Your SlideShare is downloading. ×
Rohati Inroduction
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Rohati Inroduction

1,020
views

Published on

An introduction to Rohati Systems - a new provide of Data Center appliances that secure access to applications and monitor usage at a fraction of the time and cost of more traditional approaches.

An introduction to Rohati Systems - a new provide of Data Center appliances that secure access to applications and monitor usage at a fraction of the time and cost of more traditional approaches.

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,020
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Securing Data Center Resources Transaction Networking System™
    • 2. About Rohati
      • Founded 2006. HQ in Sunnyvale, California
      • Product General Availability – July 2008
      • Experienced Management Team (ex Cisco, Juniper, Peribit)
      • Solid Financing – Series A, B secured.
      • Strong technology – 15 Patents pending
      • Top 10 Security companies to Watch
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
    • 3. What are people saying?
      • “ Rohati has built a technically elegant product to address a well-understood business problem — balancing security with access and policy enforcement with agility, using identity, context and application attributes constructs for definition, enforcement and logging.” Steve Coplan, 451 Group.
      • “ Have you ever heard about Rohati? You should have. They are definitely amongst my list of really interesting vendors in the Identity and Access Management market and the overall security market.” Martin Kuppinger. KPC.
      • “ By embedding role-and identity-based access control invisibly in the network, Rohati simplifies implementation of role-based access control systems. Impacts: Enterprises: Embedding entitlement enforcement in the network can solve security problems for SOA, Web 2.0, and legacy applications -- explore the option!” John Burke, Nemertes Research
      • “ Rohati was first to market with a blend of networking and compute technologies providing a high performance (multi-10Gbps) platform with stateful high availability based on an infiniband fabric. ” Entitlement Management: Ready to Enter the IdM Mainstream, Gerry Gebel, Alice Wang Burton Group
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
    • 4. Macro conditions drive 3 areas of focus for Rohati © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved IaaS PaaS SaaS Application Access Control Unstructured Data Access Management Cloud Security
    • 5. The ‘new’ Data Center is emerging
      • New Economics
      • Highly virtualized & optimized
      • Highly secure at massive scale
      • Energy and operations efficient
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
      • Servers & Storage
      • Appliances
      • Data centers
      • Services
      Virtualize Automate Consolidate
      • Shared infrastructure
      • Logical resources
      • Optimized systems
      • Externalized policy
      • Dynamic
      • Cloud
      • Massive scale
      • Integrated
      Optimized for Business
    • 6. Access Management plays a critical role
      • Organizations don’t get a clear view of who has done what with a resource, so cannot demonstrate ‘control’
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Common Pain Points Who did access what? Siloed approach to authorization across hundreds or even thousands of applications Months to modify applications with embedded authorization policy or by deploying agents Who should have access to what? Who has Access to what?
    • 7. Access Management Landscape © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Firewall (no agents) Application-Embedded (agent-based)
      • Lacks business context
      • No transaction intelligence
      • Policies do not represent granular security requirements
      • Not ubiquitously deployed
      • Expensive, complex to manage
      • Long deployment cycle
      • Proprietary policy silos
      Data Center Appliance (no agents)
    • 8. Rohati Delivers…
      • Transaction Networking System (TNS)
        • Attribute-based policies for fine-grained application access
        • No touch to Applications, Servers or Clients
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Agent-less access management for controlling & monitoring access to data center resources LAN/Branch/Remote Data Center Firewall AD, LDAPs File Shares TCP Apps Web Apps Internet/Extranet
    • 9. Why Rohati is unique
      • Control access to Applications (Authentication)
      • Control usage of applications (Authorization)
      • On a Per-Transaction basis
      • Log and report on every transaction
      • “ No touch ’ to applications and no client agents
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
    • 10. Rohati Solution
      • Fine-grained controls
      • Per-transaction policy enforcement & monitoring
      • Standards based for interoperability
      • Agent-less operation
      • Multi-protocol platforms
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved TNS 100 TNS 500 CMS
    • 11. Policy Management Lifecycle accelerates policy implementation © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved 1 1 2 2 3 3 4 4 5 5 6 6
    • 12. Policy driven, per-transaction logs feed SIM/SEM/Forensics tools © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved
      • Types of per-transaction Logs
      • Discovery activity
      • Authentication events
      • Re-authentication events
      • Enforcement events
      • Simulation events
      • Policy-based Logs
      • User, network, environmental, application and protocol attributes
      Aggregation Correlation Alerting Forensics Data Center Users Resources Transactions checkin, delete, role, location, URL, *.xls, UN… request response SYSLOG
    • 13. Rohati Solves a critical set of business and compliance requirements Improve Business Response Times Reduce Compliance & Security Risk Reduce IT costs
      • Quickly and Cost-Effectively secure all HTTP, HTTPS apps and Fileshares
      • No agents, no touch to applications
      • Deploy in weeks at a fraction of the cost of traditional approaches
      • Granular monitoring drives down cost of Audit and forensics
      © Copyright 2009 Rohati Systems, Inc. | Confidential | All Rights Reserved Technology Innovations Layer 7 ACL’s, Zero Click HA, Virtual Directory, Policy builder...