Success Stories from IT Consolidations Corinne Irwin Karen Petraska John Sprague.

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

Unified Communications Bill Palmer ADNET Technologies, Inc.
Complete Event Log Viewing, Monitoring and Management.
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
CHANGING THE WAY IT WORKS Cloud Computing 4/6/2015 Presented by S.Ganesh ( )
Complete Event Log Viewing, Monitoring and Management.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
High Performance Computing Course Notes Grid Computing.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—4-1 Migrating from Voice Mail to Unified Messaging Migrating Voice Mail to Unified Messaging.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
GETS Transformation Kick Off Active Directory and Blackberry Migration Firewall and Network Changes 04/21/
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Active Directory: Final Solution to Enterprise System Integration
System and Network Security Practices COEN 351 E-Commerce Security.
Unified Logs and Reporting for Hybrid Centralized Management
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Identity and Access Management
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Windows 2003 and 802.1x Secure Wireless Deployments.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Clinic Security and Policy Enforcement in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
CredoGov VDI Introduction James Gunn
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Windows 2000 Active Directory Service COSC 513 Yongquan Cai 03/10/2001.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
NASA Shared Services Center Providing Agency IT Services 1 Bruce O’Dell Chief Information Officer NASA Shared Services Center August 18, 2010.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 7: Implementing Security Using Group Policy.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Stop Those Prying Eyes Getting to Your Data
City-wide Active Directory Project Town Hall II
Data and Applications Security Developments and Directions
Product Datasheet AppSense DataNow 4.1
Goals Introduce the Windows Server 2003 family of operating systems
Microsoft Virtual Academy
Presentation transcript:

Success Stories from IT Consolidations Corinne Irwin Karen Petraska John Sprague

Consolidation Success Stories  I3P continues NASA trend to provide consolidated enterprise IT services  Consolidations often perceived negatively: loss of local control, end-user focus  ICAM, NCAD, and NOMAD are three examples of Consolidation success stories  These consolidations provided enhanced: »Collaboration »Mobility »Scalability »Security »Simplicity of Architecture »Data and System integration »And yes, cost management Presentation Title —2— March 5, 2010

NASA’s Identity, Credential and Access Management Consolidation

What is ICAM? Identity, Credential, and Access Management provide Agency tools to answer these key questions:  Who are you?  How do you prove it?  What can you use?  Get more details at: » Credential Management Access Management Identity Management

Before ICAM  Ten or more implementations each for: »Identity Management »Badge Issuance »RSA Token accounts »Directory Services »More….  Isolated stovepipes or complex meshes  Need for paper processes to allow inter- Center collaboration »Slow, laborious Presentation Title —5— March 5, 2010

The Consolidation  Identity: A single, authoritative identity store for everyone that does business with NASA »Decommissioned Center x.500s and local identity systems  Credential: A few Agency credentials to access most facilities and systems »We have already retired hundreds of application-unique passwords  Physical Access: An Agency-wide system for all physical access to buildings and rooms  Logical Access: »NASA Account Management System (NAMS) allows access to over 1,000 applications »A single Active Directory forest/domain »The Access Launchpad for access to web applications »Consolidated RSA infrastructure for two-factor access where smartcards cannot be used Presentation Title —6— March 5, 2010

ICAM Logical Access Service Description 7

Integration of NCAD and Launchpad User’s desktop login allows pass-through access to any Launchpad application.

Collaboration  Smartcard login to the desktop, then get to over 500 applications without re-logging in  Access to Agency applications without a separate process to validate the user’s identity Presentation Title —9— March 5, 2010 Mobility  Any NASA worker can visit any NASA Center, and get: »Pre-authorized access to any building/room »Wireless access to the NASA network

Simplicity of Architecture  Literally hundreds of systems replaced with a handful  Over 1,000 paper forms replaced with a single system for account access  Hundreds of thousands of UserIDs/passwords retired Presentation Title —10— March 5, 2010 Cost Management SATERN migration: 80% drop in help desk calls for logon issues, account locks, and password resets

Security  We can ensure on a person-by-person basis that those who need IT security training have taken it  We know what each person has access to  When someone leaves NASA, we can immediately: »Disable AD and Launchpad accounts »Revoke PKI Certificates and Tokens »Close Accounts managed in NAMS Presentation Title —11— March 5, 2010

Data & System Integration  SATERN Integration »Ensures IT security training is complete »Can set other training courses as pre-requisites for any access granted through NAMS  Provide “Basic Level of Entitlement” access to IT systems based on Identity attributes  Various Directories all “match:” »IdMAX »NCAD »NOMAD GAL »NASA Enterprise Directory Presentation Title —12— March 5, 2010

Considerations  NASA’s ICAM allows Trust throughout the Federal government and beyond »First, NASA must trust NASA »Configuration settings needed on desktops, networks, to enable NASA Trust »Any change that is managed locally is difficult to manage well  Centrally managed infrastructure services provide a standard baseline against which we can assess the impact of changes, be they new federal mandates or implementation of new functional requirements.  At the same time, a single change impacts the entire Enterprise »Is everyone ready? »Has it been thoroughly tested? »Any unintended consequences? Presentation Title —13— March 5, 2010

NASA’s Active Directory Consolidation

NASA Consolidation of Active Directory  Active Directory is a Microsoft tool that »Serves as a directory of people in the environment »Provides an authentication mechanism to AD-aware applications »Provides a coordinated management environment of groups, objects, and policies for an organization  In most organizations, when you log in to your Windows or Mac computer, you are authenticating to Active Directory Presentation Title —15— March 5, 2010

