• Save
Rohati Inroduction
Upcoming SlideShare
Loading in...5
×
 

Rohati Inroduction

on

  • 2,029 views

An introduction to Rohati Systems - a new provide of Data Center appliances that secure access to applications and monitor usage at a fraction of the time and cost of more traditional approaches.

An introduction to Rohati Systems - a new provide of Data Center appliances that secure access to applications and monitor usage at a fraction of the time and cost of more traditional approaches.

Statistics

Views

Total Views
2,029
Views on SlideShare
2,021
Embed Views
8

Actions

Likes
1
Downloads
0
Comments
0

1 Embed 8

http://www.slideshare.net 8

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Rohati Inroduction Rohati Inroduction Presentation Transcript

  • Securing Data Center Resources Transaction Networking System™
  • About Rohati
    • Founded 2006. HQ in Sunnyvale, California
    • Product General Availability – July 2008
    • Experienced Management Team (ex Cisco, Juniper, Peribit)
    • Solid Financing – Series A, B secured.
    • Strong technology – 15 Patents pending
    • Top 10 Security companies to Watch
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
  • What are people saying?
    • “ Rohati has built a technically elegant product to address a well-understood business problem — balancing security with access and policy enforcement with agility, using identity, context and application attributes constructs for definition, enforcement and logging.” Steve Coplan, 451 Group.
    • “ Have you ever heard about Rohati? You should have. They are definitely amongst my list of really interesting vendors in the Identity and Access Management market and the overall security market.” Martin Kuppinger. KPC.
    • “ By embedding role-and identity-based access control invisibly in the network, Rohati simplifies implementation of role-based access control systems. Impacts: Enterprises: Embedding entitlement enforcement in the network can solve security problems for SOA, Web 2.0, and legacy applications -- explore the option!” John Burke, Nemertes Research
    • “ Rohati was first to market with a blend of networking and compute technologies providing a high performance (multi-10Gbps) platform with stateful high availability based on an infiniband fabric. ” Entitlement Management: Ready to Enter the IdM Mainstream, Gerry Gebel, Alice Wang Burton Group
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
  • Macro conditions drive 3 areas of focus for Rohati © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved IaaS PaaS SaaS Application Access Control Unstructured Data Access Management Cloud Security
  • The ‘new’ Data Center is emerging
    • New Economics
    • Highly virtualized & optimized
    • Highly secure at massive scale
    • Energy and operations efficient
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
    • Servers & Storage
    • Appliances
    • Data centers
    • Services
    Virtualize Automate Consolidate
    • Shared infrastructure
    • Logical resources
    • Optimized systems
    • Externalized policy
    • Dynamic
    • Cloud
    • Massive scale
    • Integrated
    Optimized for Business
  • Access Management plays a critical role
    • Organizations don’t get a clear view of who has done what with a resource, so cannot demonstrate ‘control’
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Common Pain Points Who did access what? Siloed approach to authorization across hundreds or even thousands of applications Months to modify applications with embedded authorization policy or by deploying agents Who should have access to what? Who has Access to what?
  • Access Management Landscape © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Firewall (no agents) Application-Embedded (agent-based)
    • Lacks business context
    • No transaction intelligence
    • Policies do not represent granular security requirements
    • Not ubiquitously deployed
    • Expensive, complex to manage
    • Long deployment cycle
    • Proprietary policy silos
    Data Center Appliance (no agents)
  • Rohati Delivers…
    • Transaction Networking System (TNS)
      • Attribute-based policies for fine-grained application access
      • No touch to Applications, Servers or Clients
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Agent-less access management for controlling & monitoring access to data center resources LAN/Branch/Remote Data Center Firewall AD, LDAPs File Shares TCP Apps Web Apps Internet/Extranet
  • Why Rohati is unique
    • Control access to Applications (Authentication)
    • Control usage of applications (Authorization)
    • On a Per-Transaction basis
    • Log and report on every transaction
    • “ No touch ’ to applications and no client agents
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
  • Rohati Solution
    • Fine-grained controls
    • Per-transaction policy enforcement & monitoring
    • Standards based for interoperability
    • Agent-less operation
    • Multi-protocol platforms
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved TNS 100 TNS 500 CMS
  • Policy Management Lifecycle accelerates policy implementation © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved 1 1 2 2 3 3 4 4 5 5 6 6
  • Policy driven, per-transaction logs feed SIM/SEM/Forensics tools © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
    • Types of per-transaction Logs
    • Discovery activity
    • Authentication events
    • Re-authentication events
    • Enforcement events
    • Simulation events
    • Policy-based Logs
    • User, network, environmental, application and protocol attributes
    Aggregation Correlation Alerting Forensics Data Center Users Resources Transactions checkin, delete, role, location, URL, *.xls, UN… request response SYSLOG
  • Rohati Solves a critical set of business and compliance requirements Improve Business Response Times Reduce Compliance & Security Risk Reduce IT costs
    • Quickly and Cost-Effectively secure all HTTP, HTTPS apps and Fileshares
    • No agents, no touch to applications
    • Deploy in weeks at a fraction of the cost of traditional approaches
    • Granular monitoring drives down cost of Audit and forensics
    © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Technology Innovations Layer 7 ACL’s, Zero Click HA, Virtual Directory, Policy builder...