Infrastructure and Security Marcus J. Ranum Network Flight Recorder, Inc.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Security Issues of E-commerce. Tools to manage the risks.
All Contents © 2003 Burton Group. All rights reserved. Identity Management Market Update Prepared for Cal State Universities Mike Neuenschwander senior.
Chapter 7 Advantages and Disadvantages of Web Services
Expanding Your Business through electronic commerce aka e-commerce.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Tutor2u ™ GCSE Business Studies Revision Presentations 2004 Growing a Business.
Public Policy Issues in the Communications and Infrastructure Services Policy area Geoff Huston APNIC June 2011.
Why your company should use ITIL Ari Rantala University of Jyväskylä Information system science.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. Taking up the Task of Business Transformation Global CIO Study 2015.
Innovation and IS Kieran Mathieson. What is Innovation?  Long definition Successful innovation is the creation and implementation of new processes, products,
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
NetApp and Microsoft Alliance. Content  Technology and the Today World  Who are these players?, Alliance Overview  Motive & Fit and Mutual Benefit.
BUSINESS MODELS MODELS What is a MODEL ? Model in physical world A small object, built to scale, representing a larger, more complex object.
The Promise & Perils of Metasearching Roy Tennant California Digital Library Roy Tennant California Digital Library.
Building the Ultimate IT Portfolio from Scratch Peter Grant Advisor, IBRS
What is it that we do here? What are we paying you for?
Banking Clouds V International Youth Banking Forum.
School Market Outlook Challenges and Opportunities George McGuirk CFO/COO Pearson US School BMI Annual Conference October 24, 2006.
UNDERSTANDING VALUE THROUGH VISUAL QUADRANT ANALYSIS BY ELIZABETH BOETTCHER, RED BRICK MARKETING, INC. An Exercise For Small Business Owners.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
DIGITAL TRENDS Omni-channel will continue to dominate the conversation in We have already moved from multi-channel to omni- channel
MARKETING THAT WORKS David Camp SVP Business Development.
David I. McGeown "Where's the value in on site generation? Can real time metering and dispatch make a difference?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Set tongues wagging… Let WAG do the talking for your business; open doors to new opportunities and create new business relationships that last.
Project Management for SaaS implementations Greg Robleski, PMP, CRISC Lead Decisioning Systems, Inc.
1. 2 IT innovations in specialized areas where competitors will have difficulty copying Excellence in design of processes and activities and how they.
Sheila Brisland Product Manager Software as a Service (SaaS)
EIT ICT Labs ICT Innovation & Education & Business Our mission is to foster innovative technology and entrepreneurial talent for economic growth and quality.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
Career Mythbusters 2.0 Lee Kushner May 16, 2012 NY Metro ISSA Chapter 1.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Internships, Certifications, and Skills: Setting the Groundwork for Your First Position in Industry Kristopher Nelson, Manager U.S. Bank April 16 th, 2004.
SmartOffice: The Journey from Technology Expense to Revenue Generation Pat Kulzer Manager, Client Development & Marketing Strategies Securian Financial.
THE ALTA INVITATIONAL Resetting A Company To The New Normal.
INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux.
Ensuring Clients Achieve Superior Value in the Digital Economy Ensuring Clients Achieve Superior Value in the Digital Economy 12 th Software Engineering.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
1 Managed IT Services Sharing my knowledge and experiences Tom Smyth – Chairman and Managing Director.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Managing Records in the Cloud Central Missouri Chapter Jesse Wilkins April 16, 2009.
Mobile Security. Security is Hard Just this year: Denial of service Credit card compromise I Love you Cost to manage security quickly becomes prohibitive.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
© Dr. Karl Popp Acquiring companies in a digitalized world Dr. Karl Popp Follow
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
CSPC 464 Fall 2014 Son Nguyen.  Attendance/Roster  Introduction ◦ Instructor ◦ Students  Syllabus  Q & A.
MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS © 2011 Wolf & Company, P.C. The Future of Technology in Financial Services Matt.
CONDUCTING A FEASIBILITY ANALYSIS
Axis AI Solves Challenges of Complex Data Extraction and Document Classification through Advanced Natural Language Processing and Machine Learning MICROSOFT.
Services – a perspective on building applications Richard Swale ETSI TIPHON Wg1 chair VoIP Technologist BTexaCT ITU Workshop on IP Networking and Mediacom.
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
and Beyond : Vision for the Worldwide IT Market Stephen Minton Director, Worldwide IT Markets International Data Corporation.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Welcome!. State of the company Community Today’s new currency DataFlex, VRW & DAI An invitation The year ahead.
1 Chapter 1: Product Development in the Changing World Introduction New technologies are changing the world we live in. How can a company succeed in this.
Chapter 17 (pgs.445FL1-471) The Economic System. Chapter 17 Section 1 (pgs ) The Economic System at Work ESSENTIAL QUESTION: WHAT ARE THE DIFFERENT.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
By Celina Jonesi. Many people who are internet savvy cruise around on the internet without seeing its opportunity and not getting to know of the money.
Best Things Done in Managing Hybrid Clouds. Businesses are moving to cloud set-up. However the concerns are security issues, regulatory obstacles, abnormal.
Secure Connected Infrastructure
IBM Start Now Host Integration Solutions
Presentation transcript:

Infrastructure and Security Marcus J. Ranum Network Flight Recorder, Inc.

Marcus Ranum would like to apologise in advance for any indiscretions he may commit on: ___________________ April 30, 1998

Topics The Market Security standards How do we improve things? The role of strong foundations Can DCE be a player? Conclusions

The Market Key factors affecting security –Commoditization –New entrants –Consolidation –New protocols –The heat-death of the body standard

Market: Commoditization Security market ( ) consisted of small players “one trick ponies” Sharp competition has driven price of security products down... –Simultaneously distorting perception of marketability (e.g.: firewall madness of 1993) –Makes cost-sensitive customers avoid infrastructural security in favor of hacks

Market: New Entrants New entrants to market ( ) are focused on staking out a market niche Less interest in integrating/cooperating with larger/broader efforts Time to market dominates startups –No time to attach to big, cumbersome standards efforts with high cost of entry

Market: Consolidation 1998 security market is consolidating Most consolidation is security vendors buying eachother (“rollups”) Emphasis (and driver) of consolidation is coherent management and integration –This is a niche for foundation applications –But they are being built today “ad hoc”

Market: New Protocols New protocols are constantly being added –Many have unpredictable/undocumented properties –Time-to-market concerns override security and compatibility/infrastructure Huge potential for new security flaws is completely un-addressed

Market: Standards Bodies The standards bodies have not yet realized that the world is passing them by at 1,000 miles per hour Transition from “standards are important” to “market share is important” in –Standards efforts are moribund but don’t know it yet - they are too slow

Security Standards Key Security Standards for the future –Digital certificates –Web –System management –Delegation and definition of trust

Standards: Certificates Not quite ironed out yet, but they will be –Too much money invested already If they become widely deployed for E- commerce they will be used in virtually all security solutions –Good opportunity for infrastructure systems that handle them –But today they are still seen as black art

Standards: Web Web may become the next generation of middleware/foundation for other applications Is DCE’s biggest competition http and SSL? –I think it is

Standards: System M’gment System management is the Next Big Area for innovation –(I may be late, judging from the Compaq/Microsoft/CA/HP announcements this week) Management of infrastructure using the infrastructure itself –Security would be nice

Standards: Trust Delegation Nobody is really paying attention to this yet –Certificates are a tool for building it but are groping slowly in that direction Foundation/middleware such as DCE should take it into account –It must be manageable (and management must also support trust delegation)

How do we Improve? Infrastructure Self-Diagnosis Management

Improve: Infrastructure We are in a maze of little fiddly infrastructure protocls, all different –RPC/ONC/SMB/HTTP/SSL –IPSEC/SOCKS –….ad nauseam The biggest single security improvement we can make is to adopt a common secure foundation

Improve: Self-Diagnosis Software and system are never going to get less complex Therefore they must grow better at managing complexity –Which means improved self-diagnosis Are systems like DCE easy enough to deploy that my mother could do it?

Improve: Management We need –Security protocols that are manageable –Management protocols that are secure Can DCE be managed by an office secretary? It is management hassles that are making NT take over the desktop –It’ll have its own problems

Improve: Strong Foundations New applications need to be able to rely on foundation communications libraries that include: –Access control (firewalling) –Privacy policy (VPN) –Identity and Authorization (authentication and permissions databases) Can DCE help?

DCE a Player? No Yes

No Outside of a select circle, DCE is almost completely unknown DCE’s competitors are smaller, faster, and more reactive to industry requirements –The “fast frog syndrome” Too many vendor interests hamper ability to react (what about the Web?)

Yes You tell me

Conclusions Reactivity Foundations

Conclusions: Reactivity Ability to rapidly react to changing market reality will make or break any technology currently being deployed –Whether it’s good or not is irrelevant as long as it’s tailorable and works by next week

Conclusions: Foundations The big challenge is to get DCE leveraged into the foundations of some kind of “killer app” –It must be simple to manage –It must be cheap –It must be lightweight (for NT desktops)

Summary Good luck!