Historical Perspective  NASA historically did not manage Active Directory as an integrated environment for the Agency »Many small organizations had their own AD instances. There were likely more than a hundred domains Agency-wide, including child domains and individual instances of AD, and an unknown number of workgroups »In many cases, user accounts from different organizations were issued for specific internal purposes; collaboration using a common credential was not possible »Organizations established external “trust relationships” that were managed with no common set of criteria and could compromise connected NASA resources Presentation Title —16— March 5, 2010

The Consolidation  Began in 2006, completed in Summer 2010  Migrated 57,000 desktops; 66,000 users; 3,700 servers  Reduced to a single forest, single domain  Eliminated all 35 two way trusts »Allowing eleven one way trusts (they trust us, we do NOT trust them) to continue to exist temporarily  Replaced hundreds of domain controllers with 65 for the entire Agency  Reduced an unknown number of AD domain administrators (>100) to eight Presentation Title —17— March 5, 2010

Overall Improvements  Designed to enable mobility »In most cases, residents from one NASA center can go to another NASA center, put their laptop on the network and it works! »Working toward getting access to home resources like file shares and printers  Enables users from various centers to collaborate across centers  Enables push of consistent policies across the Agency  Enables seamless access to authenticated wireless and applications across the Agency Presentation Title —18— March 5, 2010

Security Implications  A single, simplified, centrally managed infrastructure that we have full control over and full understanding of what it is »Deployed a continuous security monitoring tool across all of AD. Events of all kinds reported and investigated instantly. »Deployed a third party management system that tightly and granularly controls configuration changes and who can make them  By eliminating and prohibiting trusts with entities containing non-ICAM vetted user accounts, we have a clear view of who we plan to allow into our systems  We can enforce consistent security and management policies on all objects Presentation Title —19— March 5, 2010

Considerations  A change of this magnitude with such a large number of migrations is a huge coordination and project management challenge »In addition to requirements, design and operational readiness reviews, we did a migration readiness checklist, migration readiness review and migration completion review at each center  Simple, understandable outreach materials for end users are essential  Do not underestimate the level of effort needed to get buy-in and cooperation from all those organizations who are losing control of their domains. Presentation Title —20— March 5, 2010

NASA’s Consolidation

NOMAD NASA Operational Messaging And Directory Service A consolidated Microsoft Exchange-based groupware infrastructure for all NASA civil servants and contractors Presentation Title —22— March 5, 2010

NOMAD Origins  In 2004, Administrator O’Keefe directed the NASA CIO to transform how NASA provided IT services to the Agency workforce »At the heart of the memo was the direction to provide an integrated messaging and calendaring solution allowing NASA to communicate as a single entity.  First center (HQ) fully migrated in March 2005  By 2008 and 4 CIOs later, all 10 major NASA centers are migrated onto NOMAD Presentation Title —23— March 5, 2010

Goals  Provide a uniform messaging and calendaring environment  Integrate both civil servants and contractors  Offer access from anywhere  Increase security  Use open standards for interoperability  Support NASA’s heterogeneous environment  Minimize downtime and single points of failure  Leverage existing resources  Reduce costs  Allow the Agency to focus on bigger issues Presentation Title —24— March 5, 2010

NOMAD is an integrated system of systems Presentation Title —25— March 5, 2010 Windows Linux Mac OSX Exchange Servers NASA Post Forwarders/Relays Archiving System Live Communication Server IM System Center Monitoring ProofPoint Security System Blackberry Servers Large File Transfer System Virtual Test Environment Over 175 Servers 9 Major Subsystems 2 Fault-tolerant Locations JSC MSFC

NOMAD Consolidation Benefits  Mobility  Scalability  Security  Uniformity  Cost Management  Visibility  Culture Change Presentation Title —26— March 5, 2010

Mobility  Issue »NASA is a globally distributed and very mobile population »NASA’s centers have a variety of firewall policies and configurations  Solution »To guarantee access from any center or facility, NOMAD was designed to be an “external” service Similar to many of today’s cloud offerings »Most O/Ss and devices are enabled through a suite of secure access protocols Presentation Title —27— March 5, 2010

Scalability  NOMAD’s first user quantity was about 4,000  Today, NOMAD supports around 60,000 users  The fundamental design of the system has not changed between those two capacities, just the number of servers  NOMAD was architected to continue to scale to meet NASA’s needs »The dual-site fault-tolerant architecture allows us to load servers and storage systems with only a 50% load Presentation Title —28— March 5, 2010

Security  By drastically decreasing the number of servers across the Agency, consolidating to NOMAD reduced the attack surface »Entire Exchange backend infrastructure can only be accessed via client access servers  Multiple layers of security are applied against viruses, malware and vulnerabilities »A variety of anti-virus engines and databases are actively scanning at all times »Multiple firewalls and security zones isolate access as appropriate  Agency security policies can be enforced Presentation Title —29— March 5, 2010

Uniformity  Users all have address »A NASA identity is a NASA identity regardless of the center they currently reside at  Every NOMAD provisioned desktop, laptop and smartphone can access NOMAD services regardless of where they are »An Internet Café network looks exactly the same as a NASA center network  Since NASA must comply with federal standards and regulations, a consolidated messaging system furnishes a consistent application of governance Presentation Title —30— March 5, 2010

Cost Management  Did NOMAD reduce the cost of messaging across the Agency? Who knows????  What we do know is…  Hundreds of servers retired  Numerous folks are no longer managing servers and can focus on more important activities  Software licenses united  Hardware consistently refreshed  NASA now has an understanding of the cost to provide “You cannot manage what you cannot measure” Presentation Title —31— March 5, 2010

Visibility Presentation Title —32— March 5, 2010 NASA understands its messaging traffic better than ever before

Culture Change Presentation Title —33— March 5, 2010