Alma Cloud & Open Platform Overview

Slides:



Advertisements
Similar presentations
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Advertisements

The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
Security Controls – What Works
Unified Logs and Reporting for Hybrid Centralized Management
SaaS, PaaS & TaaS By: Raza Usmani
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Ex Libris Developers Network Develop. Experiment. Collaborate.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Managed IT Services JND Consulting Group LLC
Clouding with Microsoft Azure
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Cloud Faxing for Law Firms
Security on OpenStack 11/7/2013
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
COMPANY PROFILE: CORENT TECHNOLOGY INC.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Customer Guide to Limited-Time Offer
Distributed Cache Technology in Cloud Computing and its Application in the GIS Software Wang Qi Zhu Yitong Peng Cheng
Hybrid Management and Security
The Impact of Cloud Technology on Multi-Unit Operators
New Heights by Guiding Them into the Cloud
Federated IdM Across Heterogeneous Clouding Environment
Logo here Module 3 Microsoft Azure Web App. Logo here Module Overview Introduction to App Service Overview of Web Apps Hosting Web Applications in Azure.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
CLM USE GUIDE FOR MICROSOFT TRUSTED CLOUD
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Veeam Backup Repository
Introduction to Cloud Computing
Cloud Computing.
OpenNebula Offers an Enterprise-Ready, Fully Open Management Solution for Private and Public Clouds – Try It Easily with an Azure Marketplace Sandbox MICROSOFT.
Cloud Testing Shilpi Chugh.
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Pack Your Park by Modernizing Your Business Online
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
IS4680 Security Auditing for Compliance
Data Center Colocation Services.
County HIPAA Review All Rights Reserved 2002.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Pack Your Park by Modernizing Your Business Online
Data Center Colocation Services.
Increase and Improve your PC management with Windows Intune
Designed for powerful live monitoring of larger installations
Windows Azure Hybrid Architectures and Patterns
April 17, 2009 eGov Workshop: Cloud Computing and Interoperability Daniel Burton Senior Vice President Global Public Policy Salesforce.com.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
PerformanceBridge Application Suite and Practice 2.0 IT Specifications
IT Management Services Infrastructure Services
Productive + Hybrid + Intelligent + Trusted
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
Cloud Computing for Wireless Networks
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

Alma Cloud & Open Platform Overview Dvir Hoffman VP, Product Management & Marketing 1

Cloud Computing in Few Words… It is a resource delivery and usage model Enables getting resources (Software and/or Hardware) via the network Resources are dynamically and infinitely scalable and can be used anytime anywhere. “The concept, quite simply, is the vast computing resources will reside somewhere out there in the ether (rather than in your computer room) and we’ll connect to them and use them as needed.” Jonathan Weber (The Times Online)

The Power of SaaS (Software-as-a-Service) SaaS is a software application delivery model designed to be deployed as a service ‘in the cloud’. Key characteristics A multi-tenant architecture Centralized update and management of software Updates are frequent and completely transparent to the users

Ex Libris Worldwide Data Centers Canada China Chicago Amsterdam PRE PRODUCTION Singapore

The Must-Have Features of Cloud-Based SaaS Multi-tenancy Security Low TCO Cloud Based SaaS Reliability Openness Scalability

The Cloud Computing SaaS Model: Multi-tenant, Subscription Reliability Openness Multi-tenancy Low TCO Scalability Security Multi-tenant Subscription Faster time to value Economies of Scale Scalability Automatic Upgrades “Without multi-tenancy, a SaaS offering can’t cultivate a Web 2.0-like community of developers who add functionality that all can share.” Eric Knorr (InfoWorld)  Ex Libris Ltd., 2014 - Internal and Confidential

Relentless on Security – a Multi-Dimensional Approach Physical 24/7 security, biometric authentication, Redundant power systems including UPS and generators, video surveillance, authorized personnel Infrastructure Hardening, change and configuration management, asset management, access control, patch management, password policy Network Vulnerability scan and protection, Intrusion Prevention System (IPS), malware prevention, segregation, TSL/SSL encrypted communication Application Security Development Lifecycle (SDLC), Continues monitoring ,vulnerability and Penetration tests, OWASP Top10 Data Data isolation (Oracle VPD), encryption, retention ,data sanitization (DoD 5220.22-M) Identity & Access Control SSO, S/LDAP, SAML/Shibboleth, Role-Based Access Control (RBAC) Business Continuity High availability, database cluster, storage redundancy, frequent snapshots, offsite backups, 24x7 HUB, ISO 22301 certified Monitoring & Incident Mgmt 24x7 monitoring, Ex Libris Security Officer, Ex Libris Privacy and regulation Officer, security and privacy breach notification Security awareness training, privacy policy, confidentiality agreements, adherence to regulations Human Resources ISO 27001, ISO 27018, ISO 22301, SSAE-16 SOC, GDPR, Data processing agreements, independent audit, risk management Compliance & Audit

Alma Multi-Tiered Security Model Reliability Scalability Security Openness Multi-tenancy Low TCO Secured data Secured network Secured connection  Ex Libris Ltd., 2014 - Internal and Confidential

Certified with the Most Rigid Security Standards MAINTAIN EXISTING CERTIFICATIONS ISO/IEC 27001:2013 Data centers are SSAE-16 certified (formerly SAS-70) ICO Registered (UK Data Protection Act) CSA STAR – Self assessment ISO 27018:2014 Privacy Standard US Federal - FedRAMP (Alma/Primo) - Cont. in 2018 PLAN FOR NEW CERTIFICATION IN 2017: 22301:2012 ISO 22301: 2012 - Business Continuity Management Systems Requirements GDPR – EU Data Protection Regulation PLAN FOR NEW REGULATION IN 2018: Main principles similar to Data Protection Act (DPA) Compliance, security, and data privacy are our priority Ex Libris does not share customer data with 3rd parties Dedicated Data Protection Officer (DPO) GDPR becomes enforceable May 25, 2018

