SlideShare a Scribd company logo
SPOT114 : No Compromise
on Compliance: Streamline
Administration, Save Time
and Money
Olaf Boerner, BCC

© 2014 IBM Corporation
Agenda
 Introduction

 Requirements for todays IBM Domino® infrastructure
 How to streamline Administration

 How to ensure Compliance
 Question Time
About us
 BCC, an IBM Business Partner since 1996

 Solution provider for secure and cost-efficient management of
IBM Collaboration Infrastructure
 Develops software products, provides consulting and
implementation services
 800 companies with more than 3 million users trust BCC
solutions
About me
 Administrator / Developer since 1994
 Founded BCC in 1996
 Working as senior architect with large

enterprise customers
–reducing Total cost of Ownership of IBM Notes and Domino®
–securing and optimizing Domino infrastructures
 IBM Champion
 Twitter: @OlafBoerner
Current situation for
Domino Infrastructure

5
Current situation for Domino infrastructures
Compliance
is a major
issue

The cost
pressure in
IT has grown
enormously

Hands-on
admin skills
are required
The delivery
model or
platform is
under
question

6
The cost pressure in IT has grown enormously

The demands in
the IT are growing
and assurance of
safe operations to
make powerful and
efficient systems is
their prime goal
7

More than 80% of
the IT companies
are under
enormous
increasing cost
pressures
Compliance Requirements
 Sarbanes Oxley (SOX) - related to investments and securities
 FINRA - related to investments and financial advisors
 HIPAA - related to the protection and privacy of health information
–Any company that deals with protected health information (PHI) must
ensure that all the required
• physical,
• network, and
• process security measures
–are in place and followed.
The cost of not being compliant
 Brand Damage
 Non-Compliance Fines
 Litigation Expenses
Examples
 $1.45 billion judgment against Morgan Stanley for being unable to
produce reliable emails in the course of fraud litigation
 $2.5 million fine against Merrill Lynch for failing to promptly produce
emails over a period of 17 months
Objectives for todays social business infrastructure

Streamline / TCO

Security / Compliance
How to handle these
conflicts of objectives ?

11
How to handle these conflicts of objectives ?
 How can you ensure compliance,
 Enhance security and
 Reduce total cost of ownership?
 QUESTIONS:
–Compliance and security are really expensive ?
–Trade off ?
 Let’s discuss this at current example: NSA and Snowden

12
NSA Security ...
 Why did they have a Security Leak ?
–“The scariest threat is the systems administrator,”
–“The system administrator has godlike access to systems they
manage.”
• Eric Chiu Hytrust , Security Advisor

http://www.nytimes.com/2013/06/24/technology/nsa-leak-puts-focus-onsystem-administrators.html?_r=0
Lessons learned: How will NSA increase security ?
 Additional monitoring systems
 “a two-man rule” that would limit the ability of each of its 1,000 root
system admins to gain unfettered access to the entire system
 Two–man rule is easy to implement !!!
 Automation
Why Automation increases security
 NSA to Axe 90 Percent of System Administrators, Adopt Automation Instead
– “What we’re in the process of doing – not fast enough – is reducing our
system administrators by about 90 percent,” Keith Alexander, NSA
– „doing things that machines are probably better at doing.“
 1000 * 90% = 900 of its root system admins

http://www.washingtonpost.com/blogs/federal-eye/wp/2013/08/13/nsa-to-cut-90percent-of-systems-administrators/
http://www.dailytech.com/NSA+to+Axe+90+Percent+of+System+Administrators+Ad
opt+Automation+Instead/article33145.htm
Summary: Why Automation increases security
 „doing things that machines are probably better at doing.“ (Keith
Alexander)
 decrease required access rights
 provide system log trails
 TCO reduction is included for free! (currently) not important for NSA ;-)

17
Automation is key !

Security
Reduce
TCO

Compliance

Automation
That’s the reason for BCC’s mission statement
Case Study - Global bank

20
Case Study - Global bank

Reduce Cost
by 50%

21

Ensure new
compliance
req.

