SGD is a product that enables secure browser-initiated access to server-hosted applications from various client devices. It supports access to Windows, Linux, Unix, and mainframe applications as well as web applications. SGD provides a single access point and supports various usage scenarios and experiences. It is optimized for performance over different network conditions and adheres to high security standards.
MongoDB IoT City Tour STUTTGART: The Microsoft Azure Platform for IoTMongoDB
Presented by, Dr Christian Geuer-Pollmann, Senior Technology Evangelist at Microsoft.
The presentation gives a solid overview to the Microsoft Azure platform, with a special emphasis on scenarios for IoT workloads. First, Christian provides an introduction to Microsoft Azure’s IaaS compute and networking infrastructure (i.e. virtual machines, virtual networks, load balancers and HA concepts). The second part of the presentation focuses on higher-order services in Azure, such as relational data bases, machine learning, search, and NoSQL offerings. Last, Christian explains how the Azure Service Bus and the Intelligent Systems Services fit into the overall IoT landscape.
Sesión del Global Azure Bootcamp 2017. Azure Key Vault nos permite asegurar los servicios alojados, las claves y contraseñas en un almacenamiento especial y protegido. En esta sesión exploraremos las capacidades de Azure Key Vault y veremos como es necesario su uso en la Star Trek para garantizar la seguridad.
MongoDB IoT City Tour STUTTGART: The Microsoft Azure Platform for IoTMongoDB
Presented by, Dr Christian Geuer-Pollmann, Senior Technology Evangelist at Microsoft.
The presentation gives a solid overview to the Microsoft Azure platform, with a special emphasis on scenarios for IoT workloads. First, Christian provides an introduction to Microsoft Azure’s IaaS compute and networking infrastructure (i.e. virtual machines, virtual networks, load balancers and HA concepts). The second part of the presentation focuses on higher-order services in Azure, such as relational data bases, machine learning, search, and NoSQL offerings. Last, Christian explains how the Azure Service Bus and the Intelligent Systems Services fit into the overall IoT landscape.
Sesión del Global Azure Bootcamp 2017. Azure Key Vault nos permite asegurar los servicios alojados, las claves y contraseñas en un almacenamiento especial y protegido. En esta sesión exploraremos las capacidades de Azure Key Vault y veremos como es necesario su uso en la Star Trek para garantizar la seguridad.
Consolidating Infrastructure with Azure Kubernetes ServiceEng Teong Cheah
In this session, see how Tailwind Traders took a containerized application and deployed it to Azure Kubernetes Service (AKS). You’ll walk away with a deep understanding of major Kubernetes concepts and how to put it all to use with industry standard tooling.
In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultTom Kerkhove
Security has become more and more important as we move to the cloud and countries & companies are being hacked – remember the Sony hack? But how do we securely store sensitive data such as connection strings to our databases? Where do we store our encryption keys? Can I share them with my customers? How do I prevent abuse of my secrets and block them from doing so?
That’s what this session is all about – I will introduce you to the concepts of Microsoft Azure Key Vault where you can use this as it allows you to securely store keys, credentials and other secrets in the cloud. We will also have a look at how it enables us to store encryption keys for SQL Server TDE and how it can help you safeguard your cloud solutions even more.
This presentation is an introduction about Cloud Computing and Microsoft Windows Azure. Microsoft Public Cloud solution for Platform and Infrastructure layers.
Introduction to CloudStack: How to Deploy and Manage Infrastructure-as-a-Serv...cloud-diva
Build clouds the way some of the worlds largest public and private clouds are built--using CloudStack. This presentation is from the June 18th iteration of a monthly series offered by the CloudStack community team. It will give you a better understanding of the overall CloudStack architecture and feature set.
Consolidating Infrastructure with Azure Kubernetes ServiceEng Teong Cheah
In this session, see how Tailwind Traders took a containerized application and deployed it to Azure Kubernetes Service (AKS). You’ll walk away with a deep understanding of major Kubernetes concepts and how to put it all to use with industry standard tooling.
