1 / 11

High-Performance Applications in a Secure Environment

High-Performance Applications in a Secure Environment. Michael Tepedino. Why are we here?. Large Amounts of Bandwidth University Partnerships Sharing Lessons & Knowledge Being Ready for the Next Big Thing Moving Technology into Production Faster. Hurdles for High Performance Applications.

ronli
Download Presentation

High-Performance Applications in a Secure Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. High-Performance Applications in a Secure Environment Michael Tepedino

  2. Why are we here? • Large Amounts of Bandwidth • University Partnerships • Sharing Lessons & Knowledge • Being Ready for the Next Big Thing • Moving Technology into Production Faster

  3. Hurdles for High Performance Applications • Networks • High Latency • High Bandwidth • Public Accessibility • TCP • Security / Encryption • Data Speeds

  4. The Corporate Perspective • Looking for the common ground – Not Looking to Push the Newest Technology • Global Differences – MAN’s, LAN’s & WAN’s • Applications – Run the Business • SECURITY – SECURITY – SECURITY • How do We Apply Lessons Learned

  5. Why Have a Secure Environment? • Intellectual Property • Hackers • DoS • Viruses • Disaster Recovery • Secured Communications

  6. How do we decide what to secure? • Corporate Policies • Specific Tunnels for Internal Research Test vs. External Tests with Partners • What is the Data Being Used For

  7. Securing the Network • VPN Tunnels • Internet2 Public Access • Multiple sites • Firewalls • Hardware • Things to watch for • Monitoring • Being Proactive

  8. VPN Tunnels • Secure vs. Open Ended • Latency • Protocol Dependent • Design is Very Important !

  9. Public Internet2 Access • Convenience? • True Life Testing • A Very Real Scenario Needed

  10. Firewalls • Hardware • How to Choose • Differences • Things to Watch for • Avoidance is the Best Solution

  11. Thank Youmtepedin@ncsus.jnj.com

More Related