application delivery control

18
Telenet for Business Telenet for Business Application Delivery Control Delivering the right application to the right user at the right time Sven Vande Cappelle – Technology Leader

Upload: rusti

Post on 17-Feb-2016

35 views

Category:

Documents


0 download

DESCRIPTION

Application Delivery Control. Delivering the right application to the right user at the right time Sven Vande Cappelle – Technology Leader. Agenda. Introduction Right user, right time, right application Possible solution(s) Conclusion. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Application Delivery Control

Telenet for BusinessTelenet for Business

Application Delivery ControlDelivering the right application to the right user at the right time

Sven Vande Cappelle – Technology Leader

Page 2: Application Delivery Control

Agenda Introduction Right user, right time, right application Possible solution(s) Conclusion

Page 3: Application Delivery Control

Introduction Right application for right user at

right time Current trends:

Mobility BYOD (Application-layer) DDOS on the rise Services in the cloud IPv6 HTTP 2.0 Agile development SDx

Page 4: Application Delivery Control

Right userConfidentiality• Authentication

Services in the cloud Different authentication mechanisms based

on the different devices, different locations for the same user

Page 5: Application Delivery Control

Right timeAvailability:• Local redundancy• Geographical redundancy• Cloud bursting• DNS (Health based, DNSSEC, …)• Agile development

Page 6: Application Delivery Control

Right application Availability• IPv4 / IPv6• Different TCP flavors • HTTP 2.0 / SPDY• Caching / Compression

Page 7: Application Delivery Control

Right application Integrity• Protection against network-layer and

application-layer attacks• Where is my perimeter?

Confidentiality• HTTP 2.0• 2048 bit certificates

Page 8: Application Delivery Control

The solution(s)

Page 9: Application Delivery Control

What Telenet can offer youSecurity consultants:• Xavier• Marc• Andries• Bruno• Dimitri• Bart• Jurgen• Jochen• Kris• Brice• Dominique• Raphael• …

Page 10: Application Delivery Control

Reverse proxy:• IPv6/IPv4• HTTP 2.0 / SPDY• SSL offload• Caching/compression• Web application Firewall

Possible solutions => right application

Page 11: Application Delivery Control

Right application

Page 12: Application Delivery Control

Possible solutions=> right user

Strategic point of control• SSO / SAML => allows integration with Office365, Google,

Salesforce• Two factor authentication

Tokens PKI

• Allows different authentication mechanisms based on location, device, …

Authentication as part of the infrastructure, not only as part of the application

Page 13: Application Delivery Control

Right user

Strategic Point of Control

On-Premises Infrastructure

CorporateApplications

Users

Attackers

AccessManagement

SaaS Providers

Office 365

GoogleApps

Salesforce

DirectoryServices

Corporate Users

Identity federation

SAMLReal-time access control

Access policy enforcement

SAMLIdentity management

Multi-factor authentication

Page 14: Application Delivery Control

Possible solutions => right time

Intelligent local load balancing with health monitoring

Intelligent global load balancing with health monitoring

Cloud bursting Dynamic data center => Support for SDx High performance DNSSEC solution Agile deployment

Page 15: Application Delivery Control

Right time

On-Premises InfrastructureGlobal load balancing

Infrastructure monitoring

Advanced reporting

User

User

Load balancingCustom business logic

Object cachingSSL management

Load balancingCustom business logic

Object cachingSSL management

Automated Application Delivery NetworkHealth/performance monitoring

VM deployment

DNS

Application

CloudManagement

Finite Resources

Cloud Administrator

Business Unit Application

Manager

On-Demand Computing

Cloud Hosting Provider

Application

UI or REST API

Strategic Point of Control

Page 16: Application Delivery Control

More informationPresentations coming up:• Advanced malware / DDOS• Mobile Device management• Security services:

Penetration testing Vulnerability assessment

Page 17: Application Delivery Control

Conclusion

Page 18: Application Delivery Control

Do you want to know more?