1 / 18

Application Delivery Control

Application Delivery Control. Delivering the right application to the right user at the right time Sven Vande Cappelle – Technology Leader. Agenda. Introduction Right user, right time, right application Possible solution(s) Conclusion. Introduction.

rusti
Download Presentation

Application Delivery Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Application Delivery Control Delivering the right application to the right user at the right time Sven Vande Cappelle – Technology Leader

  2. Agenda • Introduction • Right user, right time, right application • Possible solution(s) • Conclusion

  3. Introduction • Right applicationfor right user at right time • Current trends: • Mobility • BYOD • (Application-layer) DDOS on the rise • Services in the cloud • IPv6 • HTTP 2.0 • Agile development • SDx

  4. Right user Confidentiality • Authentication • Services in the cloud • Different authenticationmechanismsbased on the different devices, different locationsfor the sameuser

  5. Right time Availability: • Localredundancy • Geographicalredundancy • Cloud bursting • DNS (Health based, DNSSEC, …) • Agile development

  6. Right application • Availability • IPv4 / IPv6 • Different TCP flavors • HTTP 2.0 / SPDY • Caching / Compression

  7. Right application • Integrity • Protectionagainstnetwork-layerandapplication-layer attacks • Where is my perimeter? • Confidentiality • HTTP 2.0 • 2048 bit certificates

  8. The solution(s)

  9. What Telenet can offer you • Security consultants: • Xavier • Marc • Andries • Bruno • Dimitri • Bart • Jurgen • Jochen • Kris • Brice • Dominique • Raphael • …

  10. Possiblesolutions => right application Reverse proxy: • IPv6/IPv4 • HTTP 2.0 / SPDY • SSL offload • Caching/compression • Web application Firewall

  11. Right application

  12. Possiblesolutions => right user Strategic point of control • SSO / SAML => allowsintegrationwith Office365, Google, Salesforce • Two factor authentication • Tokens • PKI • Allows different authenticationmechanismsbased on location, device, … Authentication as part of the infrastructure, notonlyas part of the application

  13. Right user Corporate Applications Corporate Users On-Premises Infrastructure SaaS Providers SAML Identity management Multi-factor authentication Users Access Management SAML Real-time access control Access policy enforcement Attackers Directory Services Office 365 Google Apps Identity federation Salesforce Strategic Point of Control

  14. Possiblesolutions => right time • Intelligent local load balancingwith health monitoring • Intelligent global load balancingwith health monitoring • Cloud bursting • Dynamic data center => Support forSDx • High performance DNSSEC solution • Agile deployment

  15. Right time On-Premises Infrastructure Global load balancing Infrastructure monitoring Advanced reporting Finite Resources Load balancing Custom business logic Object caching SSL management DNS Application User Cloud Administrator UI or REST API Cloud Management Automated Application Delivery Network Health/performance monitoring VM deployment User Business Unit Application Manager Load balancing Custom business logic Object caching SSL management On-Demand Computing Application Strategic Point of Control Cloud Hosting Provider

  16. More information Presentationscoming up: • Advanced malware / DDOS • Mobile Device management • Security services: • Penetrationtesting • Vulnerability assessment

  17. Conclusion

  18. Do you want toknow more?

More Related