Budujme chytřejší planetu
Lotus Symposium 2009




Nové produkty Lotus
Tomáš Vávra
Petr Kunc
Hrozby
Statistiky ISS

1000     serverů ve farmě
22       datacenter
7 mld    objektů v databázi


100 000 přírůstků denně
150 mi...
Lotus Protector for Mail Security


Anti Spam
Anti Virus
Konfigurace
Výhody Lotus Foundations

Jednoduchá instalace a správa
Centrální správa uživatelů
Zálohování a obnova (15 min)
Násobné př...
SW nebo HW + SW
Postaveno na SUSE Linuxu
ARCHITEKTURA

Lotus Foundations Core
     Automics                                UniConf Connectivity
    Presentation
  ...
Základní instalace systému
Instalace doplňků (Domino)
MASHUP CENTER
Čtečky RSS kanálů
RSS   ATOM   XML
Propojování a transformace
Přístup přes speciální rozhraní...
...nebo vložením do webové stránky
...nebo vložením do webové stránky
Provázání widgetů
Backend – stavební kameny
...seznam widgetů
...seznam feedů
Možné zdroje pro feedy
„Long Tail“ – použití Mashups
                              Strategické, pro firmu
                              kritické ...
Příklad: Boeing
Lotus Mashups, Foundations, Protector - Symposium 2009 Prague
Lotus Mashups, Foundations, Protector - Symposium 2009 Prague
Lotus Mashups, Foundations, Protector - Symposium 2009 Prague
Lotus Mashups, Foundations, Protector - Symposium 2009 Prague
Lotus Mashups, Foundations, Protector - Symposium 2009 Prague
Upcoming SlideShare
Loading in...5
×

Lotus Mashups, Foundations, Protector - Symposium 2009 Prague

420

Published on

Presentation from Lotus Symposium 2009, Prague

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
420
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Lotus Protector for Mail Security is a software solution sold as an end user license. It is deployed as a network appliance (physical or virtual, we’ll talk about that in a minute) that sits between your Domino Server’s SMTP interface and the wild wooly Internet, and filters all the bad stuff out before Domino has to deal with it. In reality, every SMTP server needs this and virtually every customer already has something, or else they would be drowning in spam. Our angle is we’re applying premium security technology, molded to satisfy the unique needs and requirements of Domino customers.The filtering software itself is high quality, 100% IBM-owned technology. The IBM Proventia product that shares the Protector engine is built upon Cobion, a long-time leader in multi-language spam filtering, that came to IBM in its Internet Security Systems (ISS) acquisition in 2006.The feature list will be covered in detail, but on this page we go through some of the competively critical and/or differentiating capabilities of Protector for Mail security.Dynamic host reputation is our implementation of what is often called IP Reputation Filtering or IP Filtering. This assigns a likelihood of spam based on its origination IP, according to a dynamic reputation system that examines the rate and ratio of spam received.Multi-level message analysis is the heart of the system, where a set of different filters is applied to look for different types of threats. This is where a lot of the proprietary stuff comes in, because it’s what makes the difference between 90-95% filter quality, or 98-99% like Protector does.Signature and behavioral virus is a “belt and suspenders” approach to protect against both known and unknown threats. Our signature antivirus is powered by the premium quality Sophos engine (the only part of Protector for mail security that isn’t 100% IBM technology), while the behavioral antivirus applies many of the same techniques as our spam analysis to spot threats that are unknown to the signature antivirus database.We’ll talk about our massive URL database, but the idea is that all spam has to have a method to fulfill its goals, and that typically is a link to somewhere on the Web. Through our database of over 84 million known bad URLs (inappropriate/pornographic or infected with malware), we can eliminate much of the most dangerous content with one simple check.Protector for Mail Security supports end user management of their own whitelists (allow) and blacklists (block), as well as a hosted version of the user’s quarantine. That’s a powerful feature in itself, but we’re extending this capability to Notes, for seamless integration of network filtering and client UI.We talked about the integration, but again the real point here is that we’ve narrowed our field of vision on behalf of our customer base, and given ourselves permission to see things from their point of view. Thus all the enhancements we’re making are toward delivering a product that extends and integrates what customer already do with Notes and Domino.Preemptive protection is a little different category of security, in this context. Whereas everything above is kind of looking out for all the bad stuff that bad people like to do, preemptive protection looks to stop things before they happen.So the rules/policy engine, which we’ll discuss in depth in a few minutes, can be applied to both incoming and outgoing e-mail to block the transmission of common categories of sensitive information, and be infinitely tuned to block customized kinds of information, specific to an industry or organization.We call out the place this product holds in the IBM Proventia security product family, because it takes advantage of all the work done in ISS to harden that line of intrusion prevention systems (IPSs), firewall, etc. This protects Protector against attacks on the software from vectors other than SMTP.
  • Need speaker notes here
  • Not every application is suited for the mashup style of development I just described. The sweet spot for mashups is when you want to create an application to address an immediate business issue or opportunity. These applications that are created to address a specific business problem are often referred to as situational applications. A defining characteristic of a situational application is that the implementation speed and flexibility of the app outweigh the need for governance and application perfection. In addition, if the right mashup ecosystem is in place, line of business can assemble their own applications.This is contrasted with mission critical, strategic applications, that are built and governed by IT. These types of applications usually serve a large number of users, and, as a result the need for governance and to minimize risk outweighs the need for speed and flexibility.In the middle is a bit of a gray area. Technologies and development styles to use really depends upon a customers’ specific needs. Some companies may want to use mashups for prototyping of the final app, while all of the underlying infrastructure and groundwork is being established.
  • Transcript of "Lotus Mashups, Foundations, Protector - Symposium 2009 Prague"