Project
Initial Situation: Domino Administration
Lot of
development
efforts

Manual
monitoring

Highly skilled
administrators
required

High access
rights
required

Frequency of
human errors
can be high

Using
“internal”
Tools
Domino
Administrator
Client

Compliance
issue
Case Study– Global Bank
 Simplified System Administration
– Standardized technical procedures
– Leveraging latest Domino TCO Improvements
 Automation with Web-based Self-Service Application
– User and group management
– Team rooms
– Mail-In databases
 Enhanced Compliance and Security Check
– Server Based Compliance check and Audit Trial
– Additional security layer beyond ACL with 3rd party tool
 Result:
– Reduction of management costs by 50%
– Return on Investment in 8 Months
How did we achieve this?

24
How did we achieve this?
Streamline Administration
• Organize (Helpdesk, Self-Service)
• Standardize (technical procedures &
infrastructure)
• Automate with BCC AdminSuite

Ensure compliance
• Define security settings
• Ensure with additional security product
DominoProtect

25
Three Steps to streamline Administration

• Delegate the tasks
to Helpdesk, HR
…
• Provide SelfService Request

1.Organize

2.Standardize
• Convert admin tasks to an
IT Process
• A detailed checklist for
every task
• “simple” standard system
environment running the
most current IBM Domino
release

• Processing checklists
by rules, profiles and
backend server tasks
• Ensuring Compliance
by having a central log
database to
automatically record all
actions
• Reduce access rights!

3.Automate
Streamlined IT Process examples
Standardized IT Process ‘New Employee‘

Request

Workflow
(optional)
Standardized IT Process ‘New Employee‘

Expected rule based UserID

Request

Workflow
(optional)

Creation of Person document in DominoDirectory

Group entries corresponding to the
user are set in the profile
Mail file replica including cluster created

Password calculated and distributed via
Mail / print or fax / SMS

Data directory of the user created

Basic settings is stored in ID, Address Book, Workspace

User gets links, necessary applications
on the Workspace / Bookmarks
Standardized IT Process ‘New Employee‘

Request

Workflow
(optional)
Send confirmation mail to
requestor
Send information mail to
business owner

Create Billing entry in billing database

Create Reporting entry
Send welcome mail to
new user
Live demo
Standardized IT Process ‘New Application‘
NSF file is based on the specifications
of template creation

Request

Workflow
(optional)

ACL group (s) in the Domino Directory, are created with
all entries
ACL group (s) in the ACL of the
Database created are corresponding
To the registered rights
Email is sent to requestor on success,
And error is notified to Admin
User gets links to necessary
applications on the
Workspace / Bookmarks
Mobile users get local replica automatically
What makes AdminSuite so valuable for your organization?

Delegate to
Helpdesk or
Self-Service

Ensure
proper
execution

Reduce
Access
Rights

Accelerate
request & no
manual effort
Ensure Compliance
with additional security product
DominoProtect

34
How we achieve this?
Streamline Administration
• Organize (Helpdesk, Self Service)
• Standardize (technical procedures)
• Automate with BCC AdminSuite

Ensure compliance
• Define security settings
• Automate with additional security
product BCC DominoProtect
35
Define security settings:
Three key elements to IBM Domino Server Security

Server ID

Database
Access
Document
Access &
Change
What does DominoProtect do ?

Provide an additional
security layer

Add security at
document field level

• beyond ACL and
document access rights
• Manager, Designer or
Editors are not allowed to
perform changes

• Provide different security
settings for single fields in
a document
• Manager, Designer or
Editors are not allowed to
change defined fields
What does DominoProtect do ?

