Lotus Mashups, Foundations, Protector - Symposium 2009 Prague

Uploaded on

Presentation from Lotus Symposium 2009, Prague

Presentation from Lotus Symposium 2009, Prague

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • Lotus Protector for Mail Security is a software solution sold as an end user license. It is deployed as a network appliance (physical or virtual, we’ll talk about that in a minute) that sits between your Domino Server’s SMTP interface and the wild wooly Internet, and filters all the bad stuff out before Domino has to deal with it. In reality, every SMTP server needs this and virtually every customer already has something, or else they would be drowning in spam. Our angle is we’re applying premium security technology, molded to satisfy the unique needs and requirements of Domino customers.The filtering software itself is high quality, 100% IBM-owned technology. The IBM Proventia product that shares the Protector engine is built upon Cobion, a long-time leader in multi-language spam filtering, that came to IBM in its Internet Security Systems (ISS) acquisition in 2006.The feature list will be covered in detail, but on this page we go through some of the competively critical and/or differentiating capabilities of Protector for Mail security.Dynamic host reputation is our implementation of what is often called IP Reputation Filtering or IP Filtering. This assigns a likelihood of spam based on its origination IP, according to a dynamic reputation system that examines the rate and ratio of spam received.Multi-level message analysis is the heart of the system, where a set of different filters is applied to look for different types of threats. This is where a lot of the proprietary stuff comes in, because it’s what makes the difference between 90-95% filter quality, or 98-99% like Protector does.Signature and behavioral virus is a “belt and suspenders” approach to protect against both known and unknown threats. Our signature antivirus is powered by the premium quality Sophos engine (the only part of Protector for mail security that isn’t 100% IBM technology), while the behavioral antivirus applies many of the same techniques as our spam analysis to spot threats that are unknown to the signature antivirus database.We’ll talk about our massive URL database, but the idea is that all spam has to have a method to fulfill its goals, and that typically is a link to somewhere on the Web. Through our database of over 84 million known bad URLs (inappropriate/pornographic or infected with malware), we can eliminate much of the most dangerous content with one simple check.Protector for Mail Security supports end user management of their own whitelists (allow) and blacklists (block), as well as a hosted version of the user’s quarantine. That’s a powerful feature in itself, but we’re extending this capability to Notes, for seamless integration of network filtering and client UI.We talked about the integration, but again the real point here is that we’ve narrowed our field of vision on behalf of our customer base, and given ourselves permission to see things from their point of view. Thus all the enhancements we’re making are toward delivering a product that extends and integrates what customer already do with Notes and Domino.Preemptive protection is a little different category of security, in this context. Whereas everything above is kind of looking out for all the bad stuff that bad people like to do, preemptive protection looks to stop things before they happen.So the rules/policy engine, which we’ll discuss in depth in a few minutes, can be applied to both incoming and outgoing e-mail to block the transmission of common categories of sensitive information, and be infinitely tuned to block customized kinds of information, specific to an industry or organization.We call out the place this product holds in the IBM Proventia security product family, because it takes advantage of all the work done in ISS to harden that line of intrusion prevention systems (IPSs), firewall, etc. This protects Protector against attacks on the software from vectors other than SMTP.
  • Need speaker notes here
  • Not every application is suited for the mashup style of development I just described. The sweet spot for mashups is when you want to create an application to address an immediate business issue or opportunity. These applications that are created to address a specific business problem are often referred to as situational applications. A defining characteristic of a situational application is that the implementation speed and flexibility of the app outweigh the need for governance and application perfection. In addition, if the right mashup ecosystem is in place, line of business can assemble their own applications.This is contrasted with mission critical, strategic applications, that are built and governed by IT. These types of applications usually serve a large number of users, and, as a result the need for governance and to minimize risk outweighs the need for speed and flexibility.In the middle is a bit of a gray area. Technologies and development styles to use really depends upon a customers’ specific needs. Some companies may want to use mashups for prototyping of the final app, while all of the underlying infrastructure and groundwork is being established.


  • 1. Budujme chytřejší planetu Lotus Symposium 2009 Nové produkty Lotus Tomáš Vávra Petr Kunc
  • 2. Hrozby
  • 3. Statistiky ISS 1000 serverů ve farmě 22 datacenter 7 mld objektů v databázi 100 000 přírůstků denně 150 mil zprac. objektů měsíčně
  • 4. Lotus Protector for Mail Security Anti Spam Anti Virus
  • 5. Konfigurace
  • 6. Výhody Lotus Foundations Jednoduchá instalace a správa Centrální správa uživatelů Zálohování a obnova (15 min) Násobné připojení VPN a firewall Antivirus a antispam Internetové služby
  • 7. SW nebo HW + SW
  • 8. Postaveno na SUSE Linuxu
  • 9. ARCHITEKTURA Lotus Foundations Core Automics UniConf Connectivity Presentation Supervisory NVS 1 NVS 2 Integrated Applications UniConf UniConf Connector UniConf Connector Etc… - Samba Application Application - Apache - PPTP - idb etc... SLES 2.6 Kernel
  • 10. Základní instalace systému
  • 11. Instalace doplňků (Domino)
  • 13. Čtečky RSS kanálů
  • 14. RSS ATOM XML
  • 15. Propojování a transformace
  • 16. Přístup přes speciální rozhraní...
  • 17. ...nebo vložením do webové stránky
  • 18. ...nebo vložením do webové stránky
  • 19. Provázání widgetů
  • 20. Backend – stavební kameny
  • 21. ...seznam widgetů
  • 22. ...seznam feedů
  • 23. Možné zdroje pro feedy
  • 24. „Long Tail“ – použití Mashups Strategické, pro firmu kritické aplikace SOA, Portal, DB2, legacy Počet uživatelů na aplikaci applications, ... Aplikace v úpravě IT, „Long Tail“ – příležitostné ale kontrolované aplikace, plně v rukou IT SOA, Portal, DB2, Mashups, jednoduché legacy applications, ... aplikace zaměřené na určitý Mashups jako problém. Kombinují externí prototyping. a interní data. Počet aplikací
  • 25. Příklad: Boeing