Download presentation
Presentation is loading. Please wait.
2
If it’s not automated, it’s broken!
Don’t just virtualize your current (bad) habits! Failure is the ONLY option Make cloud useful In God we trust, the rest we automate — unknown DevOps Engineer
3
What is CONS3RT? CONS3RT delivers cloud and security orchestration …
simultaneously across multiple public & private clouds… with Automation and Validation… and DevOps across the your favorite tools and the entire lifecycle. It provides self service access to… automated provisioning of applications, configs & data, source code builds, and ElasticTest™, for functional & performance tests, security scans, and network defense. Along with… workflow orchestration, a whole new level of system design discipline, and access to shared library of assets for true collaboration.
4
Hanscom milCloud (Hanscom AFB, MA)
CONS3RT, HmC & MOC Hanscom milCloud (Hanscom AFB, MA) Hanscom Clouds Mobile App Cloud Mass Open Cloud Other public clouds
5
Life Cycle Automation CONS3RT empowers the user with the ability to …
Web Application Web Application CONS3RT empowers the user with the ability to … work in private, secure project spaces collect and share building blocks use these to create simple to complex multiple system scenarios install and configure multiple software applications optionally add the source code launch into one or more public and/or private cloud resources easily and securely connect to systems run manual & automated tests/scans save, manage, update and reuse these repeatable designs build community around similar development challenges and automate the process! Web Application Asset Library Operating System Test Cases Software Data Sets Configurations Scenarios Virtual Machines Hardware Devices Source Code Project A Project B Project C Project D
6
Key Features Automated Security ElasticTest™ Cloud Abstraction
Baked into design & execution Application quality Configuration discipline & management Source Code Analysis Industry Best Practice Lockdown Vulnerability Scans Penetration Testing Patch Management Policy Enforcement Monitoring Configuration & Analysis Entire Ecosystem into Design Validate Alternatives in Real Time Built on-demand Tool is local so it can reach its target Isolated activities Efficient use of license investment No management of system necessary No expertise required to execute but… Power users can still customize Enabled Tools Tenable Nessus • HP Fortify Web Exploit • Worksoft Certify CA LISA • Script smartBear SoapUI • Sonarlint Cloud Abstraction Remote Access Not Public vs. Private but Public & Private IaaS is already commodity Make choice real time based on: Performance • Cost Security • Access Tasking • Location Unified interface Consistent access to system Portability, scalability, availability Make elasticity more than a buzz word Secure, encrypted access to deployed systems RDP, VNC &/or SSH File transfer Clipboard to/from local machine All via browser, no plugin required! Accredited solution Proven performance Built in load balancing Removes major barrier to adoption Works across all cloud technologies
7
New features every two weeks…
Impact Level Governance Custom user properties Template Builder Resource optimizer Signed code Instance limits Asset states Lease times Ubuntu support ARM Board support (IoT) Container templates Regular usability improvements User defined CPU/RAM/Storage ReST API Cloud portable system designs User settable passwords Wizards and builders Regular security enhancements Cloudspace create Virus scan Asset updating Categories Slack Integration
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.