9. Výhody Lotus Foundations
Jednoduchá instalace a správa
Centrální správa uživatelů
Zálohování a obnova (15 min)
Násobné připojení
VPN a firewall
Antivirus a antispam
Internetové služby
29. „Long Tail“ – použití Mashups
Strategické, pro firmu
kritické aplikace
SOA, Portal, DB2, legacy
Počet uživatelů na aplikaci
applications, ...
Aplikace v úpravě IT,
„Long Tail“ – příležitostné
ale kontrolované
aplikace, plně v rukou IT
SOA, Portal, DB2,
Mashups, jednoduché
legacy applications, ...
aplikace zaměřené na určitý
Mashups jako problém. Kombinují externí
prototyping. a interní data.
Počet aplikací
Lotus Protector for Mail Security is a software solution sold as an end user license. It is deployed as a network appliance (physical or virtual, we’ll talk about that in a minute) that sits between your Domino Server’s SMTP interface and the wild wooly Internet, and filters all the bad stuff out before Domino has to deal with it. In reality, every SMTP server needs this and virtually every customer already has something, or else they would be drowning in spam. Our angle is we’re applying premium security technology, molded to satisfy the unique needs and requirements of Domino customers.The filtering software itself is high quality, 100% IBM-owned technology. The IBM Proventia product that shares the Protector engine is built upon Cobion, a long-time leader in multi-language spam filtering, that came to IBM in its Internet Security Systems (ISS) acquisition in 2006.The feature list will be covered in detail, but on this page we go through some of the competively critical and/or differentiating capabilities of Protector for Mail security.Dynamic host reputation is our implementation of what is often called IP Reputation Filtering or IP Filtering. This assigns a likelihood of spam based on its origination IP, according to a dynamic reputation system that examines the rate and ratio of spam received.Multi-level message analysis is the heart of the system, where a set of different filters is applied to look for different types of threats. This is where a lot of the proprietary stuff comes in, because it’s what makes the difference between 90-95% filter quality, or 98-99% like Protector does.Signature and behavioral virus is a “belt and suspenders” approach to protect against both known and unknown threats. Our signature antivirus is powered by the premium quality Sophos engine (the only part of Protector for mail security that isn’t 100% IBM technology), while the behavioral antivirus applies many of the same techniques as our spam analysis to spot threats that are unknown to the signature antivirus database.We’ll talk about our massive URL database, but the idea is that all spam has to have a method to fulfill its goals, and that typically is a link to somewhere on the Web. Through our database of over 84 million known bad URLs (inappropriate/pornographic or infected with malware), we can eliminate much of the most dangerous content with one simple check.Protector for Mail Security supports end user management of their own whitelists (allow) and blacklists (block), as well as a hosted version of the user’s quarantine. That’s a powerful feature in itself, but we’re extending this capability to Notes, for seamless integration of network filtering and client UI.We talked about the integration, but again the real point here is that we’ve narrowed our field of vision on behalf of our customer base, and given ourselves permission to see things from their point of view. Thus all the enhancements we’re making are toward delivering a product that extends and integrates what customer already do with Notes and Domino.Preemptive protection is a little different category of security, in this context. Whereas everything above is kind of looking out for all the bad stuff that bad people like to do, preemptive protection looks to stop things before they happen.So the rules/policy engine, which we’ll discuss in depth in a few minutes, can be applied to both incoming and outgoing e-mail to block the transmission of common categories of sensitive information, and be infinitely tuned to block customized kinds of information, specific to an industry or organization.We call out the place this product holds in the IBM Proventia security product family, because it takes advantage of all the work done in ISS to harden that line of intrusion prevention systems (IPSs), firewall, etc. This protects Protector against attacks on the software from vectors other than SMTP.
Need speaker notes here
Not every application is suited for the mashup style of development I just described. The sweet spot for mashups is when you want to create an application to address an immediate business issue or opportunity. These applications that are created to address a specific business problem are often referred to as situational applications. A defining characteristic of a situational application is that the implementation speed and flexibility of the app outweigh the need for governance and application perfection. In addition, if the right mashup ecosystem is in place, line of business can assemble their own applications.This is contrasted with mission critical, strategic applications, that are built and governed by IT. These types of applications usually serve a large number of users, and, as a result the need for governance and to minimize risk outweighs the need for speed and flexibility.In the middle is a bit of a gray area. Technologies and development styles to use really depends upon a customers’ specific needs. Some companies may want to use mashups for prototyping of the final app, while all of the underlying infrastructure and groundwork is being established.