October 17-18, 2006 l Santa Clara, CA Runtime Intelligence A new generation of application security and performance controls Sebastian Holst

Slides:



Advertisements
Similar presentations
19 % System Center FY14 Revenue Growth Large enterprises actively using SC 63% SC customers actively using SCOM 30% SC customers still using.
Advertisements

Submitted by- Mr. Avinash Sadaphule 20 November 2009 Management Trainee, MKCL.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
GLOBAL E-BUSINESS AND COLLABORATION
E-commerce vs. E-business
CS 501: Software Engineering Fall 2000 Lecture 16 System Architecture III Distributed Objects.
Components and Architecture CS 543 – Data Warehousing.
SE 464: Industrial Information systems Systems Engineering Department Industrial Information System LAB 02: Introduction to SAP.
Clarity on the performance of IT Metricus at a Glance Metricus Metricus has been acknowledged for breaking new ground on IT performance management and.
Global E-business and Collaboration
SaaS, PaaS & TaaS By: Raza Usmani
May l Washington, DC l Omni Shoreham SaaS Market Opportunities Jerry Champlin Chief Executive Officer Absolute Performance Inc. Enabling Today’s.
1. 2 New Computing Models, and What They Mean to the Small and Mid Sized Business Consumer How your business can make practical decisions between “The.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Microsoft ® Official Course Monitoring and Troubleshooting Custom SharePoint Solutions SharePoint Practice Microsoft SharePoint 2013.
What is Business Intelligence Business Intelligence (BI) encompasses the processes, tools, and technologies required to transform enterprise data into.
Information Technology Audit
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
Copyright © 2014 McGraw-Hill Education. All rights reserved
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 3 – 10 – 2011 College Of Computer Science and Information, Information Systems.
Supporting tools in an IT Project & Portfolio Management environment Ann Van Belle -
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
operational-level system. management-level system.
041025_1 Your World-Class IT Business Solution _2 Bolt Networks, Inc. Providing you with world-class service and total technology solutions.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 2: Global E-Business and Collaboration Dr. Andrew P. Ciganek, Ph.D.
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
Highlights Builds on Splunk implementations – extending enterprise value to include mission-critical IBM mainframe data. Unified mainframe data source.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Kristin Antelman Liam Earney Kristen Wilson CNI December 2014.
Progress SOA Reference Model Explained Mike Ormerod Applied Architect 9/8/2008.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
Techcello Provides SaaS Lifecycle Management Solution to “SaaS-ify” Your Application Efficiently on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
GREG CAPPS [ ASUG INSTALLATION MEMBER MEMBER SINCE:1998 ISRAEL OLIVKOVICH [ SAP EMPLOYEE MEMBER SINCE: 2004 GRETCHEN LINDQUIST [ ASUG INSTALLATION MEMBER.
© 2013, published by Flat World Knowledge Chapter 10 Understanding Software: A Primer for Managers 10-1.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Reporting & Analytics Stephen Chan Senior Solution Consultant.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
Content Management & Enterprise Applications: Optimizing Business Processes for Efficiency John Clifton IBM ECM Technical Strategist
Internet of Things. Creating Our Future Together.
Company Regulator Problem = Exchange of data between regulated entity and regulator Regulator solution = Use XML Schema to define terms for exchange. Regulator.
Chapter 11 Information Systems Within the Organization.
Slide 1 © 2016, Lera Technologies. All Rights Reserved. SAP BO vs SPLUNK vs OBIEE By Lera Technologies.
Copyright © 2013 Dorling Kindersley (India) Pvt. Ltd. Management Information Systems: Managing the Digital Firm, 12eAuthors: Kenneth C. Laudon and Jane.
COMPANY PROFILE: CORENT TECHNOLOGY INC.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
CIM Modeling for E&U - (Short Version)
The Client/Server Database Environment
Prepared by: Assistant prof. Aslamzai
Enterprise Computing Collaboration System Example
NGAGE Intelligence Leverages Microsoft Azure Platform to Provide Essential Analytics for Hybrid SharePoint Server/Office 365 Environments MICROSOFT AZURE.
Enterprise Cloud SERVICE MANAGEMENT OPERATIONS MANAGEMENT
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.

Trend Micro Control Manager 5.0
Enterprise Resource Planning, 1st Edition by Mary Sumner
Web Services Interoperability Organization
History of IS within Organizations
2/24/2019 6:15 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

October 17-18, 2006 l Santa Clara, CA Runtime Intelligence A new generation of application security and performance controls Sebastian Holst PreEmptive Solutions

October 17-18, 2006 l Santa Clara, CA 2 DRAFT It’s 2:45 PM Do you know where your applications are?

October 17-18, 2006 l Santa Clara, CA 3 DRAFT

October 17-18, 2006 l Santa Clara, CA 4 DRAFT

October 17-18, 2006 l Santa Clara, CA 5 DRAFT The telling you what I’m going to tell you slide Runtime Intelligence: –what it is and why you might care Implications & requirements –What’s possible, what’s missing and what you can expect Runtime Intelligence applications and their value propositions –From software suppliers to enterprise consumers; security, compliance and business performance Early commercialization –Tamper notification and application usage

October 17-18, 2006 l Santa Clara, CA 6 DRAFT What is the point of work? Process People Information Information Systems

October 17-18, 2006 l Santa Clara, CA 7 DRAFT What is the point of work? The Application Process People Information Information Systems

October 17-18, 2006 l Santa Clara, CA 8 DRAFT The weakest link? Monitor Log Audit Applications Legally Blind to Usage context Deployment scope Operational materiality Stakeholder orientation Supplier interests

October 17-18, 2006 l Santa Clara, CA 9 DRAFT Process People Information Information Systems What is the point of work? Consumers Suppliers Channels Field Finance Users Partners Supply chain Regulators Investors service IT Service providers Development Sales Manufacturing CRM

October 17-18, 2006 l Santa Clara, CA 10 DRAFT Pressing issues for Runtime Intelligence Senior software executives want insight into channel performance, product and platform usage, quality of service and adoption Senior enterprise executives want IT security reassurance but lack necessary understanding Development managers want to align resources with security risks and platform requirements IT Security managers want credibility Product managers want insight into usage and behavior Businesses (and BUs) want, but are reluctant to provide, comparisons or guidance. Customer support needs reliable environmental data to provide better individual support, benchmark across platforms and over time. Information security and business executives often speak different languages All assessments are difficult : Too much data, not enough time.