Detailed monitoring and
tracking at real time

• Track access
• Track modifications at
field level
• Old entry
• new entry

Prevent changes at real time

• Control Domino access
rights -> even Manager
can not change
• Track blocked changes
What does DominoProtect technically?
Protect Server ID
with passwords
• Assign random
password to server
ID
• Provide password
at startup
• Automatic restart
possible

Protect ACL
• Prevent ACL
Change
• Track ACL
Changes

Protect Notes
document beyond
ACL settings
• Track access to
document
• Track modification
• Prevent opening,
modification or
deletion
• Check and control
field level changes
How do we achieve this: Security Settings Examples
Secure your ID Vault Server with DominoProtect
Secure your ID Vault Server
1. Step: Password protected server ID file
Why secure your server ID ? Protect ID Vault !
 IBM Recommendation: Securing the server ID file
–‘We understand that most Domino servers are not password-protected
to make unattended reboots simpler, but the vault server's ID file is a
key element in the security of your ID vault.‘
–‘..a sophisticated attacker with a vault database and one of the
corresponding server Ids ... would have all of the cryptographic
information needed to masquerade as the vault server and decrypt all
of the ID files stored in the vault‘.
 http://www-10.lotus.com/ldd/dominowiki.nsf/dx/securing-your-notes-idvault-server
Secure your ID Vault Server
2. Step Secure your ID Vault ACL
Everyone with role Auditor and
Admin client is able to download ID
Files from ID Vault

How to Change ACL

•
•

Full Access Admins might be able to do this
Server based script agents

Preventing unwanted changes in ID
Vault ACL is mandatory
Secure your ID Vault Server
3. Step: Protect Configuration in Domino Directory
 Main Goal: Reduce Access Rights to ID Vault Database and ensure these settings
 Server Document:
– Protect Field: Full access administrators
– Protect optional Fields: “Programmability Restrictions“
– DominoProtect will
• Block every change in these defined fields.
• All other fields can be changed
 Protect ACL Groups providing Access to ID Vault :
– Prevent Modification of all ACL Groups related to ID Vault
– DominoProtect will
• Block every change in these defined Group Documents
• All other groups can be changed
44
Secure your ID Vault Server
4. Step: Control security log entries in log.nsf
 Main Goal: Reduce Access Rights to log.nsf and prevent deletion or
modification of Security Event log entries
 Log.nsf
–ACL: Protect Changes in log.nsf
–Log “Security Events”
• Protect Changes in Documents “Security Events”
• Optional Restrict access to “Security Events”

 DominoDirectory
–Protect ACL Groups providing Access to log.nsf
–Protect Full Access Admin Field
45
Live demo
What makes DominoProtect so valuable for your
organization ?

Real-time
on server
level

Different
access at
field level

No template
modification
Benefits for end users/employees
 Personal increase in productivity
by faster service
 Better service quality
by lesser mistakes

 Self-service possibility
‘I can help myself‘
Benefits for Admin/IT department
 Simplification in administration
 Concentration on mission-critical projects
and strategic measures
 Reduction on the variety of tools and
scripts
 No requirement of customized training
Benefits for administrators
 Prevents unauthorized modification of
server configuration

 Enhances process reliability through
request-based
change management with approval cycles
 Provides full control and automated
documentation of all configuration changes
 Recovery function for configuration
documents in case of mistakes or
configuration errors
 Alerts in case of defined protection violation
Benefits for Management
 Cost-efficient
–Reduces the notes infrastructure
administration cost by 70%
–Service transparency
 Minimizes risks
–Ensure compliance
–Reliable information about
unauthorized access or
modification attempts
 Increases the employee productivity
Question time …

BCC
Olaf Boerner

Olaf_Boerner@bcc.biz
 Access Connect Online to complete your session surveys using any:
– Web or mobile browser
– Connect Online kiosk onsite

54
Acknowledgements and Disclaimers
Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates.
The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither
intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information
contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise
related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or
its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software.
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and
performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you
will result in any specific sales, revenue growth or other results.

© Copyright IBM Corporation 2014. All rights reserved.
 U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
 IBM, the IBM logo, ibm.com, IBM Lotus and IBM Notes and Domino are trademarks or registered trademarks of International Business Machines Corporation in the United States, other
countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S.
registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A
current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml
 All BCC product names are registered trademarks of BCC.
 Other company, product, or service names may be trademarks or service marks of others.

