Manage Your Mesh Securing Public Cloud IoT APIs, and Building Private Mesh Trust Domains and Enclaves of Privacy to Integrate a Mesh of “Things” with Integrity.

Slides:



Advertisements
Similar presentations
Managing Service-Oriented Architectures Jim Bole VP Professional Services Infravio, Inc June 7,
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
WSO2 Identity Server Road Map
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Microservices under the microscope
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Fraser Technical Solutions, LLC
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Practical Steps to Secure your APIs for Mobile Mark O’Neill VP Innovation, Axway.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
T Sponsors Kent Weare Integration MVP, Author API Management Part 1 – An Introduction to Azure API Management BizTalk Summit 2015 – London ExCeL London.
OAuth-as-a-service using ASP.NET Web API and Windows Azure Access Control Maarten
First Look Clinic: What’s New for IT Professionals in Microsoft® SharePoint® Server 2013 Sayed Ali (MCTS, MCITP, MCT, MCSA, MCSE )
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Run State DeployPurchase Service Management Excellence Operate & Optimize.
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
Microsoft Dynamics NAV 2009 Building Web Services.
Offer highly configurable and scalable services Maintain an evergreen service Provide a platform built on security, privacy, and trust.
July, 2012 Citrix CloudGateway™ Technical Overview.
Module 7 Planning and Deploying Messaging Compliance.
DWR & Agency Geospatial Information Systems Services “Proposed DWR AGOL and Portal for ArcGIS Model” Danny Luong Nick Perez 8/12/14.
Module 7: Advanced Application and Web Filtering.
Hosted SharePoint. Part 3/3: Office Live as a WSS solution Speaker Name Microsoft Corporation Hosted.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Deconstructing API Security
EL 10 - From IoT to Mainframe, secured and all Mobile Integration with z Systems Aymeric Affouard IT Specialist
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Implementing Microsoft Exchange Online with Microsoft Office 365
EBIZ302 Jupiter Business Process Automation and Web Services David Fong Program Manager.
© 2015 TM Forum | 1 Service Level Management for Smart City Ecosystems and Trusted IoT Nektarios Georgalas, BT.
TM Forum APIs - Introduction, Primer and Methodology
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Blue Coat Cloud Continuum
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
ArcGIS for Server Security: Advanced
3 Ways to Integrate Business Systems to Partners
TrueSight Operations Management 11.0 Architecture
Cloud Security– an overview Keke Chen
Challenge, Simplify, Empower
Securing the Network Perimeter with ISA 2004
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Power BI Security Best Practices
Miao Jiang / Vladimir Vinogradsky
Amit R Bhatia / Puneeth Nayak
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
CLOUD COMPUTING SECURITY
AKAMAI INTELLIGENT PLATFORM™
Network Intelligence, Monetizing the Meter
SOA in Action Chapter 10 B. Ramamurthy 1/16/2019.
Dashboard eHealth services: actual mockup
Saravana Kumar CEO/Founder - Kovai Atomic Scope – Product Update.
Kevin Lam & Derek Li Introduction To Logic Apps
NIST Cloud Computing Reference Architecture
Red Sky Update “Watching the horizon for emerging health threats”
09 | Configuring Lync Online
Microsoft Data Insights Summit
Partner Facing Demo.
06 | SQL Server and the Cloud
Presentation transcript:

Manage Your Mesh Securing Public Cloud IoT APIs, and Building Private Mesh Trust Domains and Enclaves of Privacy to Integrate a Mesh of “Things” with Integrity & Availability

APIs are for any “Thing” and they don’t always belong on the Internet IoT Mesh

Wiring Things to Arduinos D1: 2.6 Volt RED LED & 330 Ohm Resistor A0: 3V Volt Motor & 330 Ohm Resistor

Tinkering With Things Turn on Buzzer Turn on Motor

Programming Things – Protect the Flash API

The First Step to Managing your Mesh is with an API Gateway Gateway Security Authentication Protection IAM Integration Encryption Mediation Quality of Service Paging/Caching Orchestration Scripting Public IoT Mesh Private Mesh ProTip: Customer Premise Equipment such as a WiFi Router or Cablebox should filter API traffic with an embedded gateway

Logical Mesh Management Architecture Private Mesh mynet/status or Public IoT Mesh

Use Gateways in the Cloud & Privately Private Mesh “Badge Readers” Private Mesh “Department X” Public Mesh

Public, Private, Hybrid

API Policy Configuration Templates Operational Policies oAPI Consumer Application Security Policy oAPI DDoS & Malicious Code Protection oAggregate Policy oAuthentication Policy oAuthorization Policy oICAP Antivirus Integration Policy oCache Policy oHTTP Security Policy oOAuth Security Policy oPaging Policy oPipeline Policy oWS-Security Asymmetric Binding Policy oWS-Security Message Policy oWS-Security Supporting Tokens Policy oWS-Security Symmetric Binding Policy oWS-Security Transport Binding Policy oWS-Addressing Policy oWS-Auditing SOAP Message Policy oWS-Auditing SOAP Service Policy oWS-Auditing Service Policy oWS-Auditing Transaction Tracking Policy oXML Policy Quality Of Service Policies oBandwidth Quota Policy oConcurrency Quota Policy oScript Policy oService Level Enforcement Policy oService Level Policy oThroughput Quota Policy oTimeout Policy Compliance Policies oAggregate oScript oWSI BP oXQuery

Design Complex Process Orchestrations Execute JavaScript on the API Gateway to Modify Request and Response Data and to invoke APIs with Branching conditions for Content Based Routing and API Response Aggregation

Monitor the Mesh

Manage Mobile App Access To Your Mesh with a Developer Portal A social developer engagement platform Integrated API documentation App access provisioning and monitoring Integrated discussion and newsfeeds Trouble ticket management Search with full content indexing API and App privacy and group management – essential for B2B and partner APIs Federation to enable new business models

Multisite Meshes Internet Zero Trust (I0T) Architecture IoT Mesh

Demo / Q&A

Restrict IoT API Operations with Scope Mappings

Manage Acceptance of API Legal Agreements

Quickly Test API OAuth Client App Integration

Verify Public Scope Tokens Cannot Access Private Scoped Operations

Enforce SLAs to Throttle Requests Per Minute

Manage IoT API Documentation with Swagger

Generate Self-Service IoT API Usage Reports

View Alerts and Participate in Discussion Boards