Alma Cloud Reliability Openness Multi-tenancy Low TCO Scalability Security No single point of failure Fault tolerant Seamless and automatic updates The physical hardware layer is virtualized to provide a flexible adaptive platform to improve resource utilization The combination of Virtualization layer and the Management layer ensures that resources in a data center are efficiently managed and can be provisioned, deployed, and configured rapidly in order to support scalability Monitoring the entire environment Tracking Bottlenecks

No Single Point of Failure Reliability Openness Multi-tenancy Low TCO Scalability Security Full Redundancy Multi levels data redundancy No single point of failure Instant Failover No interruption in service Instant and transparent failover Load Balanced Eliminating server stability issues Requests are handled by multiple servers Increases performance Protects from sudden traffic spikes DB1 DB2 WEB1 WEB2 LB1 FAILOVER LB LB2

Application Protection Data Center Design Data Center Design Reliability Openness Multi-tenancy Low TCO Scalability Security Multiple ISPs Edge Routers Firewalls Application Protection Load Balancers Intrusion prevention and vulnerability protection Networking Host Host Storage Server Guest Guest Guest Guest

Relentless on Security – a Multi-Dimensional Approach Reliability Openness Multi-tenancy Low TCO Scalability Security Snapshots Several storage snapshots per day Full Backup Available on a daily base Replication Using a secured remote storage facility Recovery Data is consistent at remote and local facility Availability Data available at any time locally and remotely

Proactive Performance Monitoring

Monitoring End User Experience 96.6% up to 3sec 96.1% avg up to 3sec CA01 EU00 EU01 EU02 98.7% up to 3sec NA01 NA02 NA03 CN01 96.1% avg up to 3sec AP01 96.2% up to 3sec

Monitoring Business Transaction Real Time Availability (Primo)

Internal Cloud Architecture Monitoring

Multi-Tiered Scalability Reliability Openness Multi-tenancy Low TCO Scalability Security Capacity Monitoring Environment Capacity Planning Scalable Integration interfaces Scalable Web requests handling Scalability Management Scalable Application Services Instant Scale via virtualization The physical hardware layer is virtualized to provide a flexible adaptive platform to improve resource utilization The combination of Virtualization layer and the Management layer ensures that resources in a data center are efficiently managed and can be provisioned, deployed, and configured rapidly in order to support scalability Scalable Hardware  Ex Libris Ltd., 2014 - Internal and Confidential

The Alma Developers Platform Reliability Openness Multi-tenancy Low TCO Scalability Security The Alma Developers Platform Alma integrations are achieved using a number of techniques RESTful APIs, Publishing Services Data Extract & Import Adapters & Interfaces Alma exposes data for integration purposes in a number of ways: Web Services - Specialized Web Services for specifically tailored purposes Publishing - The publishing process is used for ongoing synchronization of an external discovery system’s knowledge of Alma’s repository Data Extraction & Import - Inventory parts of the Alma database may be exported and imported Online integrations with applications Extending workflows Exposing repository information to discovery tools Sharing data with 3rd party solutions Leveraging industry standards, adapters and integration interfaces

The Alma Developers Platform Reliability Openness Multi-tenancy Low TCO Scalability Security The Alma Developers Platform Publishing scholar Data Extract & Import RESTful APIs & Web Services Finance Systems Student Info Bursar Bulk BIB Record Manipulation Course Management Mobile Resource Sharing Vendor Systems

API Platform – Deploying a Secure & Scalable API Infrastructure THIRD PARTY APPS INTEGRATIONS DEVELOPERS MOBILE APPS DEVELOPER PORTAL Documentation Tech Blog Code & Apps API Console Forum API PROXY Access Control Threat Protection Routing Caching Throttling api API CONTROL & ANALYTICS Policy Management Versioning API Analytics API Monitoring Auditing

Alma APIs in Action Patron card via portal Custom Portal/discovery Real time synchronization with SIS Sentry Security Gate check Cash payment integration Course Reading List for Mobile Reading Lists integration

APIs: Growth in the last 3 years More than 70M API In August 2017 2015 2017

APIs Are Critical To Our Success 50% of all transactions via APIs

ExLibris Developer Network  Ex Libris Ltd., 2014 - Internal and Confidential

Support and service calls Reliability Openness Multi-tenancy Low TCO Scalability Security System Management & Administration: Before and After Moving to the Cloud Server, network and DBA Application Support and service calls O/S management Oracle upgrades Back-ups Disaster recovery Test environments Security infrastructure Service packs Version upgrades Client deployment Test application environment Under the hood diagnostics Implementing proposed fixes and testing solutions Capacity planning & tuning Logging-debugging Firewall Command line Liaison between local server/app teams and Ex Libris Configuration and customization Logging & tracking service calls Green = cloud managed Purple = changed Blue = unchanged

Alma Sandbox Environments Copy of customer’s configuration No (based on subscription limits) Yes Standard Sandbox Premium Sandbox Standard Ex Libris data Data Copy of customer’s data Configuration Standard Ex Libris configuration Number of records limited Early access to new release (upgraded before production) Available for additional annual fee Suitable for functional / configuration testing Suitable for API development testing Cost Structure Included in standard Alma subscription fee Suitable for training staff API  Ex Libris Ltd., 2014 - Internal and Confidential

For more details: Securing Next-Generation Library Services Thank you For more details: Securing Next-Generation Library Services