55

More Related Content

What's hot

BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
Content Rules, Inc.
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
RMayo22
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
HelpSystems
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationRMayo22
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
HelpSystems
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
Kimber Spradlin
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
IBM Sverige
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
Hitachi ID Systems, Inc.
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
IBM Sverige
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
Precisely
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
IBM Danmark
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterprise
evancmiller
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
IBM Security
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
IBM Sverige
 
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File TransfersPreventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Biscom Delivery Server
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
Precisely
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
Precisely
 

What's hot (20)

BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0IBM Endpoint Manager V9.0
IBM Endpoint Manager V9.0
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentationIBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation presentation
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Understanding the Enterprise
Understanding the EnterpriseUnderstanding the Enterprise
Understanding the Enterprise
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Preventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File TransfersPreventing Employee Data Breaches Caused by Unsecure File Transfers
Preventing Employee Data Breaches Caused by Unsecure File Transfers
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Membership meeting
Membership meetingMembership meeting
Membership meeting
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 

Similar to IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administration, Save Time and Money

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
Giovanni Zanasca
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
Hitachi ID Systems, Inc.
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
Precisely
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Software India
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campOlav Tvedt
 
Cso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summaryCso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summary
CSO GmbH
 
Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)
Ivanti
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
Precisely
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
Cloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask YouCloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask You
Wipfli LLP/Brittenford Systems Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
Hitachi ID Systems, Inc.
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration PresentationJames Garrett
 
Servicing Financial Services Applications
Servicing Financial Services ApplicationsServicing Financial Services Applications
Servicing Financial Services Applications
Shashi Kiran
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
run_frictionless
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 

Similar to IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administration, Save Time and Money (20)

Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Mdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot campMdop session from Microsoft partner boot camp
Mdop session from Microsoft partner boot camp
 
Cso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summaryCso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summary
 
Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)Remote Worker Webinar (Episode 5)
Remote Worker Webinar (Episode 5)
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Cloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask YouCloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask You
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Discover365 Integration Presentation
Discover365 Integration PresentationDiscover365 Integration Presentation
Discover365 Integration Presentation
 
Servicing Financial Services Applications
Servicing Financial Services ApplicationsServicing Financial Services Applications
Servicing Financial Services Applications
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 

More from BCC - Solutions for IBM Collaboration Software

Connections 5.x to 6.0 migration
Connections 5.x to 6.0 migrationConnections 5.x to 6.0 migration
Connections 5.x to 6.0 migration
BCC - Solutions for IBM Collaboration Software
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
BCC - Solutions for IBM Collaboration Software
 
Systematisch: Von der alten in die neue Welt - Migrations-Szenarien
Systematisch: Von der alten in die neue Welt - Migrations-SzenarienSystematisch: Von der alten in die neue Welt - Migrations-Szenarien
Systematisch: Von der alten in die neue Welt - Migrations-Szenarien
BCC - Solutions for IBM Collaboration Software
 
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
BCC - Solutions for IBM Collaboration Software
 
Protect your IBM Domino data from leaks with BCC DominoProtect
Protect your IBM Domino data from leaks with BCC DominoProtectProtect your IBM Domino data from leaks with BCC DominoProtect
Protect your IBM Domino data from leaks with BCC DominoProtect
BCC - Solutions for IBM Collaboration Software
 
IBM Connections Cloud Administration
IBM Connections Cloud AdministrationIBM Connections Cloud Administration
IBM Connections Cloud Administration
BCC - Solutions for IBM Collaboration Software
 
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCCIBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
BCC - Solutions for IBM Collaboration Software
 
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
BCC - Solutions for IBM Collaboration Software
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
BCC - Solutions for IBM Collaboration Software
 
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
BCC - Solutions for IBM Collaboration Software
 
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM DominoKeine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
BCC - Solutions for IBM Collaboration Software
 