    1. 1. Budujme chytřejší planetu Lotus Symposium 2009 Nové produkty Lotus Tomáš Vávra Petr Kunc
    2. 2. Hrozby
    3. 3. Statistiky ISS 1000 serverů ve farmě 22 datacenter 7 mld objektů v databázi 100 000 přírůstků denně 150 mil zprac. objektů měsíčně
    4. 4. Lotus Protector for Mail Security Anti Spam Anti Virus
    5. 5. Konfigurace
    6. 6. Výhody Lotus Foundations Jednoduchá instalace a správa Centrální správa uživatelů Zálohování a obnova (15 min) Násobné připojení VPN a firewall Antivirus a antispam Internetové služby
    7. 7. SW nebo HW + SW
    8. 8. Postaveno na SUSE Linuxu
    9. 9. ARCHITEKTURA Lotus Foundations Core Automics UniConf Connectivity Presentation Supervisory NVS 1 NVS 2 Integrated Applications UniConf UniConf Connector UniConf Connector Etc… - Samba Application Application - Apache - PPTP - idb etc... SLES 2.6 Kernel
    10. 10. Základní instalace systému
    11. 11. Instalace doplňků (Domino)
    12. 12. MASHUP CENTER
    13. 13. Čtečky RSS kanálů
    14. 14. RSS ATOM XML
    15. 15. Propojování a transformace
    16. 16. Přístup přes speciální rozhraní...
    17. 17. ...nebo vložením do webové stránky
    18. 18. ...nebo vložením do webové stránky
    19. 19. Provázání widgetů
    20. 20. Backend – stavební kameny
    21. 21. ...seznam widgetů
    22. 22. ...seznam feedů
    23. 23. Možné zdroje pro feedy
    24. 24. „Long Tail“ – použití Mashups Strategické, pro firmu kritické aplikace SOA, Portal, DB2, legacy Počet uživatelů na aplikaci applications, ... Aplikace v úpravě IT, „Long Tail“ – příležitostné ale kontrolované aplikace, plně v rukou IT SOA, Portal, DB2, Mashups, jednoduché legacy applications, ... aplikace zaměřené na určitý Mashups jako problém. Kombinují externí prototyping. a interní data. Počet aplikací
    25. 25. Příklad: Boeing

    ×