In the Juno summit, Symantec presented it's perspective on securing Keystone. Security is really a mindset and process. We proposed a layered security approach starting with the process for securing Keystone architecture, followed by securing the environment where Keystone is deployed and configured. Since then we have been implementing those security measures in our production environment. In this talk, we will discuss exactly how we have made our Keystone deployment secure and what we have learnt along the way.
Securing sensitive data with Azure Key VaultTom Kerkhove
As a developer you often have to use & store a lot of sensitive data going from service credentials to connection strings or even encryption keys. But how do I store these in a secure way? How do I know who has access to them and how do I prevent people from copying them and abusing them? On the other hand, SaaS customers have no clue how you store their sensitive data and how they use it. How can they monitor that? How can they revoke your access easily?
Watch the recording here - http://azug.be/2015-05-05---securing-sensitive-data-with-azure-key-vault
ITProceed 2015 - Securing Sensitive Data with Azure Key VaultTom Kerkhove
Security has become more and more important as we move to the cloud and countries & companies are being hacked – remember the Sony hack? But how do we securely store sensitive data such as connection strings to our databases? Where do we store our encryption keys? Can I share them with my customers? How do I prevent abuse of my secrets and block them from doing so?
That’s what this session is all about – I will introduce you to the concepts of Microsoft Azure Key Vault where you can use this as it allows you to securely store keys, credentials and other secrets in the cloud. We will also have a look at how it enables us to store encryption keys for SQL Server TDE and how it can help you safeguard your cloud solutions even more.
This presentation is an introduction about Cloud Computing and Microsoft Windows Azure. Microsoft Public Cloud solution for Platform and Infrastructure layers.
Introduction to CloudStack: How to Deploy and Manage Infrastructure-as-a-Serv...cloud-diva
Build clouds the way some of the worlds largest public and private clouds are built--using CloudStack. This presentation is from the June 18th iteration of a monthly series offered by the CloudStack community team. It will give you a better understanding of the overall CloudStack architecture and feature set.
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
InduSoft Web Studio recently added the capability to run the OPC UA client on Linux machines using the platform-agnostic IoTView. Join us for this month’s webinar featuring Thomas Burke, President of the OPC Foundation. He’ll discuss the benefits of an open communication standard like OPC UA and explain how using the OPC UA server on Linux machines can open up new possibilities for communication.
As manufacturing reaches the next stage of development, often referred to as Industry 4.0, a new wave of standards are adopted to enable communication along manufacturing lines. This is particularly prevalent in the packaging industry, which is often forced to be innovative and flexible to change with consumer trends and maximize efficiency.
Going to the cloud with Microsoft and ITAdviser_Windows Azure overview for IT...Olimpia Oancea
We really believe that cloud is the new normal. For anyone who is looking to develop software, using a public cloud like Azure is a no-brainer. In the last year, we have not come across even a single scenario where a customer is looking to build a new innovative product, and they are going to deploy that in their own datacenter…
Olimpia Oancea, Co-Founder and CEO, ITAdviser
See how InduSoft Web Studio SCADA software can benefit machine builders, and help create powerful SCADA and HMI applications for machines in any industry.
Solaris operating systems are the building blocks of computer systems, and provide the interface between user applications and computer hardware. Solaris 10 is a multiuser, multitasking, multithreading operating environment, developed and sold by Sun Microsystems. Solaris is one implementation of the UNIX operating system that draws on both the System V (AT&T) and Berkeley (BSD) traditions. It has risen from little more than a research project to become the dominant UNIX operating system in the international marketplace today. Solaris 10 is the latest in a long line of operating environment releases based around the SunOS. Operating system, this is currently in version 5.10. Solaris is commonly found in large corporations and educational institutions that require concurrent, multiuser access on individual hosts and between hosts connected via the Internet. However, it is also rapidly being adopted by small businesses and individual developers.
This is a webinar done with Acquia introdcing how well you can run Drupal on Windows with a demo about WebPI and Drush.