Honey, I shrunk the data - Mehr Platz am IBM Domino Server
Honey, I shrunk the data - Mehr Platz am IBM Domino ServerHoney, I shrunk the data - Mehr Platz am IBM Domino Server
Honey, I shrunk the data - Mehr Platz am IBM Domino Server
BCC - Solutions for IBM Collaboration Software
 
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
BCC - Solutions for IBM Collaboration Software
 
XPages: Performance-Optimierung - Ulrich Krause (eknori) SNoUG 2013
XPages: Performance-Optimierung  - Ulrich Krause (eknori) SNoUG 2013XPages: Performance-Optimierung  - Ulrich Krause (eknori) SNoUG 2013
XPages: Performance-Optimierung - Ulrich Krause (eknori) SNoUG 2013
BCC - Solutions for IBM Collaboration Software
 
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
BCC - Solutions for IBM Collaboration Software
 
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
BCC - Solutions for IBM Collaboration Software
 
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
BCC - Solutions for IBM Collaboration Software
 
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
BCC - Solutions for IBM Collaboration Software
 
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
BCC - Solutions for IBM Collaboration Software
 

More from BCC - Solutions for IBM Collaboration Software (20)

Connections 5.x to 6.0 migration
Connections 5.x to 6.0 migrationConnections 5.x to 6.0 migration
Connections 5.x to 6.0 migration
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Systematisch: Von der alten in die neue Welt - Migrations-Szenarien
Systematisch: Von der alten in die neue Welt - Migrations-SzenarienSystematisch: Von der alten in die neue Welt - Migrations-Szenarien
Systematisch: Von der alten in die neue Welt - Migrations-Szenarien
 
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
MaRisk Andorderungen erfüllen - Analyse von Rechten und Rollen in IBM Domino ...
 
Protect your IBM Domino data from leaks with BCC DominoProtect
Protect your IBM Domino data from leaks with BCC DominoProtectProtect your IBM Domino data from leaks with BCC DominoProtect
Protect your IBM Domino data from leaks with BCC DominoProtect
 
IBM Connections Cloud Administration
IBM Connections Cloud AdministrationIBM Connections Cloud Administration
IBM Connections Cloud Administration
 
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCCIBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
IBM Connect 2016: Speaker Session with Teresa Deane, Senior Developer, BCC
 
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
Dr. Strangelove, or how I learned to love plug-in development - SNoUG 2014
 
Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...Using Social Business Software and being compliant with EU data protection la...
Using Social Business Software and being compliant with EU data protection la...
 
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
XPages Performance Master Class - Survive in the fast lane on the Autobahn (E...
 
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM DominoKeine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
Keine Kompromisse! Mehr Sicherheit & Compliance für IBM Domino
 
Honey, I shrunk the data - Mehr Platz am IBM Domino Server
Honey, I shrunk the data - Mehr Platz am IBM Domino ServerHoney, I shrunk the data - Mehr Platz am IBM Domino Server
Honey, I shrunk the data - Mehr Platz am IBM Domino Server
 
Wie schützen Sie Ihre Messaging- & Collaboration-Infrastruktur? Lessons learn...
Wie schützen Sie Ihre Messaging- & Collaboration-Infrastruktur? Lessons learn...Wie schützen Sie Ihre Messaging- & Collaboration-Infrastruktur? Lessons learn...
Wie schützen Sie Ihre Messaging- & Collaboration-Infrastruktur? Lessons learn...
 
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
Platz schaffen auf dem Domino - Compact, Compress, De-Duplicate - Ulrich Krau...
 
XPages: Performance-Optimierung - Ulrich Krause (eknori) SNoUG 2013
XPages: Performance-Optimierung  - Ulrich Krause (eknori) SNoUG 2013XPages: Performance-Optimierung  - Ulrich Krause (eknori) SNoUG 2013
XPages: Performance-Optimierung - Ulrich Krause (eknori) SNoUG 2013
 
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
Deep Dive Domino Mail Routing - SMTP Cookbook - DNUG Herbstkonferenz 2013
 
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
Deep Dive AdminP Process - Admin and Infrastructure Track at UKLUG 2012
 
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
Platz da! Platz schaffen auf dem Domino Server - Vortrag von Ulrich Krause be...
 
