode Deploy
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 

Semelhante a Layer 7 SecureSpan Solution

Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management SolutionCA API Management
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise CloudIndu Kodukula
 
Layer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpanLayer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpanCA API Management
 
SaaS Testing Overview - Foundation
SaaS Testing Overview - FoundationSaaS Testing Overview - Foundation
SaaS Testing Overview - FoundationRam Garg
 
Tracking SLAs In Cloud
Tracking SLAs In CloudTracking SLAs In Cloud
Tracking SLAs In CloudSatish Agrawal
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server InfrastructureMms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructureguestd9aa5
 
Cloud Computing in Practice: Fast Application Development and Delivery on For...
Cloud Computing in Practice: Fast Application Development and Delivery on For...Cloud Computing in Practice: Fast Application Development and Delivery on For...
Cloud Computing in Practice: Fast Application Development and Delivery on For...catherinewall
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security programmatt_presson
 
Accelerating SOA Security and Gov
Accelerating SOA Security and GovAccelerating SOA Security and Gov
Accelerating SOA Security and GovCA API Management
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 

Semelhante a Layer 7 SecureSpan Solution (20)

Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Sqa material
Sqa materialSqa material
Sqa material
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management Solution
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise Cloud
 
Layer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpanLayer 7: Enterprise Service Governance with SecureSpan
Layer 7: Enterprise Service Governance with SecureSpan
 
SaaS Testing Overview - Foundation
SaaS Testing Overview - FoundationSaaS Testing Overview - Foundation
SaaS Testing Overview - Foundation
 
Tracking SLAs In Cloud
Tracking SLAs In CloudTracking SLAs In Cloud
Tracking SLAs In Cloud
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Mms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server InfrastructureMms201 Optimize Your Server Infrastructure
Mms201 Optimize Your Server Infrastructure
 
Cloud Computing in Practice: Fast Application Development and Delivery on For...
Cloud Computing in Practice: Fast Application Development and Delivery on For...Cloud Computing in Practice: Fast Application Development and Delivery on For...
Cloud Computing in Practice: Fast Application Development and Delivery on For...
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Building a database security program
Building a database security programBuilding a database security program
Building a database security program
 
Accelerating SOA Security and Gov
Accelerating SOA Security and GovAccelerating SOA Security and Gov
Accelerating SOA Security and Gov
 
TDSi Open Day
TDSi Open DayTDSi Open Day
TDSi Open Day
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Cloud, agile
Cloud, agileCloud, agile
Cloud, agile
 

Mais de CA API Management

Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 

Mais de CA API Management (20)

Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 

Último

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Layer 7 SecureSpan Solution

  • 1. SecureSpan Solution   Security and Monitoring for Services Inside the Enterprise and out to the Cloud K. Scott Morrison CTO & Chief Architect Layer 7 Technologies
  • 2. About Layer 7   Layer 7 is the leading vendor of security and governance for: Cloud SOA Customers Revenue XML 2003 2006 2009 Layer 7 Confidential 2
  • 3. Why Governance? Governance is essential. Governance is needed for “ security, planned change and configuration “ management, testing, monitoring, and setting of quality-of-service requirements. Jess Thompson, Research Vice President As quoted by CyberMedia India Online Ltd (http://www.ciol.com/enterprise/biztech/news-reports/soa-evolving-beyond-traditional-roots/3409118003/0/) Layer 7 Confidential 3
  • 4. Layer 7’s Approach to Governance   Security   Compliance   Reliability   Policy Agility   Deployment Flexibility   Interoperability   SLAs   Quality of Service   Message Content Layer 7 Confidential 4
  • 5. Achieve Control through Policy Enforcement Enforce  Security   Ensure  Reliability     Centralized  policy  enforcement  point  deployed     Ensure  data  confiden1ality  over  the   in-­‐house  or  in  the  cloud   wire  and  at  rest     Policy-­‐driven  authen1ca1on  and  fine-­‐grained,     Ensure  services  remain  readily  available   service  level  authoriza1on     Verify  messages  to  ensure  integrity     Enforce  policies  according  to  risk   Facilitate  Compliance     Generate  log  and  audit  files  at  mul1ple  levels     Export  of  data  for  correla1on  and  forensic  analysis     Verify  messages  for  compliance  to  industry  or   government-­‐mandated  specifica1ons   Layer 7 Confidential 5
  • 6. Gain Visibility by Monitoring Services Ensure  SLA  Conformance   Assure  Quality  of  Service     Monitor  and  report  on  SLAs  using  an  agent-­‐less     Monitor  and  report  on  service   management  system   performance  in  real-­‐1me     Ensure  you  are  mee1ng  your  own  SLAs       Reroute  and  throFle  services  to       Ensure  you’re  geMng  the  value  you  expect     maintain  reach-­‐ability  and  availability   from  3rd-­‐party  service  providers     Alert  or  automate  ac1ons  based  on:     Throughput,  rou1ng  failures,   u1liza1on,  availability  rates,  etc   Track  Message  Content     Iden1fy  trends,  excep1ons  or  viola1ons  at  the  message  level     Report  on  user,  client  and  system  access  to  sensi1ve  data   Layer 7 Confidential 6
  • 7. React at the Pace of Business Change Gain  Policy  Agility   Gain  Deployment  Flexibility     Decouple  security,  SLA,  compliance  and  other     Deploy  in-­‐house  or  in  the  cloud   shared  code  from  services     Mul1ple  form  factors:       Modify  exis1ng  or  deploy  new  policies  on  the  fly     Hardware  appliance     Out-­‐of-­‐the-­‐box  asser1ons  facilitate  policy     SoRware  appliance   assembly  without  coding     SoRware     Custom  asser1ons  let  you  meet         Cross-­‐domain  client   specific  requirements   Facilitate  Interoperability     Out-­‐of-­‐the  box  integra1on  with  leading  SOA  solu1ons     Standards-­‐based,  open  APIs  facilitates  integra1on   Layer 7 Confidential 7
  • 8. Separation of Policy Enforcement Layer Using SecureSpan Gateways Service Hosts   Consistency   Reuse   Central Control Operator SecureSpan Gateway Cluster LDAP and/or IAM Service Requester Layer 7 Confidential 8
  • 9. Leverage of Existing Identity Assets ID, Access Mgmt & STS   LDAP   Sun OpenSSO   RSA Cleartrust Web Services Server   CA/Netegrity SiteMinder & TxMinder   IBM TAM, TFIM Security WS-Trust Token Service   MSAD, Infocard (on VPN client) (STS) XML LDAP(S)   Oracle Access Mgr Native   New instances are simple to add Web Services Client LDAP Access Mgmt Policy Decision Points (PDPs) Layer 7 Confidential 9
  • 10. Consistency and Scalability Cluster-wide Sharing   Cluster variables (user configurable)   Replay   Policy updates Horizontal Replay attack   SLA scalability prevention across the cluster HTTP Load Balancer Transparent replication of policy across the cluster Web Services Client Single point of management across cluster Layer 7 Confidential 10
  • 11. Edge-of-Network, DMZ-based Deployment Internal Applications Internal Firewall External Firewall SecureSpan Gateway Cluster SecureSpan Internet Management Console Message Internal Network DMZ Corporate Network Service May 2009 May 2009 Requester Layer 7 Confidential 11 SecureSpan™ Gateway Overview Proprietary and Confidential 11
  • 12. Rich Policy Language SecureSpan Gateway Cluster … SecureSpan Management Console Layer 7 Confidential 12
  • 13. Apache Message +PERL Consumers Policy Decision Point (PDP) (IAM, STS, etc) .NET J2EE Applications Message Pros   Consistent security for all systems   Centrally managed Centralized   High performance, hardware accelerated document Gateway PEP processing and cryptography Cluster Cons Message Producer   Need rudimentary last mile security  SSL typically, SAML, WS-S   Must cluster for high availability May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 13
  • 14. Centralized Gateway Co-   Accelerated XML transform processor Cluster   Accelerated XML schema val   Signing services (notary pattern) Virtual Loopback   Encryption services   Filtering for compliance   Threat detection Transformed XML document Input XML Apache document +PERL .NET J2EE ESB Message Producer/Consumers Applications May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 14
  • 15. WSDL WSDL + Security Web Services Changes Server Which API do you program to? Web Services Shift of burden to Client Administrative client changes to policy change API Security implemented in code is difficult to change Very programmer intensive May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 15
  • 16. WS-Policy Document SecureSpan XML VPN Client SOAP message “decorated” to current policy May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 16
  • 17. Gateway acts as certificate authority Web Services Server Secure CSR Secure Certificate Download Web Services Client May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 17
  • 18. Trusted Certificates Web Services Server LDAP or HTTP HTTP(S) Server LDAP(S) OCSP CRLs Administrative Web Services Client Secure Message Import  PKI System Certs May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 18
  • 19.   Protecting & monitoring your ? applications in the cloud   Giving your cloud apps access to on-premises data sources ?   Big picture view of the distributed application network Enterprise On- Premise IT
  • 20. Hardware PEP Virtual PEP ? Identical ? Functionality Application-Layer Isolation, Monitoring, & Control NetOps
  • 21. Virtual Application Instance Virtual SecureSpan Instance Separate Instances Protected Application Stack Combined Instance May 2009 SecureSpan™ Gateway Overview Proprietary and Confidential 21
  • 22. Some of our Partners Virtual SecureSpan Instance Layer 7 Confidential 22
  • 23. Some of our Customers Layer 7 Confidential 23
  • 24. Summary   Cloud should be viewed as a deployment pattern for SOA -  This means you should leverage SOA technology in the cloud -  Virtual SOA gateways, like SecureSpan, provide you with a means to secure cloud   SOA best practices for federation can be transferred into the cloud -  Avoid key material in the cloud -  Use distributable token validation strategy -  SAML, Kerberos -  Employ authorization based on attributes, not concrete identities -  These have persistence Layer 7 Confidential 24
  • 25. For further information: K. Scott Morrison Layer 7 Technologies 405 – 1100 Melville St. Vancouver, B.C. V6E 4A6 Canada (800) 681-9377 smorrison@layer7tech.com http://www.layer7tech.com