October 17-18, 2006 l Santa Clara, CA 11 DRAFT What’s required Usage context –Design and development coordination Use case, materiality, coding and data conventions Deployment scope –Aggregation beyond individual IT domains SaaS or other managed service archipelago Operational materiality –Near-time integration with business metrics Activity monitoring & trend analysis incorporating site-specific business information, thresholds and tolerances Stakeholder orientation –Role-specific dashboards and reports Security, privacy, compliance, performance, financial, sales… Additional requirements –Best practices, security, privacy and liability

October 17-18, 2006 l Santa Clara, CA 12 DRAFT The development process Develop –Embed attributes: Entry & Exit points – tamper check methods –Utilize SDK: Attack, suspicious use case, positive use case –Application is enhanced at same stage as obfuscation Deploy –No boundaries Enterprise and supply chain ISV customer base Collect –Data is sent via Web Service (SOAP) to a managed service Collect, burst, fire and forget Opt-in and default is that no identifiable information is sent Enrich –Business information is periodically uploaded and integrated into a signal repository Connect supplier and supply chain to individual user, their “identify” and the business interests they serve Analyze and test through managed dashboards –Benchmarking, threshold monitoring, trending and visualization Application security, usage, compliance and business performance Distribute –Access to Runtime Intelligence can be delegated to constituent communities Increase opt-in and extend the value Act –Detective controls can lead to faster and more effective responses Environmental hostility, misuse, adoption best practices, etc…

October 17-18, 2006 l Santa Clara, CA 13 DRAFT Obfuscation Development Process Compiler Output Assemblies Dotfuscator Obfuscates Compacts Links -s Attributes Input Assemblies Source Code Map file External Configuration External Dependencies Obfuscation Attributes

October 17-18, 2006 l Santa Clara, CA 14 DRAFT Runtime Intelligence (SO-s) Development Process Compiler Output Assemblies (Including SO-s runtime) Dotfuscator With SO-s Attributes Input Assemblies Source Code SO-s Attributes Obfuscation Attributes SO-s Runtime Assembly Via SDK Via Attributes Map file External Configuration External Dependencies

October 17-18, 2006 l Santa Clara, CA 15 DRAFT SO-s Deployment Message Buffer SSL option Identifiable information is hashed Buffer is Tunable at development and runtime Messages optimized for performance Runtime SO-s DLL Application Signals Dotfuscator Instrumentation Obfuscation Pruning & Consolidation

October 17-18, 2006 l Santa Clara, CA 16 DRAFT SO-signal What’s in a signal? –Anything that can be logged, monitored or audited Events –Application/Process/Service events Start/stop, tamper, exception, … Suspicious, novel, best practice –Account access and management events Environmental data –Runtime stack, application family, application ID –License key, identity Application data –Relevant to signal to provide context How are signals organized? –Consistent structures and conventions are required to enable security, performance and other aggregation and analysis “Internally developed applications and independent software vendors should provide log data that supports centralized application security information and event management.” Define Application Security Log Output Standards, Amrit T. Williams, Gartner Inc. 4 May 2006

October 17-18, 2006 l Santa Clara, CA 17 DRAFT SO-s SaaS Data Validation & insertion into staging tables Signal Validation Processing for OLAP and source-specific access Application Signals Internet Dozens of servers, load balanced with fully redundant architecture and clean separation of tiers, supporting terabytes of extensible storage and security best practices that include regular threat modeling, 3 rd party evaluation, SAS70 Type II certified facilities, etc. Runtime Intelligence Virtual Repository Processing for OLAP and source-specific access Business Information Business information sources Internet Secure WebDAV Msg queue (MSMQ) Data Validation & insertion into staging tables Facilities

October 17-18, 2006 l Santa Clara, CA 18 DRAFT Software vendor monitoring field adoption and behavior Commercial product family Adoption, platform utilization & stability Tamper Relative stability of beta Pipeline activity and stability

October 17-18, 2006 l Santa Clara, CA 19 DRAFT View into active evaluations Pipeline dependencies Most active Having problems?

October 17-18, 2006 l Santa Clara, CA 20 DRAFT

October 17-18, 2006 l Santa Clara, CA 21 DRAFT Availability SO-signal: first generation of SO-s family distributed as a component of the Dotfuscator family –Available now for evaluation –Q4: Tamper notification 35% of the packaged software installed on personal computers (PC) worldwide in 2005 was illegal and circumvention of license controls is an increasingly common practice – Source: BSA – Amounting to $34 billion is lost revenue –Posing material security and liability risk to consumers –Q1: Usage, stability and environmental controls Offering usage, stability and adoption dashboards in near-time –Runtime Intelligence is offered on a subscription basis Software included in existing Dotfuscator license agreements

October 17-18, 2006 l Santa Clara, CA 22 DRAFT Questions? Sebastian Holst PreEmptive Solutions