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
Wie gewährleisten Sie die Einhaltung von Sicherheitsanforderungen an Ihre Mes...
 
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
Wie schützen Sie Ihre E-Mail-Kommunikation? Kurzfristige Lösungsansätze bis z...
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

IBM Connect 2014 SPOT114: No Compromise on Compliance: Streamline Administration, Save Time and Money

  • 1. SPOT114 : No Compromise on Compliance: Streamline Administration, Save Time and Money Olaf Boerner, BCC © 2014 IBM Corporation
  • 2. Agenda  Introduction  Requirements for todays IBM Domino® infrastructure  How to streamline Administration  How to ensure Compliance  Question Time
  • 3. About us  BCC, an IBM Business Partner since 1996  Solution provider for secure and cost-efficient management of IBM Collaboration Infrastructure  Develops software products, provides consulting and implementation services  800 companies with more than 3 million users trust BCC solutions
  • 4. About me  Administrator / Developer since 1994  Founded BCC in 1996  Working as senior architect with large enterprise customers –reducing Total cost of Ownership of IBM Notes and Domino® –securing and optimizing Domino infrastructures  IBM Champion  Twitter: @OlafBoerner
  • 5. Current situation for Domino Infrastructure 5
  • 6. Current situation for Domino infrastructures Compliance is a major issue The cost pressure in IT has grown enormously Hands-on admin skills are required The delivery model or platform is under question 6
  • 7. The cost pressure in IT has grown enormously The demands in the IT are growing and assurance of safe operations to make powerful and efficient systems is their prime goal 7 More than 80% of the IT companies are under enormous increasing cost pressures
  • 8. Compliance Requirements  Sarbanes Oxley (SOX) - related to investments and securities  FINRA - related to investments and financial advisors  HIPAA - related to the protection and privacy of health information –Any company that deals with protected health information (PHI) must ensure that all the required • physical, • network, and • process security measures –are in place and followed.
  • 9. The cost of not being compliant  Brand Damage  Non-Compliance Fines  Litigation Expenses Examples  $1.45 billion judgment against Morgan Stanley for being unable to produce reliable emails in the course of fraud litigation  $2.5 million fine against Merrill Lynch for failing to promptly produce emails over a period of 17 months
  • 10. Objectives for todays social business infrastructure Streamline / TCO Security / Compliance
  • 11. How to handle these conflicts of objectives ? 11
  • 12. How to handle these conflicts of objectives ?  How can you ensure compliance,  Enhance security and  Reduce total cost of ownership?  QUESTIONS: –Compliance and security are really expensive ? –Trade off ?  Let’s discuss this at current example: NSA and Snowden 12
  • 13. NSA Security ...  Why did they have a Security Leak ? –“The scariest threat is the systems administrator,” –“The system administrator has godlike access to systems they manage.” • Eric Chiu Hytrust , Security Advisor http://www.nytimes.com/2013/06/24/technology/nsa-leak-puts-focus-onsystem-administrators.html?_r=0
  • 14. Lessons learned: How will NSA increase security ?  Additional monitoring systems  “a two-man rule” that would limit the ability of each of its 1,000 root system admins to gain unfettered access to the entire system  Two–man rule is easy to implement !!!  Automation
  • 15. Why Automation increases security  NSA to Axe 90 Percent of System Administrators, Adopt Automation Instead – “What we’re in the process of doing – not fast enough – is reducing our system administrators by about 90 percent,” Keith Alexander, NSA – „doing things that machines are probably better at doing.“  1000 * 90% = 900 of its root system admins http://www.washingtonpost.com/blogs/federal-eye/wp/2013/08/13/nsa-to-cut-90percent-of-systems-administrators/ http://www.dailytech.com/NSA+to+Axe+90+Percent+of+System+Administrators+Ad opt+Automation+Instead/article33145.htm
  • 16. Summary: Why Automation increases security  „doing things that machines are probably better at doing.“ (Keith Alexander)  decrease required access rights  provide system log trails  TCO reduction is included for free! (currently) not important for NSA ;-) 17