Here's a link to the recorded webinar:
http://tinyurl.com/6rfz3px
1. APP
Contact Point
Kunal Juvekar
Oracle > Solutions > Technology Solutions > Virtualization > Desktop Virtualization Products
SGD is a product that enables browser
initiated secure access to server hosted
applications
Positioning
As a product for Application Virtualization, SGD is the cloud
access solution, works as the access tier of various applications
APP
APP
VM
Web Server
ServerRDP
X11
SSH
TN5250 Web Server
Server
HTTPS
Reverse Proxy
Routing Proxy
HTTPS(443)
HTTPS WebSocket(443)
HTTPS
WebSocket(443)
AIP+SSL (443)
HTTPS (443)
Supported Client OS
Windows 10, 8, 8.1 (Desktop mode)
Windows 7
Mac OS X 10.9, 10.10, 10.11
Oracle Linux 5, 6, 7
Ubuntu Linux 12.04, 14.04
Application Connectivity
Windows Desktop and applications
Character applications running on Solaris, Linux,
HP-UX, and AIX
X applications running on Oracle Solaris,
Linux, HP-UX and AIX
Web applications(using
HTML and Java
technology)
IBM mainframe and AS/400
applications
Features
Flexible - Access to the broadest range applications and
workspace environments
High Performance - Optimized for the open internet and high
latency networks
Secure - Adheres to the highest security standards and highly
customizable based on user/user group/application, etc.
Application Virtualization
SGD is certified for, and
simplifies access to Oracle
applications – especially since
different Oracle applications are certified
for different internet browsers, and flash or ActiveX
plug-ins. SGD is a single source browser-initiated access
point that allows access for several application types(Windows
Linux, Unix, Mainframe etc) supporting several usage scenarios &
experiences.
Affordable - No additional cost for gateway component and for performance
Oracle Certified - Certified for Oracle’s Web Applications & Oracle Exalogic
Elastic Cloud Engineered System
- An ideal solution for Oracle Applications
- Easy to manage and access enterprise applications
- Extend reach of Oracle Applications to tablet devices
Chrome OS 38.0 (Acer, HP)
iOS 7, 8, 9 on Apple iPad
Android 5.11, 6 on Nexus 7,
Nexus 10
Security & Data Protection
Use included data store or integrate with
your existing login authorities
- LDAP/LDAPS
- Microsoft Active Directory
- RSA SecurID
- Web Authentication
- UNIX Authentication (local and NIS/NIS+)
- Oracle Unified Directory
- And more…
Security restrictions for the end-user
- Controlled copy and paste
- Controlled client-drive mapping
- Controlled printing
- Controlled USB connectivity
Features of Gateway(FREE)
1) Hides topology and addresses of
internal network
2) Provides single network entry point
- One address and port – replaces Oracle
Secure Global Desktop firewall forwarding
- Reduced Internet-facing attack surface
3) Apache Reverse Proxy
4) Authenticate in the DMZ, before
granting access to data center
5) Decrypt and re-encrypts data
- Can leave unencrypted for IDS sensor inspection
6) Multiple gateways for redundancy and
scalability
7) Use on independent server(s); not
separately licensed
8) Included for free, and helps move away
from VPN maintenance costs
- However, Oracle Secure Global Desktop works
with existing VPN setup as well
AIP, Adaptive Internet Protocol
Provides optimal network performance to clients,
even in varying bandwidth conditions, ensures fast
performance over LAN, WAN and Internet
- Dynamically adjusts as needed
- Use the designed intelligence or place a
bandwidth limit
Links
- Official Site: http://www.oracle.com/us/technologies/virtualization/secure-global-desktop/overview/index.html
- Video: http://player.vimeo.com/video/74326737
- What’s New: https://blogs.oracle.com/virtualization/entry/announcement_oracle_secure_global_desktop4
- Documentation: http://www.oracle.com/technetwork/server-storage/securedesktop/docs/index.html
Used to transmit data between X protocol engine and
client’s display engine
- Request Pruning & merging
- Caching
- Compression
1 2
3 4
5
6
7
8
9
Global Senior Sales Manager
kunal.juvekar@oracle.com
Mobile: +91.88602.93000
Work Phone: +91.120.4892.587