  • 17. Automation is key ! Security Reduce TCO Compliance Automation
  • 18. That’s the reason for BCC’s mission statement
  • 19. Case Study - Global bank 20
  • 20. Case Study - Global bank Reduce Cost by 50% 21 Ensure new compliance req. Project
  • 21. Initial Situation: Domino Administration Lot of development efforts Manual monitoring Highly skilled administrators required High access rights required Frequency of human errors can be high Using “internal” Tools Domino Administrator Client Compliance issue
  • 22. Case Study– Global Bank  Simplified System Administration – Standardized technical procedures – Leveraging latest Domino TCO Improvements  Automation with Web-based Self-Service Application – User and group management – Team rooms – Mail-In databases  Enhanced Compliance and Security Check – Server Based Compliance check and Audit Trial – Additional security layer beyond ACL with 3rd party tool  Result: – Reduction of management costs by 50% – Return on Investment in 8 Months
  • 23. How did we achieve this? 24
  • 24. How did we achieve this? Streamline Administration • Organize (Helpdesk, Self-Service) • Standardize (technical procedures & infrastructure) • Automate with BCC AdminSuite Ensure compliance • Define security settings • Ensure with additional security product DominoProtect 25
  • 25. Three Steps to streamline Administration • Delegate the tasks to Helpdesk, HR … • Provide SelfService Request 1.Organize 2.Standardize • Convert admin tasks to an IT Process • A detailed checklist for every task • “simple” standard system environment running the most current IBM Domino release • Processing checklists by rules, profiles and backend server tasks • Ensuring Compliance by having a central log database to automatically record all actions • Reduce access rights! 3.Automate
  • 27. Standardized IT Process ‘New Employee‘ Request Workflow (optional)
  • 28. Standardized IT Process ‘New Employee‘ Expected rule based UserID Request Workflow (optional) Creation of Person document in DominoDirectory Group entries corresponding to the user are set in the profile Mail file replica including cluster created Password calculated and distributed via Mail / print or fax / SMS Data directory of the user created Basic settings is stored in ID, Address Book, Workspace User gets links, necessary applications on the Workspace / Bookmarks
  • 29. Standardized IT Process ‘New Employee‘ Request Workflow (optional) Send confirmation mail to requestor Send information mail to business owner Create Billing entry in billing database Create Reporting entry Send welcome mail to new user
  • 31. Standardized IT Process ‘New Application‘ NSF file is based on the specifications of template creation Request Workflow (optional) ACL group (s) in the Domino Directory, are created with all entries ACL group (s) in the ACL of the Database created are corresponding To the registered rights Email is sent to requestor on success, And error is notified to Admin User gets links to necessary applications on the Workspace / Bookmarks Mobile users get local replica automatically
  • 32. What makes AdminSuite so valuable for your organization? Delegate to Helpdesk or Self-Service Ensure proper execution Reduce Access Rights Accelerate request & no manual effort
  • 33. Ensure Compliance with additional security product DominoProtect 34
  • 34. How we achieve this? Streamline Administration • Organize (Helpdesk, Self Service) • Standardize (technical procedures) • Automate with BCC AdminSuite Ensure compliance • Define security settings • Automate with additional security product BCC DominoProtect 35
  • 35. Define security settings: Three key elements to IBM Domino Server Security Server ID Database Access Document Access & Change
  • 36. What does DominoProtect do ? Provide an additional security layer Add security at document field level • beyond ACL and document access rights • Manager, Designer or Editors are not allowed to perform changes • Provide different security settings for single fields in a document • Manager, Designer or Editors are not allowed to change defined fields
  • 37. What does DominoProtect do ? Detailed monitoring and tracking at real time • Track access • Track modifications at field level • Old entry • new entry Prevent changes at real time • Control Domino access rights -> even Manager can not change • Track blocked changes
  • 38. What does DominoProtect technically? Protect Server ID with passwords • Assign random password to server ID • Provide password at startup • Automatic restart possible Protect ACL • Prevent ACL Change • Track ACL Changes Protect Notes document beyond ACL settings • Track access to document • Track modification • Prevent opening, modification or deletion • Check and control field level changes
  • 39. How do we achieve this: Security Settings Examples Secure your ID Vault Server with DominoProtect
  • 40. Secure your ID Vault Server 1. Step: Password protected server ID file
  • 41. Why secure your server ID ? Protect ID Vault !  IBM Recommendation: Securing the server ID file –‘We understand that most Domino servers are not password-protected to make unattended reboots simpler, but the vault server's ID file is a key element in the security of your ID vault.‘ –‘..a sophisticated attacker with a vault database and one of the corresponding server Ids ... would have all of the cryptographic information needed to masquerade as the vault server and decrypt all of the ID files stored in the vault‘.  http://www-10.lotus.com/ldd/dominowiki.nsf/dx/securing-your-notes-idvault-server
  • 42. Secure your ID Vault Server 2. Step Secure your ID Vault ACL Everyone with role Auditor and Admin client is able to download ID Files from ID Vault How to Change ACL • • Full Access Admins might be able to do this Server based script agents Preventing unwanted changes in ID Vault ACL is mandatory
  • 43. Secure your ID Vault Server 3. Step: Protect Configuration in Domino Directory  Main Goal: Reduce Access Rights to ID Vault Database and ensure these settings  Server Document: – Protect Field: Full access administrators – Protect optional Fields: “Programmability Restrictions“ – DominoProtect will • Block every change in these defined fields. • All other fields can be changed  Protect ACL Groups providing Access to ID Vault : – Prevent Modification of all ACL Groups related to ID Vault – DominoProtect will • Block every change in these defined Group Documents • All other groups can be changed 44
  • 44. Secure your ID Vault Server 4. Step: Control security log entries in log.nsf  Main Goal: Reduce Access Rights to log.nsf and prevent deletion or modification of Security Event log entries  Log.nsf –ACL: Protect Changes in log.nsf –Log “Security Events” • Protect Changes in Documents “Security Events” • Optional Restrict access to “Security Events”  DominoDirectory –Protect ACL Groups providing Access to log.nsf –Protect Full Access Admin Field 45
  • 46. What makes DominoProtect so valuable for your organization ? Real-time on server level Different access at field level No template modification
  • 47. Benefits for end users/employees  Personal increase in productivity by faster service  Better service quality by lesser mistakes  Self-service possibility ‘I can help myself‘
  • 48. Benefits for Admin/IT department  Simplification in administration  Concentration on mission-critical projects and strategic measures  Reduction on the variety of tools and scripts  No requirement of customized training
  • 49. Benefits for administrators  Prevents unauthorized modification of server configuration  Enhances process reliability through request-based change management with approval cycles  Provides full control and automated documentation of all configuration changes  Recovery function for configuration documents in case of mistakes or configuration errors  Alerts in case of defined protection violation
  • 50. Benefits for Management  Cost-efficient –Reduces the notes infrastructure administration cost by 70% –Service transparency  Minimizes risks –Ensure compliance –Reliable information about unauthorized access or modification attempts  Increases the employee productivity
  • 51.
  • 52. Question time … BCC Olaf Boerner Olaf_Boerner@bcc.biz
  • 53.  Access Connect Online to complete your session surveys using any: – Web or mobile browser – Connect Online kiosk onsite 54
  • 54. Acknowledgements and Disclaimers Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. © Copyright IBM Corporation 2014. All rights reserved.  U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.  IBM, the IBM logo, ibm.com, IBM Lotus and IBM Notes and Domino are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml  All BCC product names are registered trademarks of BCC.  Other company, product, or service names may be trademarks or service marks of others. 55